Administrator's Guide

Contents
Xerox
®
WorkCentre
®
5945/5955 Multifunction Printer 5
System Administrator Guide
Configuring NetWare General Settings .......................................................................................................... 64
Enabling SAP ............................................................................................................................................................... 64
Bindery Settings ........................................................................................................................................................ 65
Configuring NetWare Directory Services (NDS) Settings ........................................................................ 65
NDPS/NEPS .................................................................................................................................................................. 65
AppleTalk .............................................................................................................................................................................. 66
Before You Begin ...................................................................................................................................................... 66
Configuring AppleTalk ............................................................................................................................................ 66
4 Security 67
Setting Access Rights ...................................................................................................................................................... 68
Authentication ........................................................................................................................................................... 68
Authorization .............................................................................................................................................................. 69
Personalization .......................................................................................................................................................... 69
Setting the Login Method ..................................................................................................................................... 69
Configuring Authentication Settings ....................................................................................................................... 70
Configuring Local Authentication Settings ................................................................................................... 70
Configuring Network Authentication Settings ............................................................................................. 72
Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 74
Configuring Convenience Authentication Settings .................................................................................... 76
Configuring Smart Card Authentication Settings ....................................................................................... 77
Secure HTTP (SSL) ............................................................................................................................................................ 80
Using SSL for all HTTP Communication .......................................................................................................... 80
FIPS 140-2 ........................................................................................................................................................................... 81
Enabling FIPS 140 Mode and Checking for Compliance ......................................................................... 82
Stored Data Encryption ..................................................................................................................................................
83
Enabling Encryption of Stored Data ................................................................................................................. 83
IP Filtering ............................................................................................................................................................................ 84
Creating or Editing an IP Filter Rule ................................................................................................................. 84
Editing an IP Filter Rule .......................................................................................................................................... 84
Arranging the Execution Order of IP Filter Rules ........................................................................................ 85
Audit Log .............................................................................................................................................................................. 86
Enabling Audit Log ................................................................................................................................................... 86
Saving an Audit Log................................................................................................................................................. 86
Saving an Audit Log to a USB Flash Drive ..................................................................................................... 86
Interpreting the Audit Log .................................................................................................................................... 87
Configuring Authorization Settings .......................................................................................................................... 88
Setting the Authorization Method .................................................................................................................... 88
Configuring Local Authorization Settings ...................................................................................................... 88
Configuring Network Authorization Settings ............................................................................................... 88
User Permissions ....................................................................................................................................................... 89
Installation Policies .......................................................................................................................................................... 96
McAfee Embedded Control .......................................................................................................................................... 97
Setting the Security Level and Alert Options ................................................................................................ 98
Configuring for Security Event Alerts in McAfee ePO ............................................................................... 98