PKI-Enabled MFP. Installation and Configuration Guide
|
|
|
- Joleen Merritt
- 10 years ago
- Views:
Transcription
1 PKI-Enabled MFP Installation and Configuration Guide Version
2 PKI Installation and Configuration Guide Edition: June 2008 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time. Comments about this publication may be addressed to Lexmark International, Inc., Department F95/032-2, 740 West New Circle Road, Lexington, Kentucky 40550, U.S.A. In the United Kingdom and Eire, send to Lexmark International Ltd., Marketing and Services Department, Westhorpe House, Westhorpe, Marlow Bucks SL7 3RQ. Lexmark may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Kingdom and Eire, call +44 (0) In other countries, contact your point of purchase. References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all countries in which it operates. Any reference to a product, program or service is not intended to state or imply that only that product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual property right may be used instead. Evaluation and verification of operation in conjunction with other products, programs, or services, except those expressly designated by the manufacturer, are the user s responsibility. ImageQuick, Optra, Lexmark, and Lexmark with diamond design are trademarks of Lexmark International, Inc. registered in the United States and/or other countries. Other trademarks are the property of their respective owners. Copyright Lexmark International, Inc. All rights reserved. UNITED STATES GOVERNMENT RIGHTS This software and any accompanying documentation provided under this agreement are commercial computer software and documentation developed exclusively at private expense. Version Page i
3 PKI Installation and Configuration Guide Lexmark Software License Agreement PLEASE READ CAREFULLY BEFORE INSTALLING AND/OR USING THIS SOFTWARE: This Software License Agreement ("License Agreement") is a legal agreement between you (either an individual or a single entity) and Lexmark International, Inc. ("Lexmark") that, to the extent your Lexmark product or Software Program is not otherwise subject to a written software license agreement between you and Lexmark or its suppliers, governs your use of any Software Program installed on or provided by Lexmark for use in connection with your Lexmark product. The term "Software Program" includes machine-readable instructions, audio/visual content (such as images and recordings), and associated media, printed materials and electronic documentation. BY USING AND/OR INSTALLING THIS SOFTWARE, YOU AGREE TO BE BOUND BY ALL THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT SO AGREE, DO NOT INSTALL, COPY, DOWNLOAD, OR OTHERWISE USE THE SOFTWARE PROGRAM. IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE AGREEMENT, PROMPTLY RETURN THE PRODUCT UNUSED AND REQUEST A REFUND OF THE AMOUNT YOU PAID. IF YOU ARE INSTALLING THIS SOFTWARE PROGRAM FOR USE BY OTHER PARTIES, YOU AGREE TO INFORM THE USERS THAT USE OF THE SOFTWARE PROGRAM INDICATES ACCEPTANCE OF THESE TERMS. 1 STATEMENT OF LIMITED WARRANTY. Lexmark warrants that the media (e.g., diskette or compact disk) on which the Software Program (if any) is furnished is free from defects in materials and workmanship under normal use during the warranty period. The warranty period is ninety (90) days and commences on the date the Software Program is delivered to the original end-user. This limited warranty applies only to Software Program media purchased new from Lexmark or an Authorized Lexmark Reseller or Distributor. Lexmark will replace the Software Program should it be determined that the media does not conform to this limited warranty. 2 DISCLAIMER AND LIMITATION OF WARRANTIES. EXCEPT AS PROVIDED IN THIS LICENSE AGREEMENT AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, LEXMARK AND ITS SUPPLIERS PROVIDE THE SOFTWARE PROGRAM "AS IS" AND HEREBY DISCLAIM ALL OTHER WARRANTIES AND CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, TITLE, NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND ABSENCE OF VIRUSES, ALL WITH REGARD TO THE SOFTWARE PROGRAM. This Agreement is to be read in conjunction with certain statutory provisions, as that may be in force from time to time, that imply warranties or conditions or impose obligations on Lexmark that cannot be excluded or modified. If any such provisions apply, then to the extent Lexmark is able, Lexmark hereby limits its liability for breach of those provisions to one of the following: replacement of the Software Program or reimbursement of the price paid for the Software Program. 3 LICENSE GRANT. Lexmark grants you the following rights provided you comply with all terms and conditions of this License Agreement: a Use. You may Use one copy of the Software Program. The term "Use" means storing, loading, installing, executing, or displaying the Software Program. If Lexmark has licensed the Software Program to you for concurrent use, you must limit the number of authorized users to the number specified in your agreement with Lexmark. You may not separate the components of the Software Program for use on more than one computer. You agree that you will not Use the Software Program, in whole or in part, in any manner that has the effect of overriding, modifying, eliminating, obscuring, altering or de-emphasizing the visual appearance of any trademark, trade name, trade dress or intellectual property notice that appears on any computer display screens normally generated by, or as a result of, the Software Program. b Copying. You may make one (1) copy of the Software Program solely for purposes of backup, archiving, or installation, provided the copy contains all of the original Software Program's proprietary notices. You may not copy the Software Program to any public or distributed network. c Reservation of Rights. The Software Program, including all fonts, is copyrighted and owned by Lexmark International, Inc. and/or its suppliers. Lexmark reserves all rights not expressly granted to you in this License Agreement. d Freeware. Notwithstanding the terms and conditions of this License Agreement, all or any portion of the Software Program that constitutes software provided under public license by third parties ("Freeware") is licensed to you subject to the terms and conditions of the software license agreement accompanying such Freeware, whether in the form of a discrete agreement, shrinkwrap license, or electronic license terms at the time of download. Use of the Freeware by you shall be governed entirely by the terms and conditions of such license. 