4 security 67 – Xerox WorkCentre 7970-2606 User Manual
Page 5
Contents
Xerox
®
WorkCentre
®
7970 Multifunction Printer
5
System Administrator Guide
WSD ........................................................................................................................................................................................ 63
Enabling WSD ............................................................................................................................................................ 63
NetWare ............................................................................................................................................................................... 64
Configuring NetWare General Settings .......................................................................................................... 64
Enabling SAP ............................................................................................................................................................... 64
Bindery Settings ........................................................................................................................................................ 65
Configuring NetWare Directory Services (NDS) Settings ........................................................................ 65
NDPS/NEPS .................................................................................................................................................................. 65
AppleTalk .............................................................................................................................................................................. 66
Before You Begin ...................................................................................................................................................... 66
Configuring AppleTalk ............................................................................................................................................ 66
4 Security
67
Setting Access Rights ...................................................................................................................................................... 68
Authentication ........................................................................................................................................................... 68
Authorization .............................................................................................................................................................. 69
Personalization .......................................................................................................................................................... 69
Setting the Login Method ..................................................................................................................................... 69
Configuring Authentication Settings ....................................................................................................................... 70
Configuring Local Authentication Settings ................................................................................................... 70
Configuring Network Authentication Settings ............................................................................................. 71
Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 73
Configuring Convenience Authentication Settings .................................................................................... 75
Configuring Smart Card Authentication Settings ....................................................................................... 76
Configuring Authorization Settings .......................................................................................................................... 79
Setting the Authorization Method .................................................................................................................... 79
Configuring Local Authorization Settings ...................................................................................................... 79
Configuring Network Authorization Settings ............................................................................................... 79
User Permissions ....................................................................................................................................................... 81
Secure HTTP (SSL) ............................................................................................................................................................ 88
Using SSL for all HTTP Communication .......................................................................................................... 88
FIPS 140-2 ........................................................................................................................................................................... 89
Enabling FIPS 140 Mode and Checking for Compliance ......................................................................... 90
Stored Data Encryption .................................................................................................................................................. 91
Enabling Encryption of Stored Data ................................................................................................................. 91
IP Filtering ............................................................................................................................................................................ 92
Creating or Editing an IP Filter Rule ................................................................................................................. 92
Editing an IP Filter Rule .......................................................................................................................................... 92
Arranging the Execution Order of IP Filter Rules ........................................................................................ 93
Audit Log .............................................................................................................................................................................. 94
Enabling Audit Log ................................................................................................................................................... 94
Saving an Audit Log................................................................................................................................................. 94
Saving an Audit Log to a USB Flash Drive ..................................................................................................... 94
Interpreting the Audit Log .................................................................................................................................... 95
Installation Policies .......................................................................................................................................................... 96