Xerox 6180N Common Controller System Guide v 3.7 - Page 25

Security and Network Setup, Access and Security

Page 25 highlights

4. Security and Network Setup This section provides you with information on security regarding the DocuSP controller and the Solaris Operating System including access, changing logon levels, and enhancements of the Solaris OS. Also included are general guidelines to security related procedures that can be implemented to improve security of the DocuSP controller and the Solaris OS. Access and Security UNIX accounts are defined during the installation process: • root: has super user access to the workstation. The initial password for this account is set during installation of the operating system and should be obtained from the Xerox service personnel. NOTE: For security reasons, the root account password should be changed as soon as the Xerox service personnel have completed the installation. • The Xerox user name is the account from which the Xerox software runs. Use the Xerox user password for this account. Contact your Customer Service Representative if this is unknown. • ftp: an account to permit some clients to retrieve their software from the DocuSP controller using the TCP/IP communication protocol. This account will be set to Read Only access to the /export/home/ftp directory • Pxrxsvc: the account for remote diagnostics by Xerox service personnel. The DocuSP controller is accessed using PPP communications via a modem. NOTE: The user and group identifications, uid and gid, for the Xerox accounts that are listed above cannot be arbitrarily changed in the password and group files to new values because the software is based on the proper access to the Xerox supplied files. Common Controller 4-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110

Common Controller
4-1
4.
Security and Network Setup
This section provides you with information on security regarding
the DocuSP controller and the Solaris Operating System
including access, changing logon levels, and enhancements of
the Solaris OS. Also included are general guidelines to security
related procedures that can be implemented to improve security
of the DocuSP controller and the Solaris OS.
Access and Security
UNIX accounts are defined during the installation process:
root:
has super user access to the workstation. The initial
password for this account is set during installation of the
operating system and should be obtained from the Xerox
service personnel.
NOTE:
For security reasons, the root account password
should be changed as soon as the Xerox service personnel
have completed the installation.
The Xerox user name is the account from which the Xerox
software runs. Use the Xerox user password for this account.
Contact your Customer Service Representative if this is
unknown.
ftp:
an account to permit some clients to retrieve their
software from the DocuSP controller using the TCP/IP
communication protocol. This account will be set to Read
Only access to the /export/home/ftp directory
Pxrxsvc:
the account for remote diagnostics by Xerox
service personnel. The DocuSP controller is accessed using
PPP communications via a modem.
NOTE:
The user and group identifications, uid and gid, for the
Xerox accounts that are listed above cannot be arbitrarily
changed in the password and group files to new values because
the software is based on the proper access to the Xerox supplied
files.