Contents
WorkCentre 7800 Series Multifunction Printer 5
System Administrator Guide
Enabling WSD ......................................................................................................................................................... 60
NetWare ........................................................................................................................................................................... 61
Configuring NetWare General Settings ........................................................................................................ 61
Enabling SAP ........................................................................................................................................................... 61
Bindery Settings .................................................................................................................................................... 62
Configuring NetWare Directory Services (NDS) Settings ...................................................................... 62
NDPS/NEPS.............................................................................................................................................................. 62
AppleTalk ......................................................................................................................................................................... 63
Before You Begin................................................................................................................................................... 63
Configuring AppleTalk ........................................................................................................................................ 63
4 Security 65
Setting Access Rights ................................................................................................................................................... 66
Authentication ....................................................................................................................................................... 66
Authorization .......................................................................................................................................................... 67
Personalization ....................................................................................................................................................... 67
Setting the Login Method .................................................................................................................................. 67
Configuring Authentication Settings .................................................................................................................... 68
Configuring Local Authentication Settings ................................................................................................. 68
Configuring Network Authentication Settings .......................................................................................... 69
Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 71
Configuring Convenience Authentication Settings .................................................................................. 73
Configuring Smart Card Authentication Settings..................................................................................... 74
Configuring Authorization Settings ....................................................................................................................... 77
Setting the Authorization Method ................................................................................................................. 77
Configuring Local Authorization Settings .................................................................................................... 77
Configuring Network Authorization Settings .............................................................................................
77
User Permissions .................................................................................................................................................... 78
Secure HTTP (SSL) ........................................................................................................................................................ 85
Using SSL for all HTTP Communication ....................................................................................................... 85
FIPS 140-2 ....................................................................................................................................................................... 86
Enabling FIPS 140 Mode and Checking for Compliance ....................................................................... 87
Stored Data Encryption .............................................................................................................................................. 88
Enabling Encryption of Stored Data .............................................................................................................. 88
IP Filtering ....................................................................................................................................................................... 89
Creating or Editing an IP Filter Rule ............................................................................................................... 89
Editing an IP Filter Rule ...................................................................................................................................... 89
Arranging the Execution Order of IP Filter Rules ...................................................................................... 90
Audit Log .......................................................................................................................................................................... 91
Enabling Audit Log ............................................................................................................................................... 91
Saving an Audit Log ............................................................................................................................................. 91
Saving an Audit Log to a USB Flash Drive ................................................................................................... 91
Interpreting the Audit Log................................................................................................................................. 92
Installation Policies ...................................................................................................................................................... 93
McAfee Embedded Control ....................................................................................................................................... 94
Setting the Security Level .................................................................................................................................. 95
Setting the Alert Options ................................................................................................................................... 96