Lexmark CommonCriteriaGuide en
Lexmark CommonCriteriaGuide en
Contents
Change history.............................................................................................. 4
Overview and first steps.............................................................................. 5
Overview................................................................................................................................................................ 5
Physical configuration.........................................................................................................................................8
Troubleshooting.......................................................................................... 33
Login issues........................................................................................................................................................ 33
LDAP issues........................................................................................................................................................ 35
Secure Held Print Jobs issues....................................................................................................................... 36
Audit log.......................................................................................................38
Erasing keys in flash memory................................................................... 40
Notices.......................................................................................................... 41
Index............................................................................................................. 42
Change history 4
Change history
December 2022
• Added information on erasing keys in flash memory.
November 2022
• Updated the list of supported printers.
• Added information on the Lexmark Trusted Platform Module (TPM).
• Updated the information on preshared keys.
• Updated the steps on checking physical interfaces and installed firmware.
• Deleted the information on configuring printer hard disk encryption because hard disk encryption is now
automatic.
• Added information on disabling the Intelligent Storage Drive.
February 2018
• Added information on the following to conform to the Hard Copy Device Protection Profile:
– Updating firmware
– Configuring the time source settings
– Configuring the minimum password length
– Configuring login restrictions
– Password requirements for local accounts
– Setting up Internet Protocol Security (IPSec)
– Configuring the screen timeout
• Updated the list of supported printers.
October 2016
• Added information on the following:
– Disabling flash drive access
– Configuring print permissions
– Access controls and their required level of protection
May 2016
• Initial document release for multifunction products with a tablet-like touch‑screen display.
Overview and first steps 5
Supported printers
Multifunction products (MFPs)
• Lexmark CX622, without hard disk, with fax
• Lexmark CX622h, with hard disk and fax
• Lexmark CX625, without hard disk, with fax
• Lexmark CX625h, with hard disk and fax
• Lexmark CX730, without hard disk and fax
• Lexmark CX730, without hard disk, with fax
• Lexmark CX730, with hard disk, without fax
• Lexmark CX730, with hard disk and fax
• Lexmark CX735, without hard disk
• Lexmark CX735, with hard disk
• Lexmark CX820, with hard disk and fax
• Lexmark CX825, with hard disk and fax
• Lexmark CX860, with hard disk and fax
• Lexmark CX930, without hard disk and fax
• Lexmark CX930, without hard disk, with fax
• Lexmark CX930, with hard disk, without fax
• Lexmark CX930, with hard disk and fax
• Lexmark CX931, without hard disk and fax
• Lexmark CX931, without hard disk, with fax
• Lexmark CX931, with hard disk, without fax
• Lexmark CX931, with hard disk and fax
• Lexmark CX942, without hard disk, with fax
Overview and first steps 6
Operating environment
The instructions provided in this guide are based on the following assumptions and objectives:
• The printer is installed in a cooperative, nonhostile environment that is physically secured or monitored and
protected from unauthorized access to printer external interfaces.
• The administration platform and local area network are physically and logically secured.
Overview and first steps 7
• Authorized administrators are trained and capable of performing tasks related to the installation,
configuration, operation, and maintenance of the network environment. This includes—but is not limited to
—operating systems, network protocols, and security policies and procedures.
• Authorized administrators are trusted to use their access rights appropriately.
• Audit records exported from the printer to another trusted location are accessible to authorized personnel
for periodic review and are secured from unauthorized access.
• The operating environment can identify and authenticate users whose accounts are defined externally
(LDAP, Kerberos, and so on).
• When an administrator configures Network Time Protocol (NTP), the operating environment provides
reliable time stamps.
• Users are aware of and are trained to follow the security policies and procedures of their organization. Users
are authorized to use the printer according to these policies and procedures.
Touch Settings to access settings and configuration menus for the printer.
Notes:
• Access to printer menus may be restricted to administrators only.
• By default, the secured applications or functions are hidden from the printer home screen.
Overview and first steps 8
As you touch the letters and numbers, your selections appear in a corresponding field at the top of the screen.
The keyboard on the display may also contain other icons, such as Done, Next, or Submit.
To type a single uppercase or shift character, touch , and then touch the letter or number. To turn on Caps
Lock, double‑tap , and then continue typing. Caps Lock remains engaged until you touch it again.
Touch to delete a single character, or press and hold it to delete everything that you have typed.
