Table 4-16 Certificate configuration screens (continued)
●Import an HP Jetdirect certificate and private key. When imported, the existing certificate and private key are overwritten.
The file format must be PKCS#12 encoded (.pfx).
To import a certificate and private key, specify the name and path of the file that contains the certificate and private key. Or, click Browse to browse your system for the file. Then enter the password that was used to encrypt the private key.
Click Finish to complete the installation.
Export the HP Jetdirect certificate and private key screen. Export the installed HP Jetdirect certificate and private key to a file.
●To export a certificate and private key, enter a password to use to encrypt the private key. Enter the password again to confirm it. Then click Save As to save the certificate and private key in a file on your system. The file format is PKCS#12 encoded (.pfx).
Access Control
Use this tab to display the access control list (ACL) on the HP Jetdirect print server. An ACL (or host access list) specifies individual host systems, or networks of host systems, that are allowed to access the print server and the attached network device. You can add up to 10 entries. If the list is empty (no hosts are listed), any supported system can access the print server.
NOTE: Not all print servers or devices support ACL, and support is limited to IPv4 networks. For improved security and performance, use the IPsec/Firewall feature (if available) instead of ACL.
By default, hosts with HTTP connections (such as, the HP Embedded Web Server or IPP) can access the print server regardless of access control list entries. To disable HTTP host access, clear the Allow Web Server (HTTP) access check box at the bottom of the list.
CAUTION: You can lose communication with the HP Jetdirect print server if your system is not properly specified in the list, or access via HTTP is disabled.
To use the access control list as a security feature, see Security features (V.45.xx.nn.xx) on page 121.
Specify host systems by their IPv4 address or network number. If the network contains subnets, you can use an address mask to identify whether the IP address entry designates an individual host system or a group of host systems.
Examples:
IP Address | Mask | Description |
|
|
|
192.0.0.0 | 255.0.0.0 | Allow all hosts with network number 192. |
|
|
|
192.1.0.0 | 255.1.0.0 | Allow all hosts on network 192, subnet 1. |
|
|
|
192.168.1.2 |
| Allow the host with IP address 192.168.1.2. The mask |
|
| 255.255.255.255 is assumed and is not required. |
|
|
|
To add an entry to the access control list, specify a host using the IP Address and Mask fields, select the Save check box, and then click Apply.
To delete an entry from the list, clear the Save check box for that entry, and then click Apply.
ENWW | Networking tab 97 |