ContentsXerox ® WorkCentre® 6655 Color Multifunction Printer 5System Administrator GuideConfiguring the Proxy Server ............................................................................................................................ 63NTP ..................................................................................................................................................................................... 64WSD ................................................................................................................................................................................... 65Enabling WSD......................................................................................................................................................... 65NetWare ........................................................................................................................................................................... 66Configuring NetWare General Settings........................................................................................................ 66Enabling SAP ........................................................................................................................................................... 66Bindery Settings .................................................................................................................................................... 67Configuring NetWare Directory Services (NDS) Settings ...................................................................... 67NDPS/NEPS.............................................................................................................................................................. 67AppleTalk ......................................................................................................................................................................... 68Before You Begin................................................................................................................................................... 68Configuring AppleTalk ........................................................................................................................................ 684 Security 69Setting Access Rights................................................................................................................................................... 70Authentication ....................................................................................................................................................... 70Authorization .......................................................................................................................................................... 71Personalization....................................................................................................................................................... 71Setting the Login Method .................................................................................................................................. 71Configuring Authentication Settings .................................................................................................................... 72Configuring Local Authentication Settings ................................................................................................. 72Configuring Network Authentication Settings .......................................................................................... 73Configuring Xerox Secure Access Unified ID System Authentication Settings ............................. 75Configuring Convenience Authentication Settings.................................................................................. 77Configuring Smart Card Authentication Settings..................................................................................... 78Configuring Authorization Settings ....................................................................................................................... 81Setting the Authorization Method ................................................................................................................. 81Configuring Local Authorization Settings.................................................................................................... 81Configuring Network Authorization Settings ............................................................................................. 81User Permissions.................................................................................................................................................... 82Secure HTTP (SSL) ........................................................................................................................................................ 89Using SSL for all HTTP Communication ....................................................................................................... 89FIPS 140-2 ....................................................................................................................................................................... 90Enabling FIPS 140 Mode and Checking for Compliance ....................................................................... 91Stored Data Encryption .............................................................................................................................................. 92Enabling Encryption of Stored Data .............................................................................................................. 92IP Filtering ....................................................................................................................................................................... 93Creating or Editing an IP Filter Rule............................................................................................................... 93Editing an IP Filter Rule ...................................................................................................................................... 93Arranging the Execution Order of IP Filter Rules ...................................................................................... 94Audit Log .......................................................................................................................................................................... 95Enabling Audit Log ............................................................................................................................................... 95Saving an Audit Log ............................................................................................................................................. 95Saving an Audit Log to a USB Flash Drive ................................................................................................... 95