4 TRANSFER. You may transfer the Software Program to another end-user. Any transfer must include all software components, media, printed materials, and this License Agreement and you may not retain copies of the Software Program or components thereof. The transfer may not be an indirect transfer, such as a consignment. Prior to the transfer, the end-user receiving the transferred Software Program must agree to all these License Agreement terms. Upon transfer of the Software Program, your license is automatically terminated. You may not rent, sublicense, or assign the Software Program except to the extent provided in this License Agreement. 5 UPGRADES. To Use a Software Program identified as an upgrade, you must first be licensed to the original Software Program identified by Lexmark as eligible for the upgrade. After upgrading, you may no longer use the original Software Program that formed the basis for your upgrade eligibility. 6 LIMITATION ON REVERSE ENGINEERING. You may not alter, reverse engineer, reverse assemble, reverse compile or otherwise translate the Software Program, except as and to the extent expressly permitted to do so by applicable law for the purposes of interoperability, error Version Page ii
4 PKI Installation and Configuration Guide correction, and security testing. If you have such statutory rights, you will notify Lexmark in writing of any intended reverse engineering, reverse assembly, or reverse compilation. You may not decrypt the Software Program unless necessary for the legitimate Use of the Software Program. 7 ADDITIONAL SOFTWARE. This License Agreement applies to updates or supplements to the original Software Program provided by Lexmark unless Lexmark provides other terms along with the update or supplement. 8 LIMITATION OF REMEDIES. To the maximum extent permitted by applicable law, the entire liability of Lexmark, its suppliers, affiliates, and resellers, and your exclusive remedy shall be as follows: Lexmark will provide the express limited warranty described above. If Lexmark does not remedy defective media as warranted, you may terminate your license and your money will be refunded upon the return of all of your copies of the Software Program. Other Notices This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolit. See for more information. This product includes software developed by: Copyright (c) 2002 Juha Yrjà lã. All rights reserved. Copyright (c) 2001 Markus Friedl. Copyright (c) 2002 Olaf Kirch Copyright (c) 2003 Kevin Stefanik Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in thedocumentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Version Page iii
5 PKI Installation and Configuration Guide Table of Contents Lexmark Software License Agreement... ii Other Notices...iii 1 Background Information Installing the Firmware and Applications Firmware Update Smartcard Driver PKI Applications Configuring the Basic MFP Settings Date and Time TCP/IP Settings Server Setup Address Book Setup Auto-Logout Certificate Management Configuring PKI/AD Authentication General Settings Custom LDAP Settings Adding a New Configuration Editing an Existing Configuration Removing an Existing Configuration Configuring PKI/AD Standard Applications Configuring PKI/AD Configuring PKI/AD Scan to Network General Settings Fileshare Settings Adding a New Fileshare Editing an Existing Fileshare Removing an Existing Fileshare Troubleshooting Login Issues LDAP Issues Scan To Issues Scan To Network Issues Version Page iv
6 PKI Installation and Configuration Guide Version Page v
7 1 Background Information This document assumes you have read and completed the Pre-Installation Guide for the Lexmark PKI-Enabled MFP. If not, please consult that guide before continuing with the installation. Numerous mentions will be made throughout this document to the information that was gathered using that document. Before proceeding with the install, make sure the following has taken place: 1. The MFP has been unboxed and setup as according to the end-user manual. 2. The MFP has been assigned an IP Address and is connected to the LAN. 3. You can use the web browser to navigate to the MFP s webpage. This can be done by entering the MFP s IP Address in the address bar of the web browser. Once this has been verified for each MFP that will be PKI-enabled, you are ready to proceed. Version Page 1
8 2 Installing the Firmware and Applications The PKI application support comes in three parts: PKI/AD Firmware Smartcard Driver PKI Applications All three need to be installed in order to activate PKI support. The SmartCard Reader cannot be installed on the MFP prior to completing all the steps in this section. 2.1 Firmware Update NOTE: Installing the PKI/AD Firmware will remove any previously installed embedded solutions. However, any settings that have already been configured for the device itself will be kept and used with the new firmware. 1. Bring up the MFP s web page and click Configuration and then click Update Firmware. Version Page 2
9 2. Browse to the location of the firmware file. Click Submit. See the table below for filename that corresponds to your MFP model. MFP Model X644 and X646 X85x X782 X94x T64x + X4600 Firmware File LC2_MC_P254PAh1_full.fls LC2_BE_P248PAh1_full.fls LC2_TO_P077PAh1_full.fls LC_BR_P065PAh1_full.fls LC2_TI_P249PAh1_full.fls 3. The file will take a few minutes to upload and for the MFP to be updated. Wait for the update to complete and then refresh the web page. NOTE: The MFP should not be powered off while the update is in progress. 2.2 Smartcard Driver After the firmware has been updated, the Smartcard Driver compatible with the type of cards being used must be installed. 1. Bring up the MFP s web page and click Configuration and then click Embedded Solutions. Version Page 3
10 2. One Embedded Solution (PKI/Active Directory Application) is automatically installed when the PKI/AD firmware is installed. Click the Install button. Version Page 4
11 3. Browse to the Smartcard Driver solution file and click Start Install. See the table below for filename that corresponds to supported card types. Card Type CAC / DOD Solution File scif-cac-2_0_0.fls 4. Wait for the install to complete and then click Return. Version Page 5
12 5. There should now be two embedded solutions installed on the MFP. Note: The Name and Version of the Smartcard Driver Application displayed here may differ from what is displayed on your MFP. 2.3 PKI Applications Once the firmware and Smartcard Driver have been installed, the application files can then be installed. 1. Continuing from the previous install step for the Smartcard Driver, click Install. Version Page 6
13 2. Browse to the PKI Authentication Application solution file, pkiad-2_0_0.fls, and click Start Install. 3. Wait for the install to complete and then click Return. Version Page 7
