Hardware Reference
In-Depth Information
Under “Restrict access to the server…”, add the following lines in bold, replacing the
subnet with your own:
<Location />
Order allow,deny
Allow 192.168.0.
Allow Localhost
<Location>
Under “Restrict access to the admin pages…”, add the following lines in bold, replacing
the subnet with your own:
<Location /admin>
Order allow,deny
Allow 192.168.0.
Allow Localhost
<Location>
Under “Restrict access to configuration files…”, add the following lines in bold, replac-
ing the subnet with your own:
<Location /admin/conf>
AuthType Default
Require user @SYSTEM
Order allow,deny
Allow 192.168.0.
Allow Localhost
<Location>
Firewalling
Some Linux distributions come preconfigured with a iptables firewall for security.
They do not usually have the CUPS ports (631 for TCP and UDP) open in the default
configuration. Since you want to permit traffic to access the CUPS server through
the firewall, you'll need to punch a hole. For Pidora and Raspbian, you can add these
lines into /etc/sysconfig/iptables :
-A INPUT -i eth0 -p tcp -m tcp --dport 631 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 631 -j ACCEPT
You can also edit the configuration file from within a web interface (see Figure 3-3 ) by
opening a browser on the Pi (Midori is usually the included web browswer), going to
http://localhost:631/admin , and selecting “Edit Configuration File” in the right column
under Server.
 
Search WWH ::




Custom Search