Contents
Xerox
®
WorkCentre
®
6655 Color Multifunction Printer
5
System Administrator Guide
Configuring the Proxy Server ............................................................................................................................ 63
NTP ..................................................................................................................................................................................... 64
WSD ................................................................................................................................................................................... 65
Enabling WSD ......................................................................................................................................................... 65
NetWare ........................................................................................................................................................................... 66
Configuring NetWare General Settings ........................................................................................................ 66
Enabling SAP ........................................................................................................................................................... 66
Bindery Settings .................................................................................................................................................... 67
Configuring NetWare Directory Services (NDS) Settings ...................................................................... 67
NDPS/NEPS.............................................................................................................................................................. 67
AppleTalk ......................................................................................................................................................................... 68
Before You Begin................................................................................................................................................... 68
Configuring AppleTalk ........................................................................................................................................ 68
4 Security
69
Setting Access Rights ................................................................................................................................................... 70
Authentication ....................................................................................................................................................... 70
Authorization .......................................................................................................................................................... 71
Personalization ....................................................................................................................................................... 71
Setting the Login Method .................................................................................................................................. 71
Configuring Authentication Settings .................................................................................................................... 72
Configuring Local Authentication Settings ................................................................................................. 72
Configuring Network Authentication Settings .......................................................................................... 73
Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 75
Configuring Convenience Authentication Settings .................................................................................. 77
Configuring Smart Card Authentication Settings..................................................................................... 78
Configuring Authorization Settings ....................................................................................................................... 81
Setting the Authorization Method ................................................................................................................. 81
Configuring Local Authorization Settings .................................................................................................... 81
Configuring Network Authorization Settings ............................................................................................. 81
User Permissions .................................................................................................................................................... 82
Secure HTTP (SSL) ........................................................................................................................................................ 89
Using SSL for all HTTP Communication ....................................................................................................... 89
FIPS 140-2 ....................................................................................................................................................................... 90
Enabling FIPS 140 Mode and Checking for Compliance ....................................................................... 91
Stored Data Encryption .............................................................................................................................................. 92
Enabling Encryption of Stored Data .............................................................................................................. 92
IP Filtering ....................................................................................................................................................................... 93
Creating or Editing an IP Filter Rule ............................................................................................................... 93
Editing an IP Filter Rule ...................................................................................................................................... 93
Arranging the Execution Order of IP Filter Rules ...................................................................................... 94
Audit Log .......................................................................................................................................................................... 95
Enabling Audit Log ............................................................................................................................................... 95
Saving an Audit Log ............................................................................................................................................. 95
Saving an Audit Log to a USB Flash Drive ................................................................................................... 95