
Create device conguration templates for devices that have new or custom sign-in methods
Some devices have new or custom sign-in methods installed that are not available on the Access Control for
Device Functions conguration option. To create device conguration templates and congure this option for
these devices, perform the following steps:
1. From the device list, select a single device that has a custom sign-in method installed.
2. Click the Cong tab, expand the Security category, and then select the Access Control for Device Functions
conguration option.
3. Verify that the custom sign-in method appears in the Default sign in method list.
4. Specify the appropriate settings for the device.
5. Click the Apply button.
6. On the Conrm window, verify that the information is correct, and then click the Congure Devices button.
7. On the Results page, click the Done button.
Access Control Level for Device Functions
Use this conguration option to set the access control levels for the device. A dierent authentication method
and security level can be assigned to each device function. You can reduce costs and increase security by only
allowing users access to the minimum set of device functions necessary for your organization's operational
needs.
Use the following steps to congure this option:
1. Set the access control level for device functions:
●
Maximum: Require sign-in before any device features can be accessed.
●
Minimum: Allow unauthenticated access to all device features except Service Mode.
NOTE: If you selected Minimum, you do not need to dene permission sets.
●
Custom: Require sign-in for selected device features.
2. If you choose Maximum or Custom access control level, you need to dene one or more permission sets.
The permission sets control which device features a member of the dened group has access to. To create
a permission set, click Add and type the new permission set name in Permission set name and then dene
which functions should require signing.
3. After a permission set has been created, you can edit it; select the permission set in Permission sets and
then click Edit.
4. To delete a permission set, select the permission set in the Permission sets box and then click Delete.
Access Control List
An access control list (ACL) is used to specify the IP addresses on your network that are allowed access to the
device. The list supports up to 10 entries. If the list is empty, then any system is allowed access. By default, host
systems with HTTP connections (such as Web browser or Internet Printing Protocol connections) are allowed
access regardless of access control list entries. This allows hosts to access the device when Proxy Servers or
Network Address Translators are used. However, unltered access by HTTP hosts may be disabled by clearing
the Check ACL for HTTP check box.
ENWW Device Conguration Options for Security 417
Comentarios a estos manuales