HP Web Jetadmin Software Instrukcja Użytkownika Strona 443

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 442
Create device conguration templates for devices that have new or custom sign-in methods
Some devices have new or custom sign-in methods installed that are not available on the Access Control for
Device Functions conguration option. To create device conguration templates and congure this option for
these devices, perform the following steps:
1. From the device list, select a single device that has a custom sign-in method installed.
2. Click the Cong tab, expand the Security category, and then select the Access Control for Device Functions
conguration option.
3. Verify that the custom sign-in method appears in the Default sign in method list.
4. Specify the appropriate settings for the device.
5. Click the Apply button.
6. On the Conrm window, verify that the information is correct, and then click the Congure Devices button.
7. On the Results page, click the Done button.
Access Control Level for Device Functions
Use this conguration option to set the access control levels for the device. A dierent authentication method
and security level can be assigned to each device function. You can reduce costs and increase security by only
allowing users access to the minimum set of device functions necessary for your organization's operational
needs.
Use the following steps to congure this option:
1. Set the access control level for device functions:
Maximum: Require sign-in before any device features can be accessed.
Minimum: Allow unauthenticated access to all device features except Service Mode.
NOTE: If you selected Minimum, you do not need to dene permission sets.
Custom: Require sign-in for selected device features.
2. If you choose Maximum or Custom access control level, you need to dene one or more permission sets.
The permission sets control which device features a member of the dened group has access to. To create
a permission set, click Add and type the new permission set name in Permission set name and then dene
which functions should require signing.
3. After a permission set has been created, you can edit it; select the permission set in Permission sets and
then click Edit.
4. To delete a permission set, select the permission set in the Permission sets box and then click Delete.
Access Control List
An access control list (ACL) is used to specify the IP addresses on your network that are allowed access to the
device. The list supports up to 10 entries. If the list is empty, then any system is allowed access. By default, host
systems with HTTP connections (such as Web browser or Internet Printing Protocol connections) are allowed
access regardless of access control list entries. This allows hosts to access the device when Proxy Servers or
Network Address Translators are used. However, unltered access by HTTP hosts may be disabled by clearing
the Check ACL for HTTP check box.
ENWW Device Conguration Options for Security 417
Przeglądanie stron 442
1 2 ... 438 439 440 441 442 443 444 445 446 447 448 ... 491 492

Komentarze do niniejszej Instrukcji

Brak uwag