Overview.....................................................................................................13-8
Local Authentication.............................................................................13-9
Network Authentication....................................................................13-11
Authentication Using a Card Reader System...........................13-12
Controlling Access to Tools and Features................................................13-14
Controlling Access for All Users......................................................13-14
Controlling Access for a Group of Users......................................13-15
Digital Certificates............................................................................................13-16
Installing a Digital Certificate.........................................................13-16
Managing Certificates.......................................................................13-18
Certificate Revocation Retrieval Settings...................................13-18
Secure HTTP and SSL/TLS..............................................................................13-19
Configuring Secure HTTP and SSL/TLS Settings.....................13-19
IPsec.......................................................................................................................13-20
Configuring IPSec................................................................................13-20
802.1X....................................................................................................................13-21
Configuring 802.1X.............................................................................13-21
FIPS140-2 Data Encryption..........................................................................13-22
IP Filtering............................................................................................................13-22
Creating an IP Filter Rule..................................................................13-22
Audit Log..............................................................................................................13-23
Enabling Audit Log..............................................................................13-23
Saving an Audit Log............................................................................13-23
Interpreting the Audit Log...............................................................13-23
PDF and XPS Signatures.................................................................................13-24
Address Book Security.....................................................................................13-24
Controlling CentreWare IS Address Book Access....................13-24
Controlling Control Panel Address Book Access.......................13-24
Restricting Access to Job Information......................................................13-25
Hiding or Password Protecting Completed Job
Information.....................................................................................13-25
Hiding Active Job Information.......................................................13-25
Hiding or Displaying Network Settings....................................................13-25
14 Problem Solving....................................................................................14-1
SMB.........................................................................................................................................14-1
Troubleshooting....................................................................................................14-1
When you cannot communicate with the printer.....................14-1
When you cannot print........................................................................14-2
You cannot delete documents from the Printer
window.................................................................................................14-2
Xerox
®
D95/D110/D125/D136 Copier/Printerxvi
System Administration Guide
Table of Contents