Physical configuration
Updating firmware
1 From the Embedded Web Server, click Settings > Device > Update Firmware.
2 Browse to the required flash file.
3 Click Upload.
Note: For more information on updating the device firmware, contact your Lexmark representative.
Attaching a lock
Warning—Potential Damage: After a lock is attached, the metal plate and controller board cannot be
removed. The security jumper cannot be accessed without causing visible damage to the device.
Before you begin, make sure that the printer case is closed.
Locate the security slot, and then attach a lock. It is the same type of security slot found on most laptop
computers. You can typically find it at the back of the printer near an outside edge.
Configuring the printer 10
Configuration checklist
This checklist outlines the steps required to configure the settings needed to achieve the evaluated
configuration for a standalone printer.
Disable ThinPrint.
Disable SNMP.
Disabling ThinPrint
1 From the home screen, touch Settings > Network/Ports > ThinPrint.
2 Set Enable ThinPrint to Off.
Creating a certificate
1 From the Embedded Web Server, click Settings > Security > Certificate Management.
2 From the Device Certificates section, click Generate, and then specify the values for the following fields:
• Friendly Name—Type a name for the certificate. You can type up to 64 characters.
• Common Name—Type a name for the printer. Leave this field blank if you want to use the printer host
name as the common name.
• Organization Name—Type the name of the company or organization issuing the certificate.
• Unit Name—Type the name of the unit within the company or organization issuing the certificate.
• Country/Region—Type the country or region where the company or organization issuing the certificate
is located. You can type only up to two characters.
• Province Name—Type the province where the company or organization issuing the certificate is located.
• City Name—Type the city where the company or organization issuing the certificate is located.
• Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example,
IP:123.123.123.123. Leave this field blank if you want to use the IPv4 address.
Note: You can type up to 128 characters in all fields, except in Country/Region and Friendly Name.
3 Click Generate.
• Remote Syslog Method—Select Normal UDP or Stunnel, depending on the configuration on the
destination server.
• Severity of Events to Log—Select 5 ‑ Notice. Events specified at this severity level and up are logged.
• Remote Syslog Facility—Select a facility code for events logged to the destination server. All events
sent from the device are tagged with the same code to support sorting and filtering by network monitor
or intrusion detection software.
• Admin's E‑mail Address—Type one or more e‑mail addresses to which the notifications about certain
log events are sent automatically, and then touch OK. Use commas to separate multiple e‑mail
addresses.
• Log Full Behavior—Select whether to overwrite the oldest entries or to delete all entries and send a
notification through e‑mail when the log storage is full.
• % Full Alert Level— Specify the percentage (1–99) of log storage space that must be used before an e-
mail alert is triggered.
• Log Line Endings—Specify how line endings are handled in the log file, depending on the operating
system in which the file is parsed or viewed.
3 Set the following to On:
• Remote Syslog Non‑Logged Events—Send all events to the remote server regardless of the specified
severity level.
• E‑mail Log Cleared Alert—Send an e‑mail when you clear the log.
• E‑mail Log Wrapped Alert—Send an e‑mail when the log is full and begins to overwrite the oldest entries.
• E‑mail % Full Alert— Send an e-mail when log storage space reaches a specified percentage of capacity.
• E‑mail Log Exported Alert—Send an e-mail when the log file is exported.
• E‑mail Log Settings Changed Alert—Send an e-mail when log settings are changed.
• Digitally Sign Exports—Add a digital signature to e-mail alerts.
Note: To use e-mail alerts, configure the SMTP settings. For more information, see “Configuring e-mail”
on page 17.
Configuring e-mail
Note: Make sure that the printer is configured to send user data as an attachment to e‑mail.
• SMTP Server Authentication—Specify the type of authentication used to access the SMTP server.
• Device-Initiated E-mail—Select Use Device SMTP Credentials.
Note: If the printer requires user credentials to send e-mail, then specify the appropriate information for
authentication credentials.
3 From the Embedded Web Server, click E‑mail > E-mail Defaults > Admin Controls.
Note: This setting is applicable only in some printer models.
4 In the E-mail Images Sent As menu, select Attachment, and then click Save.
5 Click Web Link Setup, and then make sure that all fields are cleared.
6 Click Save.
Configuring fax
If your printer includes fax capabilities and is attached to a phone line, then enable held faxes and disable fax
forwarding and the driver to fax. The printer provides Group 3 digital fax capability in conformance with ITU-T
Recommendations T.4 and T.30. This interface can be used to receive faxes to be printed, or to send faxes of
scanned images.