14 4. Repeat steps 1 3 to install each of the following PKI applications. If a particular function will not be used, it does not need to be installed. PKI Function User Authorization for Copy, Fax, and/or FTP Scan to Scan to Network Solution File pkistdapps-2_0_0.fls pki -2_0_0.fls pkinetworkscan-2_0_0.fls 5. The list of installed solutions should now include all or some of the following: Version Page 8
15 3 Configuring the Basic MFP Settings This section describes the process for using the information obtained in the Pre-Installation Guide to configure the basic MFP Settings. Even if this device has been previously setup, follow through these steps to make sure all settings necessary for the PKI capability to function correctly have been configured. 3.1 Date and Time In order to login in to perform a Kerberos login, the date and time must be within 5 minutes of the date and time of the Domain Controller. The time can be set manually on the device or it can be acquired from a time server. 1. Click Configuration and then click Set Date and Time. Version Page 9
16 Pre-Installation Section The Date and Time screen is displayed. If setting the time manually: Set the Time Zone Set the Date & Time in the format shown Set DST Mode to Automatic Set Daylight Savings to Yes Set Time Server to None Leave Time Server Name blank If using a Time Server: Set the Time Zone Leave Set Date & Time blank Set DST Mode to Automatic Set Daylight Savings to Yes Set Time Server to IP Set Time Server Name 3. Click Submit. 3.2 TCP/IP Settings While not explicitly part of the PKI Application Setup, it is a good idea to verify all necessary TCP/IP Settings are configured. Version Page 10
17 1. Click Configuration and then click Network/Ports. 2. Click TCP/IP. Pre-Installation Section Check the value in the Domain Name field. Set it to the value listed in Pre-Installation Section 2.4, Item 1. If there are any other values given in Items 2 to 4, add them to the Domain Search Order; multiple domain names should be separated by a comma. Version Page 11
18 Pre-Installation Section If using a Static IP Address, also check the WINS and DNS Server Address and make sure there is a valid value specified for each. If a backup DNS Server is available, set that value as well. 5. If any changes were made, click Submit to apply the new values Server Setup If Scan to is to be allowed on this device, the Server settings must be configured; otherwise, this section can be skipped. Version Page 12
19 1. Click Configuration and then click Network/Ports. 2. Click Server Setup. Version Page 13
20 Pre-Installation Section The Server Setup screen is displayed. Fill in the Primary SMTP Gateway and Port. If available, fill in the Secondary SMTP Gateway and Port. Provide a default subject and message. The Reply Address is not necessary since it will be set to the logged in user s address. 4. Review any of the other settings and then click Submit. 3.4 Address Book Setup The Address Book Setup serves as the default LDAP setup for the MFP. Configuring this allows for searching the global address book when sending an and allows the PKI Applications to lookup information such as the home directory of the logged in user. Version Page 14
21 1. Click Configuration and then click Network/Ports. 2. Click Address Book Setup. Version Page 15
22 Pre-Installation Section 2.5, items The Address Book Setup page is displayed. The following fields need to be filled in: Field Corresponding Pre-Installation Guide Section 4.2 Item Server Address Item 1 (Use the hostname rather than the IP address) Server Port Item 2 Use SSL/TLS Item 3 LDAP Certificate Validation Item 4 Use GSSAPI Not used; leave unchecked. Mail Attribute Item 6 Fax Number Attribute Not used; leave the default value. Search Base Item 5 Search Timeout Item 7 Displayed Name This is the combination of LDAP attributes used to display the friendly name for the address. The default value of longest cn or (givenname + sn) is usually ok. Max Search Results Item 8 4. Click Submit once all answers have been provided. Version Page 16
23 Pre-Installation Section 2.5, item 8 5. If using the user s credentials to connect to the LDAP server, no other changes are necessary. If connecting anonymously or using a service account, then return to the Address Book Setup Screen and click MFP Credentials. Version Page 17
24 Pre-Installation Section 2.5, item 8 6. The MFP Credentials page is displayed. If connecting anonymously, check the Anonymous LDAP Bind. If connecting using a service account, uncheck the Anonymous LDAP Bind option and provide the MFP s Distinguished Name and Password. The Kerberos settings are not used. Click Submit. 3.5 Auto-Logout 1. Click Configuration and then click Security. Version Page 18
25 Pre-Installation Section Set the Auto Log out delay value. 3. Click Submit. Pre-Installation Sections 2.5 item 3, , 8.1, 8.2, & Certificate Management Certificates are needed for SSL support in LDAP lookups and for Domain Controller verification. All certificates needed by the device must be in PEM (Base64) format and combined into one file. Since the certificates are in PEM format, they can easily be cut-andpaste into a single file such as: -----BEGIN CERTIFICATE----- MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs l3dtbpe0mnibtq0iwqkeavne1vvadt52ispeqyevwguchd16rfy+soncaq== -----END CERTIFICATE BEGIN CERTIFICATE----- MIIE1zCCA7+gAwIBAgIQZWAEBZ+h+L5AKmbyl9hgSzANBgkqhkiG9w0BAQUFADBn l3dtbpe0mnibtq0iwqkeavne1vvadt52ispeqyevwguchd16rfy+soncaq== -----END CERTIFICATE----- Version Page 19
26 1. Click Configuration and then click Security. 2. Click Certificate Management. Version Page 20
27 3. Click Install a New Certificate Authority Certificate. 4. Browse to the file containing the certificates and then click Submit. Version Page 21
28 4 Configuring PKI/AD Authentication This application is required for the PKI-enabled MFP. This section details the configuration steps. 1. Click Configuration and then click Embedded Solutions. Version Page 22
29 2. Select the PKI/AD Authentication solution by clicking its name. 4.1 General Settings After selecting PKI/AD Authentication from the Embedded Solutions list, click the Configure tab. Version Page 23
30 The following table lists each setting and the corresponding Pre-Installation Section/Item that contains the value needed for that field. Setting Corresponding Pre-Installation Guide Section/Item User Validation Mode Section 3.2 DC Validation Mode Section OCSP Responder URL Section Item 1 The format should be Separate multiple URLs with a comma. OCSP Proxy URL Section Item 2 The format should be Only one value is allowed. OCSP Responder Certificate Section Item 4 OCSP Responder Timeout Section Item 3 Use MFP Kerberos Setup Section Item 2 If One Kerberos Realm is selected, uncheck this box; the next three settings should be filled in. Otherwise, check this box and the following three settings are not needed. Kerberos Realm Section Item 2 Kerbeos KDC Section Item 1 If there are multiple KDCs, enter them all here separated by a comma. Kerberos Domain The default value of mil,.mil should be sufficient. If Manual Login is allowed, other values may be needed Version Page 24
