Administrator's Guide

Contents
Xerox
®
WorkCentre
®
3655 Multifunction Printer 5
System Administrator Guide
WSD ........................................................................................................................................................................................ 63
Enabling WSD ............................................................................................................................................................ 63
NetWare ............................................................................................................................................................................... 64
Configuring NetWare General Settings .......................................................................................................... 64
Enabling SAP ............................................................................................................................................................... 64
Bindery Settings ........................................................................................................................................................ 65
Configuring NetWare Directory Services (NDS) Settings ........................................................................ 65
NDPS/NEPS .................................................................................................................................................................. 65
AppleTalk .............................................................................................................................................................................. 66
Before You Begin ...................................................................................................................................................... 66
Configuring AppleTalk ............................................................................................................................................ 66
4 Security 67
Setting Access Rights ...................................................................................................................................................... 68
Authentication ........................................................................................................................................................... 68
Authorization .............................................................................................................................................................. 69
Personalization .......................................................................................................................................................... 69
Setting the Login Method ..................................................................................................................................... 69
Configuring Authentication Settings ....................................................................................................................... 70
Configuring Local Authentication Settings ................................................................................................... 70
Configuring Network Authentication Settings ............................................................................................. 71
Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 73
Configuring Convenience Authentication Settings .................................................................................... 75
Configuring Smart Card Authentication Settings ....................................................................................... 76
Configuring Authorization Settings .......................................................................................................................... 79
Setting the Authorization Method ....................................................................................................................
79
Configuring Local Authorization Settings ...................................................................................................... 79
Configuring Network Authorization Settings ............................................................................................... 79
User Permissions ....................................................................................................................................................... 80
Secure HTTP (SSL) ............................................................................................................................................................ 87
Using SSL for all HTTP Communication .......................................................................................................... 87
FIPS 140-2 ........................................................................................................................................................................... 88
Enabling FIPS 140 Mode and Checking for Compliance ......................................................................... 89
Stored Data Encryption .................................................................................................................................................. 90
Enabling Encryption of Stored Data ................................................................................................................. 90
IP Filtering ............................................................................................................................................................................ 91
Creating or Editing an IP Filter Rule ................................................................................................................. 91
Editing an IP Filter Rule .......................................................................................................................................... 91
Arranging the Execution Order of IP Filter Rules ........................................................................................ 92
Audit Log .............................................................................................................................................................................. 93
Enabling Audit Log ................................................................................................................................................... 93
Saving an Audit Log................................................................................................................................................. 93
Saving an Audit Log to a USB Flash Drive ..................................................................................................... 93
Interpreting the Audit Log .................................................................................................................................... 94
Installation Policies .......................................................................................................................................................... 95