Xerox Versant 80 Press System Administration Manual - page 11
Setting up Access Rights................................................................................10-28
Overview of Authentication and Security..................................10-28
Authentication Overview..................................................................10-28
Local Authentication..........................................................................10-28
Controlling Access to Tools and Features................................................10-29
Controlling Access for All Users......................................................10-29
Digital Certificates............................................................................................10-30
Digital Certificates Overview...........................................................10-30
Installing a Digital Certificate.........................................................10-30
Creating a Self-Signed Certificate.................................................10-31
Secure HTTP and SSL / TLS...........................................................................10-31
Information about Secure HTTP and SSL / TLS.......................10-31
Configuring Secure HTTP and SSL / TLS Settings...................10-31
Internet Protocol Security (IPsec)...............................................................10-32
IPsec..........................................................................................................10-32
Configuring IPSec................................................................................10-32
802.1X Information..........................................................................................10-33
802.1X......................................................................................................10-33
Configuring 802.1X.............................................................................10-33
IP Filtering Information..................................................................................10-33
IP Filtering...............................................................................................10-33
Creating an IP Filter Rule..................................................................10-33
Audit Log..............................................................................................................10-34
Audit Log Overview.............................................................................10-34
Enabling Audit Log..............................................................................10-34
Saving an Audit Log............................................................................10-34
Interpreting the Audit Log...............................................................10-34
Job Information.................................................................................................10-35
Restricting Access to Job Information.........................................10-35
Hiding or Password Protecting Completed Job
Information.....................................................................................10-35
Hiding Active Job Information.......................................................10-35
11 Configure Environment Settings for Scan Services................11-1
Overview of Scan Services Environments................................................................11-1
E-mail.....................................................................................................................................11-2
E-mail Overview....................................................................................................11-2
E-mail Requirements...........................................................................................11-3
Enabling the E-mail Port and Setting up TCP/IP.....................................11-6
Configuring the E-mail Environment............................................................11-7
ix
Xerox
®
Versant
®
80 Press
System Administration Guide
Table of Contents