31 here. Disable Reverse DNS Lookups Section Item 3 Use KDC for LDAP Server Section Item 4 Login Screen Text Section Item 1 Login Screen Image Section Item 2 Logout Behavior Section Allow Copy Without Card Section Allow Fax Without Card Section Logon Type Section Manual Login Default Domain Section Item 1 This domain should be added to the Kerberos Domains listed above. Manual Login Search Attribute Section Item 2 Manual Login Code Page Section Item 3 Display MFP Info Section Display Printer Status Section MFP Default Card Lookup Section Item 1 Field MFP Default Search Attribute Section Item 2 Enable User Authorization Section 3.3 Item 1 User Authorization Lookup Section 3.3 Item 2 Device Authorization Section 3.3 Item 3 Authorization List Section 3.3 Item 4 Version Page 25
32 4.2 Custom LDAP Settings If you have defined a custom LDAP configuration that differs from the MFP s Default LDAP Configuration, continue with this section; otherwise, it can be skipped. After selecting PKI/AD Authentication from the Embedded Solutions list, click the LDAP Configuration tab. Version Page 26
33 4.2.1 Adding a New Configuration 1. Click New to create a new LDAP Configuration. Version Page 27
34 2. The LDAP Configuration page is displayed. Referring to section 7 of the Pre-Installation Guide, use the following table to configure the settings. 3. Setting Configuration Use KDC for LDAP Server Item 1 Server Address Item 2 Server Port Item 3 Use SSL/TLS Item 4 LDAP Certificate Validation Item 5 Card Lookup Field Item 6 Search Attribute Item 7 Corresponding Pre-Installation Guide Section/Item Configuration 1 uses Section 8.1; Configuration 2 uses Section 8.2; Configuration 3 uses Section 8.3 Version Page 28
35 Search Base Item 8 Authentication Item 9 MFP Distinquished Name Item 9 Only Used if Authentication is set to MFP User ID. MFP Password Item 9 Only Used if Authentication is set to MFP User ID. 4. Click Apply. 5. Repeat for each custom configuration that needs to be created. A maximum of three configurations can be created; and each must be named a different configuration Editing an Existing Configuration 1. Click the name of the Configuration to be edited. 2. The LDAP Configuration page for that configuration will be displayed. 3. Make any changes and then click Apply. Version Page 29
36 4.2.3 Removing an Existing Configuration 1. Check the box next to the configuration to be removed. 2. Click the Remove button. Version Page 30
37 5 Configuring PKI/AD Standard Applications This application is only used if User Authorization is enabled for Copy, Fax, or FTP. You can skip this section if this application has not been installed. 1. Click Configuration and then click Embedded Solutions. Version Page 31
38 2. Select the PKI/AD Standard Apps solution by clicking its name. Version Page 32
39 3. Click the Configure Tab. 4. The following table lists each setting and the corresponding Pre-Installation Section/Item that contains the value needed for that field. Setting Corresponding Pre-Installation Guide Section/Item Copy Authorization Section 4.1 Item 1 Copy Authorization List Section 4.1 Item 2 Fax Authorization Section 4.2 Item 1 Fax Authorization List Section 4.2 Item 2 FTP Authorization Section 4.3 Item 1 FTP Authorization List Section 4.3 Item 2 Version Page 33
40 6 Configuring PKI/AD This application is only used if Scan to is enabled. You can skip this section if this application has not been installed. 1. Click Configuration and then click Embedded Solutions. Version Page 34
41 2. Select the PKI/AD solution by clicking its name. Version Page 35
42 3. Click the Configure Tab. 4. The following table lists each setting and the corresponding Pre-Installation Section/Item that contains the value needed for that field. Setting Corresponding Pre-Installation Guide Section/Item Authorization Section 5.1 Item 1 Authorization List Section 5.1 Item 2 SMTP Server Authentication Section 5.2 Item 2 Device Userid Section 5.2 Item 2 Only used if Authentication set to Device Device Password Section 5.2 Item 2 Only used if Authentication set to Device User Can Change Subject Section 5.3 Item 1 User Can Change Message Section 5.3 Item 2 User Can Change Scan Options Section 5.3 Item 3 User Can Send Multiple s Section 5.3 Item 4 From Address Section 5.4 LDAP-From Address If Card Address is chosen, this option is not used; otherwise, see Section Item 2` To Address Section 5.5 Item 1 Limit Destinations Section 5.5 Item 2 Send To User Section 5.5 Item 3 Address Book Lookup Section 5.5 Item 4 Version Page 36
43 Sign Section Item 1 Encrypt Section Item 1 Require to be Signed or Section (after table) Encrypted Signing Method Section Item 2 Signing Algorithm SHA1 only algorithm currently supported Non-Repudiation Required for Section Item 3 Signing Sign and Encrypt Method Section Item 2 Encryption Algorithm Triple DES only algorithm currently supported LDAP Primary Certificate Section Item 3 LDAP Alternate Certificate Section Item 3 Version Page 37
44 7 Configuring PKI/AD Scan to Network This application is only used if Scan to Network is enabled. You can skip this section if this application has not been installed. 1. Click Configuration and then click Embedded Solutions. Version Page 38
45 2. Select the PKI/AD Scan To Network solution by clicking its name. 7.1 General Settings After selecting PKI/AD Scan To Network from the Embedded Solutions list, click the Configure tab. Version Page 39
46 The following table lists each setting and the corresponding Pre-Installation Section/Item that contains the value needed for that field. Setting Corresponding Pre-Installation Guide Section/Item Button Text Section 6.1 Item 1 Up Icon To use a different icon, contact Lexmark to get a blank button to be used as the base. Down Icon To use a different icon, contact Lexmark to get a blank button to be used as the base. Scan To Network Authorization Section 6.1 Item 2 Authorization List Section 6.1 Item 3 Version Page 40
47 7.2 Fileshare Settings After selecting PKI/AD Scan To Network from the Embedded Solutions list, click the File Shares tab to define one or more fileshares that users can access. At least one fileshare must be defined or the user will see an error that this feature has not yet been configured. Version Page 41