3 Click Save.
4 From the Embedded Web Server, click Settings > Device > Preferences.
5 In the Screen Timeout field, set the idle time in seconds before the display shows the home screen, or before
the printer logs off a user account automatically. Enter a value from 5 to 300 seconds. The default value is
60 seconds.
Notes:
• The password must contain at least one lowercase letter, one uppercase letter, and one
nonalphabetic character.
• The password must not contain dictionary words or variations of the user name.
5 From the Permission Groups section, select one or more groups.
Note: To create a group for the user, click Add New Group. For more information, see “Creating local
account groups” on page 22.
6 Click Save.
Notes:
• To import access controls from another group, click Import Access Controls, and then select a group.
• For more information on access controls, see “Understanding access controls” on page 27.
General Information
• Setup Name—Type a unique name for the LDAP network account.
• Server Address—Type the IP address or the host name of the LDAP server.
• Server Port—Enter the port where LDAP queries are sent.
Note: If you are using SSL, then use port 636. Otherwise, use port 389.
• Required User Input—Select the required LDAP authentication credentials used when logging in to the
printer. This setting is available only in the LDAP setup.
• Use Integrated Windows Authentication—Select one of the following:
– Do not use
– Use if available—Use Windows operating system authentication credentials, if available.
– Require—Use only Windows operating system authentication credentials.
Note: This setting is available only in the LDAP+GSSAPI setup.
Configuring the printer 24
Device Credentials
• Anonymous LDAP Bind—Bind the printer with the LDAP server anonymously. This option is applicable
only if your LDAP server allows anonymous binding. Enabling this option does not require you to provide
authentication credentials. This option is available only in the LDAP setup.
• Use Active Directory Device Credentials—Use user credentials and group designations that are pulled
from the existing network comparable to other network services. This option is available only in the LDAP
+GSSAPI setup.
• If Anonymous LDAP Bind or Use Active Directory Device Credentials is disabled, then provide the
authentication credentials used to bind the printer with the LDAP server.
– Device Username
• For LDAP setup, type the fully qualified distinguished name (DN) of a user registered to the LDAP
server.
• For LDAP+GSSAPI setup, type the DN of a user registered to the Kerberos server.
– Device Realm—The realm used for the Kerberos server. This setting is available only in the LDAP
+GSSAPI setup.
– Device Password—Type the password for the user.
Advanced Options
• Use SSL/TLS—If the LDAP server requires SSL, then select SSL/TLS.
• Require Certificate—If the LDAP server requires a certificate, then select Yes.
• Userid Attribute—Type the LDAP attribute to search for when authenticating users’ credentials. The
default value is sAMAccountName, which is common in a Windows operating system environment. For
other directories, you can type uid, cn, or a user-defined attribute. For more information, contact your
system administrator.
• Mail Attribute—Type the LDAP attribute that contains the users’ e-mail addresses. The default value is
mail.
• Fax number Attribute—Type the LDAP attribute that contains the users’ fax number. The default value
is facsimiletelephonenumber.
• Full Name Attribute—Type the LDAP attribute that contains the users’ full names. The default value is cn.
• Home Directory Attribute—Type the LDAP attribute that contains the users’ home directory. The default
value is homeDirectory.
• Group Membership Attribute—Type the LDAP attribute required for group search. The default value is
memberOf.
• Search Base—The node in the LDAP server where user accounts reside. You can type multiple search
bases, separated by commas.
Note: A search base consists of multiple attributes separated by commas, such as cn (common name),
ou (organizational unit), o (organization), c (country), and dc (domain).
• Search Timeout—Enter a value from 5 to 30 seconds or 5 to 300 seconds, depending on your printer
model.
• Follow LDAP Referrals—Search the different servers in the domain for the logged‑in user account.
Configuring the printer 25
General Information
– Setup Name—Type a unique name for the Active Directory login method.
– Server Address—Type the IP address or the host name of the LDAP server.
– Server Port—Enter the port where queries are sent.
– Required User Input—Select the required authentication credentials when logging in to the printer.
– Use Integrated Windows Authentication—Select one of the following:
• Do not use
• Use if available—Use Windows operating system authentication credentials, if available.
• Require—Use only Windows operating system authentication credentials.
Device Credentials
– Use Active Directory Device Credentials—Use user credentials and group designations that are
pulled from the existing network comparable to other network services.
– If Use Active Directory Device Credentials is disabled, then provide the authentication credentials
used to bind the printer with the Active Directory server.
