Support article for Lexmark CS331
This article describes:
Supported EAP Types
The 25XX dot matrix printers support the following EAP types:
802.1X/ EAP Configurations: Certificate Installation (2009 - 2011 Lexmark Devices)
To install and use certificates for TLS, TTLS, and PEAP authentication:

Access the printers EWS(Embedded Web Server) by typing

Click Configuration.

Click Security.

Click Certificate Management. Click here for image.
Configurations for 802.1X/ EAP (2009 - 2011 Lexmark Devices)

Access Printers EWS.

Click Configuration > Security > 802.1X.

Turn on 802.1X then place a check next to authentication type.
Note: Deselect the authentication types that are not needed.

If using TTLS, select the proper password protocol. Click here for the sample image.
Configurations for 802.1X/ EAP (2012 - 2019 Lexmark Devices)

Connect the printer over a wired connection.

Access the printers EWS, go to Security/Certificate Management > Certificate Authority Management.


Click New, then Upload CA (Certificate Authority) from Radius Server (must be in


On EWS, go to "Security / Certificate Management / Device Certificate Management".

Hit New, Fill in the fields. You should see it in the list as shown below.


Click on the link for the name of the new entry that is generated (not the default). For instance in the above picture, it is "

Select "Download Signing Request". This will have to be signed by the Radius Server, usually via a script.



After getting request signed by the Radius Server, go back into the Device Certificate Manager as in step 4, click on Name of entry (i.e. "

Go into Wireless setup. Enter the SSID of the AP for the network with the radius server. For security select 802.1x-Radius, fill in other fields.

In Wireless Setup, for 802.1x Certificate, select the name created in step #6 (for instance "wctestagain") from pulldown.

Under wireless setup, for 802.1x entries, select only the authentication mechanism desired.

Device login name should correspond to the login name defined for the radius server, usually in the conf file on the radius server.

Likewise, device login password must correspond to the password defined in the radius server conf file (for example it's not the shared secret entered during cert signing necessarily). Note that some authentication mechanisms do not require a password.
After setup is complete, disconnect wired connection so it will come up wireless. Monitor radius server logs if unable to connect to network.
LEGACY ID: HO3290
We appreciate your feedback. We use it to identify content which needs to be updated for accuracy or usefulness.
Thank you for your feedback!