48 7.2.1 Adding a New Fileshare 1. Click New to create a new Fileshare. Version Page 42
49 2. The Fileshare Configuration page is displayed. 3. Use the following table to configure the settings. Setting Corresponding Pre-Installation Guide Section/Item File Share Authorization Section 6.2 Item 1 Authorization list Section 6.2 Item 2 Display Name Section 6.2 Item 3 UNC Path Section 6.2 Item 4 Replacement Value If the UNC Path does not have a %u, this setting can be skipped; otherwise, see Section 6.2 Item 5 Replacement Lookup If the Replacement Value is not LDAP Lookup, this setting can be skipped; otherwise see Section 6.2 Item 5 LDAP Replacement Attribute If the Replacement Value is not LDAP Lookup, this setting can be skipped; otherwise see Section 6.2 Item 5 Default Filename Section 6.2 Item 6 Allow User to Rename File Section 6.2 Item 7 Append Timestamp to Filename Section 6.2 Item 8 Version Page 43
50 Remove $ from Fileshare Section 6.2 Item 9 Name Create Directory Section 6.2 Item Click Apply. 5. Repeat for each fileshare that needs to be created. There is no limit to the number of fileshares that can be created Editing an Existing Fileshare 1. Click the name of the Fileshare to be edited. 2. The Fileshare Configuration page for that configuration will be displayed. 3. Make any changes and then click Apply. Version Page 44
51 7.2.3 Removing an Existing Fileshare 1. Check the box next to the fileshare to be removed. 2. Click the Remove button. Version Page 45
52 8 Troubleshooting This section details some of the common issues that occur when setting up the PKI-enabled MFP. Please review these and possible causes/resolutions prior to contacting the Lexmark Solutions HelpDesk. 8.1 Login Issues Error Message/Symptom Unsupported USB Device MFP is at the Welcome Screen and not locked out Possible Cause/Resolution Cause: A supported SmartCard reader has been installed prior to the PKI firmware and applications being installed. Resolution: Remove the reader and complete section 2 of this guide. The reader cannot be installed until the firmware and applications have been installed. Cause: A non-supported SmartCard reader is attached. Only the OmniKey reader shipped with the MFP is supported. Resolution: Removed the unsupported reader and attach the OmniKey reader. Cause: The SmartCard Driver or PKI/AD Authenticatin solution is not installed. Resolution: Perform step 1 in section 2.2. Look at the list of installed solutions. If the SmartCard Driver is not installed, complete section 2.2. If the PKI/AD Authentication solution is not installed, complete section 2.3. Login screen does not appear when the card is inserted Cause: The SmartCard Driver solution is not running. Resolution: Perform step 1 in section 2.2. Look at the list of installed solutions. If the SmartCard Driver status is not Running, check the box next to that solution and click Start. Cause: The PKI/AD Authentication solution is not running. Resolution: Perform step 1 in section 2.2. Look at the list of installed solutions. If the PKI/AD Authentication solution status is not Running, check the box next to that solution and click Start. Cause: The card is not recognized by the reader. Resolution: Contact Lexmark Solutions HelpDesk for further assistance. KDC and MFP clocks are different Cause: The date and time on MFP are not within 5 Version Page 46
53 beyond an acceptable range; check the MFP's date and time. Kerberos configuration file has not been uploaded. The Domain Controller Issuing Certificate has not been installed. The Domain Controller Issuing Certificate ( name of certificate ) has not been installed. The KDC did not respond within the required time. minutes of each other. Resolution: Verify the date and time on the MFP; see section 3.1. Be sure the time zone and daylight savings time settings are correct. Cause: The PKI/AD Authentication solution is configured to use the MFP Kerberos setup but no Kerberos file was uploaded. Resolution: See section 4.1 If the Kerberos settings are provided in the PKI/AD Authentication are provided in the settings, uncheck the Use MFP Kerberos Setup checkbox and click apply. Resolution: If a Kerberos file really needs to be used, click Configuration Security Kerberos Setup. Browse to the Kerberos file and click submit. A reboot will be required. Cause: No certificate has been installed on the MFP. Resolution: See section 3.6. If you install the wrong certificate, the error message on the device will provide the name of the certificate needed. Cause: The certificate specified in the error message is needed to validate the domain controller. Resolution: See the PKI Pre-Installation Guide for information on obtaining the certificate. See section 3.6 for information on installing the certificate. Cause: The hostname or IP address of the KDC is not correct. Resolution: Verify the hostname or IP address and check against the value in the PKI/AD Authentication solution or Kerberos file. Cause: The KDC is not currently available. Resolution: Multiple KDCs can be specified in the PKI/AD Authentication solution or Kerberos file; this will typically resolve this issue. User's Realm was not found in the Kerberos Configuration File. Cause: Port 88 is blocked by a firewall. Resolution: This is the Kerberos Port and is used by the MFP to communicate with the KDC. The port must be opened between the MFP and KDC in order for authentication to work. Cause: This error occurs during a manual login and indicates the Windows domain is not specified in the Kerberos Configuration file. Resolution: If using the PKI/AD Authentication solution for the Kerberos settings, add the Version Page 47
54 Realm on the card was not found in the Kerberos Configuration File. Client ( name ) unknown. Login hangs for a long time at Getting User Info User is almost immediately logged out after logging in. Windows domain in lower case to the Kerberos Domain setting. For example, if the user s domain is x.y.z, set the Kerberos Domain to mil,.mil.x.y.z. Resolution: If using a Kerberos Configuration File, add a mapping to the domain_realm section, the maps from the lower case windows domain to the uppercase realm similar to the existing mapping for the mil domain. Cause: This error occurs during a card login and indicates the Kerberos Realm referred to does not exist in the Kerberos Configuration File. Resolution: The PKI/AD Authentication solutions Kerberos settings cannot be used to support multiple Kerberos Realms. Refer to the PKI Pre- Installation Guide for creating a Kerberos Configuration File. Resolution: A Kerberos Configuration File is already being used; the realms section of the configuration file needs to be updated to include the missing realm. Cause: The KDC being used to authenticate the user does not know the User Principal Name ( @mil) specified in the error message. Resolution: Verify the KDC specified in the Kerberos settings is the correct one to be using. Cause: The LDAP lookup is taking a long time to complete. Resolution: See the LDAP Troubleshooting section below. Cause: The Auto Log-Out timeout is set too short. Resolution: See section 3.5 to configure this setting. 