• Device Username—Type the fully qualified DN of a user registered to the Active Directory server.
• Device Realm—The Active Directory domain name.
• Device Password—Type the password for the user.
Advanced Options
– Use SSL/TLS—If the LDAP server requires SSL, then select SSL/TLS.
– Require Certificate—If the LDAP server requires a certificate, then select Yes.
Configuring the printer 27
– Userid Attribute—Type the LDAP attribute to search for when authenticating users’ credentials. The
default value is sAMAccountName, which is common in a Windows environment. For other
directories, you can type uid, cn, or a user-defined attribute. For more information, contact your
system administrator.
– Mail Attribute—Type the LDAP attribute that contains the users’ e-mail addresses. The default value
is mail.
– Fax number Attribute—Type the LDAP attribute that contains the users’ fax number. The default
value is facsimiletelephonenumber.
– Full Name Attribute—Type the LDAP attribute that contains the users’ full names. The default value
is cn.
– Home Directory Attribute—Type the LDAP attribute that contains the users’ home directory. The
default value is homeDirectory.
– Group Membership Attribute—Type the LDAP attribute required for group search. The default value
is memberOf.
– Search Base—The node in the LDAP server where user accounts reside. You can type multiple search
bases, separated by commas.
Note: A search base consists of multiple attributes separated by commas, such as cn (common
name), ou (organizational unit), o (organization), c (country), and dc (domain).
– Search Timeout—Enter a value from 5 to 30 seconds or 5 to 300 seconds, depending on your printer
model.
– Follow LDAP Referrals—Search the different servers in the domain for the logged‑in user account.
User access
Administrators and users are required to log in to the printer using a method that provides both authentication
and authorization. Under the evaluated configuration, three options are available for allowing access to
network‑connected devices: Local Accounts, LDAP, LDAP+GSSAPI, and Smart Card Authentication.
• For other applications or functions, expand one or more categories, and then select the application or
function.
7 Click Save.
Troubleshooting
Login issues
Make sure that the card reader is connected properly to the printer
Make sure that the card reader and the smart card are compatible
Make sure that the card reader driver is installed on the printer
Make sure that the smart card driver is installed in the printer
Make sure that the certificate information on the smart card is correct
If the user belongs to an Active Directory group, then make sure that the group is authorized to access the
applications and functions
LDAP issues
Make sure that the server and firewall settings are configured to allow communication between the
printer and the LDAP server on port 389 and port 636
The default ports are port 389 and port 636.
If reverse DNS lookup is not used in your network, then disable it in the Kerberos settings
1 From the Embedded Web Server, click Settings > Security.
2 From the Network Accounts section, click Kerberos.
3 From the Miscellaneous Settings section, select Disable Reverse IP Lookups.
4 Click Save and Verify.
If the LDAP server requires SSL, then enable SSL for LDAP lookups
1 From the Embedded Web Server, navigate to the configuration page for the application:
Apps > Smart Card Authentication Client > Configure
2 From the Advanced Settings section, select Use SSL for User Info.
3 Click Apply.
Narrow the LDAP search base to the lowest possible scope that includes all necessary users
Make sure that all LDAP attributes that are being searched for are correct
Troubleshooting 36
Make sure that jobs are sent to the correct printer and have not expired
The user may have sent the jobs to a different printer, or the jobs may have been automatically deleted
because they were not printed in time.
Troubleshooting 37
Audit log
The security audit log is a record of security-related events. The log is stored locally in the device, and can be
exported through e‑mail or browsed on request. Log records can be sent to an external Syslog server while
they are generated.
The basic format of the log records is defined in RFC5424. The following is the generic log format:
<PRI>VERSION TIMESTAMP HOSTNAME APPNAME PROCID <MSGID> [SD-ELEMENT] MSG
Where:
PRI is a priority value that is a two- or three-digit number that is defined in RFC5424. The value must be
enclosed in < and >. The severity of the event is part of the input to the calculation of this number.
VERSION is a value of 1 that is the version of the specification that is used for defining the log file.
TIMESTAMP is the ISO 8601 time in ([YYYY-MM-DD]T[hh:mm:ss]) format.
HOSTNAME is the host name or IP address of the device.
APPNAME is the application name indicating the process that triggered the event log message.
PROCID is the process ID that is generally specified as 0, but may be another valid process ID for some
applications.
MSGID is a text string that is defined within each event. The string must be enclosed in < and >. It provides
more information about the event.
