System Log Server ..........................................................................................................................

347

System Name ..................................................................................................................................

347

TCP Idle Timeout .............................................................................................................................

348

TCP/IP Configuration Method .........................................................................................................

348

TCP/IP Domain Suffix ......................................................................................................................

348

Upload CA Certificate ......................................................................................................................

349

Upload Jetdirect Certificate ............................................................................................................

349

Web Services Print ..........................................................................................................................

349

WINS Server .....................................................................................................................................

349

Device Configuration Options for Security ........................................................................................................

350

802.1X Authentication ....................................................................................................................

351

Access Control for Device Functions ...............................................................................................

353

Access Control Level for Device Functions .....................................................................................

355

Access Control List ..........................................................................................................................

355

Authenticate LDAP and Kerberos Without Email ...........................................................................

356

Authentication Manager .................................................................................................................

356

Bootloader Password ......................................................................................................................

356

Color Access Control .......................................................................................................................

356

Color Access Control Level ..............................................................................................................

357

Control Panel Access .......................................................................................................................

358

Default Sign In Method ...................................................................................................................

358

Device Announcement Agent ..........................................................................................................

358

Device User Accounts ......................................................................................................................

359

Digital Sending Service ...................................................................................................................

359

Disable Direct Ports ........................................................................................................................

359

Display Color Usage Job Log Page On Information Tab .................................................................

359

Display Options on Information Tab ...............................................................................................

359

Embedded Web Server Password ...................................................................................................

360

Enable Host USB ..............................................................................................................................

360

Enable Secure PJL ...........................................................................................................................

360

Encrypt all web communication .....................................................................................................

360

Encryption Strength ........................................................................................................................

360

EWS Information Protection ...........................................................................................................

361

FIPS-140 Mode ................................................................................................................................

361

Get Community Name .....................................................................................................................

361

Group 1 PIN ......................................................................................................................................

362

Group 2 PIN ......................................................................................................................................

362

IPsec/Firewall Policy .......................................................................................................................

362

Kerberos Authentication .................................................................................................................

363

Accessing the Kerberos Authentication Server ............................................................

363

Accessing the LDAP Server ...........................................................................................

364

xxiv

ENWW