6.13k likes | 6.29k Views
GW 2009 Autumn Controller Security Features. Full training module. GW2009A_Security_Features_full-ct_SOL_ppt_EN_1.0.a.ppt. Objectives. After completing this training you can: explain the security features of the GW2009 Autumn Controller (09A).
E N D
GW 2009 Autumn ControllerSecurity Features Full training module GW2009A_Security_Features_full-ct_SOL_ppt_EN_1.0.a.ppt
Objectives • After completing this training you can: • explain the security features of the GW2009 Autumn Controller (09A). • configure and demonstrate the controller features. • advise customers on when and how to use the controller security features. • troubleshoot controller security related problems.
Requirements • Training Materials • Machine (With GW2009 A Controller) • PC Workstation/ Server • Printer drivers & utilities • Access Point
This presentation Including the working example as available from: 8021x_Configuration.doc Service manuals Operating instructions Training materials
Pre-requisites and exam • Pre-requisites: • Basic Network Management • Basic LDAP • Exam: • Multiple choice
Module overview • Introduction • Authentication • GW Connectivity Security Features • Additional Security Features • Security Options
Introduction This presentation will cover the security features up to and including the GW2009 Autumn controller series.
Security features The goal of these security features are: Prevent unauthorized modification of settings. Prevent unauthorized machine use. Prevent information leaks.
Methods of security features (1/3) Prevent unauthorized modification of settings Access Control. Possibility to enable/disable each protocol. Administrator Authentication. Menu Protect. Advanced menu protect mode.
Methods of security features (2/3) Prevent unauthorized use: Prevent unauthorized use. Access Control. Enable/disable each protocol. IPP Authentication. User Authentication.
Methods of security features (3/3) Prevent information leaks: Assign access permissions to a stored file Access permission for document server Password Lock the document server file Prevent unauthorized transmission Designate a user as a sender Restrict the use of destinations Prevent adding of destination to address book Protect network transmissions SSL SNMP V3 Password encryption IPP authentication password Group Password for PDF Direct Print Driver encryption key Permit simple encryption for Windows 9x/Me Prevent unauthorized users from reading the address book Encrypt the address book Access permission of address book
Product line-up • The product line-up at the time of creating this material:
Overview 2.1 Administrator Authentication 2.2 User Authentication 2.3 User Text 2.4 Selective User Authentication 2.5 Selective Color Authentication
Administrator authentication Up to 4 types of administrators can be designated, to provide for a variety of security needs. These administrators al have their own privilege types, username and password. A supervisor account can be used to reset administrator passwords. Benefit of using Administrator Authentication: Avoid assigning excessive privileges to any one administrator. Enhanced security. Reduce the workload of each administrator.
MFP’s and LP’s The Administrator Authentication and User Authentication functions were previously only available on MFPs. From 06S onwards, these functions are available on printers as well. Note for printers: The authentication functions can only be configured via WIM. A HDD is required.
Administrator types Machine Administrator Network Administrator File Administrator User Administrator Supervisor
Administrator accounts 4 Administrator Accounts
Machine administrator Settings available to the Machine Administrator:
Network administrator Settings available to the Network Administrator:
File administrator Settings available to the File Administrator:
User administrator Settings available to the User Administrator:
Supervisor Settings available to Supervisor:
Administrator configuration (1/2) Step 1: Enable Administrator Authentication and choose which functions to manage. When Admin Authentication is switched on, Available Settings becomes visible. [Available Settings] are settings to which regular users are restricted. If an available setting is enabled, only the administrator will be privileged to use these settings.
Administrator configuration (2/2) Step 2: Register the Administrators. If [Change] is pressed under the Administrator name, a screen that can be used for configuring or changing User Name and Password is displayed. Administrator 1
Login Press the [User Tools] key. Press the [Login/ Logout] key. 2 1
Logout Press the [Login/ Logout] key.
Menu protect Menu Protect can be enabled by the Machine Administrator. This protects [User Tools/Counter] from unauthorized access. Copier / Document Server Printer Features Scanner Features The following 3 levels of security are available:
How to set Menu Protect “Menu Protect” is located under different tabs depending on the application.
Service mode lock With Service Mode Lock enabled, the SP and PP modes are locked and cannot be used. Only available when Administrator Authentication is enabled.
Practical work Exercise 1
Overview 2.2.1 Introduction to User Authentication 2.2.2 User Code Authentication 2.2.3 Basic Authentication 2.2.4 Windows Authentication 2.2.5 LDAP Authentication 2.2.6 Integration Server Authentication 2.2.7 Printer Job Authentication 2.2.8. Authentication Error Code
What is User Authentication? User authentication is an access control method. Users require a user code or a login name and password if they want to use the device. Administrator Authentication must be enabled before you can enable user Authentication. The exception is User Code Authentication. For User Code Authentication it is not required to enable Administrator Authentication.
Five types of authentication Local authentication: Authentication of users is based on the MFP address book. User Code Authentication. Basic Authentication. Server authentication: Authentication is performed by a server (Domain Controller, LDAP server, Integration Server). Windows Authentication. LDAP Authentication. Integration Server Authentication. The following slides will explain their functions and how to setup.
Data Carry-over Setting for Address Book Auto-program • With this user template function, you can configure the user-settings for the machine faster. • You can set one user template to the device. • All newly created accounts will default get the settings of the user template. • The selected user template is applied to accounts for users that have not logged onto the device before. • “Data Carry-over” is available from GW2009S controller. • The “Data Carry-over” is available when one of the following authentication methods is enabled: • Windows Authentication • LDAP Authentication • Integration Server Authentication • If another (or no) authentication is enabled, the functionality is hidden. • Enable it via the operation panel or WIM.
Configuration via the operation panel • You need user-administrator privileges to set this. • Set “Carry-over Data”. • Set the default user. (This users’ settings are used as template for newly created users.)
Configuration via Web Image Monitor • You need user-administrator privileges to set this. • Set it to On. • Set the default user. (This users’ settings are used as template for newly created users.)
Settings • The following settings are used from the user template: • Title • Group • E-mail Address information • Fax information • Folder information • Protection Code • SMTP Authentication • LDAP Authentication • Folder (SMB/FTP) authentication • ACL • Document access privileges • User Certificate • As of 09A User Certificates can no longer be added to the template.
What is User Code Authentication? The machine’s address book is used to authenticate users. Users must enter a user code before they can use a function of the device. User codes can also be used as a profile that can be shared by groups of users Copy, Print, Scan, Fax, Document Server
Requirements User codes must be registered in the address book. This can be done with: Operation Panel Web Image Monitor SmartDeviceMonitor for Admin Cannot be used in combination with other authentication methods like: Basic Authentication Windows Authentication LDAP Authentication Integration Server Authentication
Specifications Functions and settings to which access restriction can be applied:
Configuration Select User Code Authentication. Select the functions for which restriction is required. Register user accounts in the address book. Note: Printer Job Authentication will be explained in chapter 4.6
Authentication process - Copy Success 1. Enter the user code. 2. Compares the entered User Code to the address book. Failure
Authentication process - Print Can be used with PCL, RPCS and PS3 driver. Success : Print 3. Compares the entered User Code to the address book. 1. Enter the User Code. %-12345X@PJL Comment RPJL, WIN ::::::::::::::::::::::::::::: @PJL SET USERCODE=“12345678” 2. Print Failure