
CAUTION: Use caution when changing the 802.1X authentication settings. You might lose the connection. If
communication with the device is lost, you might need to reset the device server to a factory-default state, and
then reinstall the device.
For most 802.1X networks, the infrastructure components, such as LAN switches, must use 802.1X protocols to
control a port's access to the network. If these ports do not allow partial or guest access, you might need to
congure the print server with the 802.1X parameters prior to connecting to the network. To congure the initial
802.1X settings before connecting to the network, you can use an isolated LAN or a direct computer connection
using a crossover cable. The supported 802.1X authentication protocols and associated conguration depend on
the print server model and rmware version.
Use the following steps to congure this option:
1. Select the supported protocols that are used for 802.1X authentication on the network.
●
PEAP (congure certicate rst): Protected Extensible Authentication Protocol (PEAP) uses digital
certicates for network server authentication and passwords for client authentication. PEAP requires
an EAP user name, EAP password, and Certicate Authority (CA) certicate. Dynamic encryption keys
are also used.
●
EAP-TLS (congure certicate rst): Extensible Authentication Protocol using Transport Layer Security
(EAP-TLS) is a mutual authentication protocol based on digital certicates for authentication of the
client and network server. EAP-TLS requires an EAP user name, HP Jetdirect certicate, and CA
certicate. Dynamic encryption keys are also used.
2. In the User name text box, enter the EAP/802.1X user name for the device (maximum of 128 characters).
The default user name is the default hostname of the print server, NPIxxxxxx, where xxxxxx is the last six
digits of the LAN hardware (MAC) address.
3. In the Password text box, enter the EAP/802.1X password for the device (maximum of 128 characters).
4. In the Conrm password text box, enter the password again.
5. In the Server ID text box, enter the server ID that identies and validates the authentication server. The
server ID is specied on the digital certicate that a trusted CA issued for the authentication server.
NOTE: If the Require Exact Match checkbox is not selected, you can specify any string for the server ID.
6. To validate the server ID that is specied in the Server ID box against the server ID that is specied in the
digital certicate issued by the CA for the authentication server, select the Require Exact Match checkbox.
7. In the On Authentication Failure section, select one of the following options:
●
Connect Anyway (802.1x Fail-over): If this option is selected and the 802.1X authentication settings
are applied to an unsecured port, the device does not lose connectivity if you do not change from an
unsecured port to a secured port on the device. The device connectivity functions without 802.1X
authentication.
●
Block Network (Secure failure): If this option is selected and the 802.1X authentication settings are
applied to an unsecured port, the device enters a communication error status if you do not change
from an unsecured port to a secured port on the device. To return the device to a ready state, change
to a secured port on the device.
8. From the Encryption strength list, select the level of encryption for the selected protocols.
Federal Information Processing Standard (FIPS) supports only the High encryption strength. To congure
the encryption strength when FIPS mode is enabled on the device, you must specify the High encryption
strength. If you specify the Low or Medium encryption strength, the conguration fails.
9. To initialize the port, select the Re-authenticate on apply checkbox. The device re-authenticates the 802.1X
settings after they are applied.
414 Chapter 6 Device Conguration Options ENWW
Comentarios a estos manuales