Xerox Print Advisor Support & Software 管理员指南

下载
页码 23
 
Xerox® Print Advisor Administration Guide 
Contents 
1
 
About Xerox
®
 Print Advisor ...................................................................... 5
 
Print Advisor Architecture ................................................................................................................. 5 
Xerox
®
 Print Advisor Client .................................................................................................. 5 
Xerox
®
 Print Advisor Application Server ........................................................................ 5 
Xerox
®
 Print Advisor’s Impact on your Existing Print Environment ............................. 6 
Xerox
®
 Print Advisor Data Security .............................................................................................. 6 
Xerox
®
 Print Advisor Application Server Availability ........................................................... 7 
Impact on Networks............................................................................................................................ 7 
Ease of Installation .............................................................................................................................. 7 
Administration Requirements ........................................................................................................ 7 
2
 
Installing Xerox
®
 Print Advisor ............................................................... 9
 
System Requirements ......................................................................................................................... 9 
Supported Platforms ........................................................................................................................ 10 
Using a Proxy Server ........................................................................................................................ 10 
Using a Domain Service Account ...............................................................................................  10 
3
 
Assessing Network Impact .................................................................... 11
 
Network Traffic Generated by Xerox
®
 Print Advisor ........................................................ 11 
Network Impact – Daily Print Volumes ...................................................................... 12 
Putting Network Impact into Perspective ................................................................. 13 
4
 
Planning Xerox
®
 Print Advisor Deployment ................................... 15
 
Deployment Overview ..................................................................................................................... 15 
Setting Your Assessment Goals ...................................................................................... 15 
Understanding Your Corporate IT Environment ....................................................  15 
Understanding How Your Print Infrastructure is Configured .......................... 16 
Choosing your Deployment Options ........................................................................................ 16 
Print Server-only Deployment ......................................................................................... 17 
Installing Xerox
®
 Print Advisor to Workstations only (Direct IP 
Environments) .........................................................................................................................  18 
Workstation and Print Server Deployment ............................................................... 19 
Installing Xerox
®
 Print Advisor on Print Clusters ....................................................  20 
Installing Xerox
®
 Print Advisor on Citrix and Terminal Servers....................... 20 
5
 
Xerox
®
 Print Advisor Security ............................................................... 21
 
Xerox
®
 Print Advisor Client Security ......................................................................................... 21 
Xerox
®
 Print Advisor Application Server Security ............................................................... 22 
Authentication and Authorization ............................................................................................ 22 
Port Requirements ............................................................................................................................ 23