Xerox 3635MFP Systems Administrator Guide - Page 141

Security, Security @ Xerox, Standard Authentication, Overview - snmp settings

Page 141 highlights

15 Security This chapter describes how to configure the Security features for the machine. The following features can be installed and configured: 1. Security @ Xerox on page 129 2. Standard Authentication on page 129 3. 802.1X Authentication on page 136 4. Image Overwrite Security on page 138 5. IP Filtering on page 144 6. IP Sec on page 145 7. Audit Log on page 146 8. Machine Digital Certificate Management & Trusted Certificate Authorities on page 148 9. SNMP on page 151 10. SNMPv3 on page 153 Security @ Xerox For the latest information on securely installing, setting up and operating your machine see the Xerox Security Information web site located at www.xerox.com/security. Standard Authentication Overview Administrators can configure the machine so that users must be authenticated and authorized before they can access specific services or areas. When LDAP is configured, the machine can automatically retrieve the authenticated User 's e-mail address. Open Authentication When no authentication services are enabled users can access features without restriction. Open Authentication is the default configuration for the machine. Network Authentication Authentication is used to verify that a User accessing the machine is a valid User. The User's authentication details are verified either remotely by a network authentication server, Xerox Phaser 3635 System Administration Guide 129

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

Xerox Phaser 3635 System Administration Guide
129
15 Security
This chapter describes how to configure the Security features for the machine.
The following features can be installed and configured:
1.
Security @ Xerox
on
page 129
2.
Standard Authentication
on
page 129
3.
802.1X Authentication
on
page 136
4.
Image Overwrite Security
on
page 138
5.
IP Filtering
on
page 144
6.
IP Sec
on
page 145
7.
Audit Log
on
page 146
8.
Machine Digital Certificate Management & Trusted Certificate Authorities
on
page 148
9.
SNMP
on
page 151
10.
SNMPv3
on
page 153
Security @ Xerox
For the latest information on securely installing, setting up and operating your machine see
the Xerox Security Information web site located at www.xerox.com/security.
Standard Authentication
Overview
Administrators can configure the machine so that users must be authenticated and
authorized before they can access specific services or areas. When LDAP is configured, the
machine can automatically retrieve the authenticated User 's e-mail address.
Open Authentication
When no authentication services are enabled users can access features without restriction.
Open Authentication is the default configuration for the machine.
Network Authentication
Authentication is used to verify that a User accessing the machine is a valid User. The User's
authentication details are verified either remotely by a network authentication server,