8.2 LDAP Issues Error Message/Symptom LDAP lookups (at Getting User Info during login or searching the address book) take a long time and then fail Possible Cause/Resolution Cause: The user s credentials are being used to connect to the LDAP server but the hostname for the LDAP server was not used. Resolution: When the user s credentials are used to connect to the LDAP server, the hostname of the LDAP server must be used instead of the IP address. Check the LDAP configuration. Cause: Port 389 (non-ssl) or Port 636 (SSL) is Version Page 48
55 blocked by a firewall. Resolution: These ports are used by the MFP to communicate with the LDAP Server and must be open in order for LDAP lookups to work. Cause: Reverse DNS lookup are disabled on the network. Resolution: The MFP uses reverse DNS lookups to verify IP addresses. If these lookups are disabled on the network, check the Disable Reverse DNS Lookups option in the PKI/AD Authentication solution settings. LDAP lookups (searching address book, getting user s address, getting user s home directory) fail almost immediately Cause: The LDAP search base is too broad in scope Resolution: Narrow the LDAP search base to the lowest possible scope that will include all necessary users. Cause: The user s credentials are being used to connect to the LDAP server but IP address for the LDAP server was used. Resolution: When the user s credentials are used to connect to the LDAP server, the hostname of the LDAP server must be used instead of the IP address. Cause: Port 389 is being used but the LDAP Server requires SSL to be used. Resolution: Change the LDAP Port to 636; check the Use SSL/TLS checkbox; change the LDAP Certificate Verification to Never. Cause: The LDAP search base is incorrect. Resolution: Correct the LDAP search base to be the lowest possible scope that will include all necessary users. Cause: The LDAP attribute being searched for is not correct. Resolution: Verify the LDAP attributes for addresses and/or the user s home directory is correct. Version Page 49
56 8.3 Scan To Issues Error Message/Symptom cannot be sent because an error occurred trying to get your address. cannot be sent because you are not authorized to perform this function. The cannot be sent because a valid digital signature could not be found on your card. The cannot be sent because it cannot be digitally signed when a manual login is performed. cannot be sent. Unable to find valid encryption certificate for address. Unable to send . Possible Cause/Resolution Cause: Using manual login and the From Address is configured to come from the card. Resolution: If manual login is allowed, the From Address must come from LDAP since a card may not (or can not) be used. Modify the PKI/AD settings to get the From Address from LDAP. Cause: The LDAP lookup failed. Resolution: See section 8.2 above. Cause: User authorization is enabled for and the user is not in an Active Directory group that is authorized to use this function. Resolution: This is not an error; if this user needs access to , the authorization list needs to be expanded to include an Active Directory group that includes this user. Cause: The user is required or chose to digitally sign the but a certificate valid for signing s was not found on the card. Resolution: An can only be signed if a certificate valid for signing is on the card. By default, the non-repudiation option is required for the signing certificate. If your certificates do not have this, this can be disabled in the PKI/AD solution settings. Cause: s can only be digitially signed if the user logs in with a card. Resolution: Set the signing option in the PKI/AD solution settings to Disabled or Prompt User; instruct users that perform a manual login to not choose the signing option. Cause: The encryption certificate for the specified address was not found in the LDAP Directory specified by the Address Book Lookup in the PKI/AD solution settings. Resolution: The encryption certificate is required for each recipient of the . Encrypted s can only be sent to those recipients that are in the global address book. Cause: SMTP Server Authentication is set to Anonymous but the SMTP Server only allows an authenticated user to send . Version Page 50
57 Resolution: Change the SMTP Server Authentication option in the PKI/AD solution settings to User Credentials. Resolution: Add the IP Address of the MFP as an SMTP Relay. Cause: SMTP Server Authentication is set to User Credentials but the SMTP Server was specified used an IP Address. Resolution: In order to use the User Credentials for sending , the SMTP Server must be specified using the hostname. See section 3.3. Cause: SMTP Server Authentication is set to User Credentials but the SMTP Server reports GSSAPI is not supported. Resolution: Change the SMTP Server Authentication option in the PKI/AD solution settings to Anonymous. Cause: Port 25 is blocked so the MFP is unable to connect to the SMTP server. Resolution: Access to port 25 is required in order for the MFP to communicate with the SMTP Server. 8.4 Scan To Network Issues Error Message/Symptom You are not authorized to use this feature. This feature is not available because no fileshares have been configured by the system administrator. This feature is not available because you are not authorized to scan to any of the available file shares. Possible Cause/Resolution Cause: User authorization is enabled for Scan To Network and the user is not in an Active Directory group that is authorized to use this function. Resolution: This is not an error; if this user needs access to Scan to Network, the authorization list needs to be expanded to include an Active Directory group that includes this user. Cause: The PKI/AD Scan to Network solution has been installed but no Fileshare destinations have been defined. Resolution: See section for adding fileshares. Cause: All fileshares that have been defined have user authorization enabled and this user is not in Active Directory group that is authorized for any of the defined shares. Resolution: This is not an error; if this user needs Version Page 51