[SD-ELEMENT] is a structured data element that consists of one EventNum value followed by zero or more
name-value pairs that provide detailed log information.
MSG contains the Event Name and Event Message fields described in the individual event definitions.
Notices
Edition notice
December 2022
The following paragraph does not apply to any country where such provisions are inconsistent with local
law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in later editions. Improvements or changes in the
products or the programs described may be made at any time.
References in this publication to products, programs, or services do not imply that the manufacturer intends to
make these available in all countries in which it operates. Any reference to a product, program, or service is
not intended to state or imply that only that product, program, or service may be used. Any functionally
equivalent product, program, or service that does not infringe any existing intellectual property right may be
used instead. Evaluation and verification of operation in conjunction with other products, programs, or services,
except those expressly designated by the manufacturer, are the user’s responsibility.
For Lexmark technical support, go to http://support.lexmark.com.
For information on Lexmark's privacy policy governing the use of this product, go to
www.lexmark.com/privacy.
For information on supplies and downloads, go to www.lexmark.com.
© 2016 Lexmark International, Inc.
All rights reserved.
Trademarks
Lexmark and the Lexmark logo are trademarks or registered trademarks of Lexmark International, Inc. in the
United States and/or other countries.
Active Directory and Windows are trademarks of the Microsoft group of companies.
All other trademarks are the property of their respective owners.
Index 42
Index
A checking physical interfaces disabling the home screen
access controls 31 before 9 icons 11
understanding 27 configuration checklist 10 disabling the host USB 11
accessing the Embedded Web configuring login restrictions 20 disabling the Intelligent Storage
Server 8 configuring NTP settings 15 Drive 21
Active Directory configuring print permissions 21 disabling ThinPrint 11
creating login method 26 configuring the application 29 disabling unused applications 32
deleting login method 26 configuring the minimum Display Customization
editing login method 26 password length 20 enabling 31
advanced settings configuring the system clock domain certificate error 34
configuring 30 manually 15 domain controller certificate not
AirPrint configuring time source installed 34
disabling 11 settings 15
application creating an Active Directory login E
configuring 29 method 26 e-mail
applications creating groups configuring 17
securing 31 local accounts 22 editing an Active Directory login
assumptions 6 creating Kerberos login method 26
attaching a lock 9 method 25 editing local account groups 23
audit log 38 creating LDAP login method 23 editing local accounts
overview 38 creating LDAP+GSSAPI login password 22
audit logging method 23 PIN 22
configuring 16 creating local accounts 21 user name 22
authentication and authorization password 21 user name and password 22
options 29 user name 21 Embedded Web Server
accessing 8
C D encrypting network data 14
cannot access applications or data files encryption
functions on the printer 35 erasing 12 IPSec 14
cannot detect the card reader 33 date and time settings 15 environment
cannot determine the user ID 36 default login methods operating 6
cannot find realm in the Kerberos setting 29 erasing keys in flash memory 40
configuration file 34 deleting an Active Directory login erasing temporary data files 12
cannot generate or read method 26 error reading the smart card 33
certificate information from deleting LDAP login method 25 error while reading card 33
card 34 deleting LDAP+GSSAPI login e‑mail function
cannot read the smart card 33 method 25 securing 31
card is locked out 33 deleting local account groups 23
card reader not detected 33 deleting local accounts F
certificate error 34 password 22 fax forwarding 19
certificates PIN 22 fax settings
creating and modifying 12 user name 22 driver to fax 19
change history 4 user name and password 22 fax forwarding 19
checklist digital certificates held faxes 19
configuration 10 creating and modifying 12 fax storage location
configuration disabling AirPrint 11 setting 18
checking firmware before 9 disabling flash drive access 11 firmware
checking 9
Index 43
T
ThinPrint
disabling 11
time source settings
configuring 15
touch screen
using 7
troubleshooting
cannot access applications or
functions on the printer 35
cannot detect the card
reader 33
cannot determine the user
ID 36
cannot find realm in the
Kerberos configuration file 34
cannot generate or read
certificate information from
card 34
cannot read the smart card 33
card reader not detected 33
certificate error 34
domain certificate error 34
domain controller certificate not
installed 34
error reading the smart card 33
LDAP lookups fail 35
missing Kerberos realm 34
no print jobs available for
user 36
printer home screen does not
lock 34
realm not found 34
user is locked out 33
U
unauthorized user 35
understanding access
controls 27
unused applications
disabling 32
updating firmware 9
flash file 9
user is locked out 33