58 An LDAP error occurred trying to retrieve the selected file share destination. No UNC Path has been defined for this destination. The scanned file size and saved file size do not match. User does not have read access to the file share; unable to verify the file size. Invalid filename specified. An error occurred connecting or writing to the File Share. access to any of the defined fileshares, the authorization list for the fileshare needs to be expanded to include an Active Directory group that includes this user. Cause: The LDAP lookup failed. Resolution: See section 8.2 above. Cause: The LDAP lookup succeeded but the attribute chosen for the replacement value does not exist or has no value. Resolution: See section for editing an existing fileshare. Cause: The UNC Path option for the Fileshare was not defined. Resolution: See section for editing an existing fileshare. Cause: After the file is scanned, the number of bytes scanned is compared to size of the file written, and they are not the same. Resolution: This typically means the fileshare is full or the user has reached their disk quota. Check the free space / disk quota on the fileshare. Cause: After the file is scanned, the number of bytes scanned is compared to the size of the file written to insure no error occurred. The user does not have read access to the fileshare so the file size cannot be determined. Resolution: The user needs to be given read access to the fileshare. Cause: An invalid character was included as part of the filename provided by the user. Resolution: The user cannot include the following characters in the filename:, <, >, \, /, *,?, ;, :, or ^. Cause: The UNC Path used the IP address of the file server. Resolution: In order to connect to the fileshare using the user s credentials, the hostname of the file server must be used. See section for editing an existing fileshare. Cause: The hostname of the file server could not be resolved to an IP Address. Version Page 52
59 Resolution: If the hostname was not a fully qualified domain name, then MFP has to use its domain search order to determine the appropriate domain name to append to the hostname. See section 3.2 item 3. The network share name does not exist on the specified file server. Cause: Port 445 is blocked by a firewall. Resolution: The MFP uses port 445 to communicate with the file server and transfer the file. This port must be open in order to use Scan to Network. Cause: The MFP connected to the file server but the share name does not exist. Resolution: Verify the share name is correct and that the user has read/write access to that share. Cause: The share name is correct but ends in a $. Resolution: Toggle the Remove $ from fileshare name setting available in the fileshare configuration. See section for editing an existing fileshare. Version Page 53
60 - Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries Lexmark International, Inc. 740 West New Circle Road Lexington, KY Version Page 54
Secure E-mail. Administrator's Guide
Secure E-mail Administrator's Guide January 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring Secure E-mail...4 Configuring printer settings for use with the application...4 Configuring
PKI-Enabled Device. Installation and Configuration Guide
PKI-Enabled Device Installation and Configuration Guide February 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States
MyShortcut. Administrator's Guide
MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
Smart Card Authentication Client. Administrator's Guide
Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Scan to Network and Scan to Network Premium. Administrator's Guide
Scan to Network and Scan to Network Premium Administrator's Guide March 2015 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring a destination...4 Configuring destination
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
CAC/PIV PKI Solution Installation Survey & Checklist
CAC/PIV PKI Solution Installation Survey & Checklist Konica Minolta CAC/PIV Solution Revision: 1.3 Date: 10/19/09 1 Document Overview This document must be completed and used as a checklist or questionnaire
Downtime Reports. Administrator's Guide
Downtime Reports Administrator's Guide November 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Downtime Reports...4 Configuring a source report folder...4 Customizing the application
Secure Held Print Jobs. Administrator's Guide
Secure Held Print Jobs Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Secure Held Print Jobs...4 Configuring and securing the application...4 Using Secure
Google Drive. Administrator's Guide
Google Drive Administrator's Guide November 2015 www.lexmark.com Contents 2 Contents Overview... 3 Configuring the application...4 Acquiring a Google account... 4 Accessing the configuration page for the
Manage Address Book. Administrator's Guide
Manage Address Book Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Using Manage Address Book...4 Setting up access control from the application...4 Exporting contacts...4
Scan to SharePoint. Administrator's Guide
Scan to SharePoint Administrator's Guide August 2015 www.lexmark.com Contents 2 Contents Overview... 4 Deployment readiness checklist...5 Configuring the SharePoint server settings...7 Enabling authentication
Contents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
Web Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
Scan to Network and Scan to Network Premium
Scan to Network and Scan to Network Premium Administrator's Guide Important: This guide is intended for MX6500e. March 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Scan to Network...4
System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation
Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
HP Access Control Smartcard Solution
HP Access Control Smartcard for U. S. Government Administrator s Guide HP Access Control Smartcard for U.S. Government Administrator's Guide Copyright information 2009 Copyright Hewlett-Packard Development
ADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
Embedded Web Server. Administrator's Guide
Embedded Web Server Administrator's Guide February 2009 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other
HTTP Client Installation Guide Version 9
HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
Print Management. User's Guide
Print Management User's Guide November 2014 www.lexmark.com Contents 2 Contents Overview...3 Performing user authentication...4 Using standard authentication...4 Using Single Sign On authentication...4
Radius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
Google Cloud Print. Administrator's Guide
Google Cloud Print Administrator's Guide October 2014 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Acquiring a Google account...4 Accessing the configuration page for
Local Printer Management Agent. Administrator's Guide
Local Printer Management Agent Administrator's Guide October 2015 www.lexmark.com Contents 2 Contents Overview... 3 Getting started... 4 Supported Microsoft Windows and Mac operating systems... 4 Installing
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
Google Docs Print. Administrator's Guide
Google Docs Print Administrator's Guide October 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Google Docs...4 Acquiring a Google account...4 Customizing the application icon...4 Configuring
FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0
Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,
Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide
Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS. User Management Guide
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS User Management Guide SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING TERMS AND CONDITIONS
empower Authentication Manual, Version 3.7
empower Authentication Manual, Version 3.7 i Copyright 2002 Ektron, Inc. All rights reserved. EKTRON is a registered trademark of Ektron, Inc. Version 3.7, February, 2002 empower Authentication Manual,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com
CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of
Virtual LoadMaster for Microsoft Hyper-V
Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright
RSA Two Factor Authentication. Feature Description
RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
Installing the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
Shrew Soft VPN Client Configuration for GTA Firewalls
Shrew Soft VPN Client Configuration for GTA Firewalls ShrewVPN201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected]
Synology NAS Server Windows ADS FAQ 2008-11-14
Synology NAS Server Windows ADS FAQ 2008-11-14 2008-11-14 2008 Synology Inc. All Rights Reserved. 1 Synology Inc. 2008 Synology Inc. All rights reserved. No part of this publication may be reproduced,
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
User Guide for Paros v2.x
Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping
Installation Supplement and Administrator Guide
Common Criteria Installation Supplement and Administrator Guide November 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the
Scan to Network and Scan to Network Premium
Scan to Network and Scan to Network Premium Administrator's Guide December 2009 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the
Cyberoam IPSec VPN Client Configuration Guide Version 4
Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time
Simple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
Smart Card Installation and Configuration Guide
Version 3.0 October 2014 Smart Card Installation and Configuration Guide (CAC/PIV/.Net/Access Client & Rijkspas) Xerox WorkCentre 3655 Multifunction Printer Xerox WorkCentre 5845/5855/5865/5875/5890 Multifunction
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
910 Series Photo Jetprinter. Setup Solutions
910 Series Photo Jetprinter Setup Solutions Edition: September 2004 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC.,
Installation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
High Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts
Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
Installing the IPSecuritas IPSec Client
Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
InQFlow. Administrator Guide. Copyright @ March 2009 Constellation HomeBuilder Systems, Inc. All right reserved
Administrator Guide Copyright @ March 2009 Constellation HomeBuilder Systems, Inc. All right reserved Product and Company Information Product and Company Information The information in this document is
Administration guide. Océ LF Systems. Connectivity information for Scan-to-File
Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form
BES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3
IPSec VPN Client Installation Guide. Version 4
IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers
InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
LDAP Operation Guide
LDAP Operation Guide (Lightweight Directory Access Protocol) To find basic information about network and advanced network features of your Brother machine: See the uu Network User's Guide. To download
IPInfoDB Web Service Agreement
IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE
[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski [email protected]
Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski [email protected] All rights reserved. Redistribution
Authentication Unit AU-211P User s Guide
Authentication Unit AU-11P User s Guide Ver. 1. Contents Contents Contents... 1 1 Introduction... 4 1.1 Safety Information... 5 Getting Started... 8.1 Product Overview... 8. Part names and their functions...
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
MDM Zinc 3.0 End User License Agreement (EULA)
MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA
How to install Artologik HelpDesk 3
How to install Artologik HelpDesk 3 --------------------------------------------------------------------------- WARNING: This program is protected by copyright law and international treaties. Unauthorized
Network Scan Driver. User's Guide
Network Scan Driver User's Guide January 2011 www.lexmark.com Edition notice January 2011 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK
Copy Tool For Dynamics CRM 2013
Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.
READYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
Mobile Printing. User's Guide
Mobile Printing User's Guide December 2015 www.lexmark.com Contents 2 Contents Change history... 4 Overview... 5 Lexmark Mobile Printing Application...6 Getting started...6 System requirements...6 Installing
BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0.3. Release Notes
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0.3 Release Notes Published: 2013-11-21 SWD-20131121133951605 Contents 1 Fixed issues...4 2 Known issues...5 3 Legal notice...8 Fixed issues
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Google Cloud Print Setup. User s Guide
Google Cloud Print Setup User s Guide [INDEX] 1. Before Use... 3 1-1. Settings for Enabling Local Printing... 3 1-1-1. Bonjour Settings... 3 1-1-2. SSL Settings for WebDAV Server Funtion... 3 1-1-3. Quick
Ipswitch WS_FTP Server
Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
RSA Two Factor Authentication
RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..
BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY
im5530 / im6030 / im7230 / im8530 For Océ and Imagistics Models
Océ Scanning Guide im5530 / im6030 / im7230 / im8530 For Océ and Imagistics Models SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING
