Xerox Xerox Remote Print Services Support & Software 用户指南
Establishing and Maintaining Connectivity
9
Tips for Remote Services Offerings
Customer
Environment Impacts
Environment Impacts
Connection Method(s) Affected
Device Direct
Proxy: XDA Lite
Proxy: CentreWare Web
Proxy: XDA Lite
Proxy: CentreWare Web
Current Situation
There are interdependencies between security software applications and
infrastructure configurations that run in customer environments which
affect the ability of our devices and proxies to reliably connect and
communicate with each other as well as with the Edge Server.
When you suspect communication issues exist at a customer location, you
should check for the following possible root causes and take the
necessary corrective actions.
infrastructure configurations that run in customer environments which
affect the ability of our devices and proxies to reliably connect and
communicate with each other as well as with the Edge Server.
When you suspect communication issues exist at a customer location, you
should check for the following possible root causes and take the
necessary corrective actions.
Root Causes & Corrective Actions
Proxy Applications Turned Off
Data acquisition agent applications (proxies) are installed on customer
workstations that routinely get turned off, perhaps for days at a time,
resulting in loss of communication. Discuss with your customer where the
proxy client software has been loaded. Recommend that, when possible,
proxy applications be installed on a server that is expected to remain
powered on 24/7 rather than on an individual’s workstation or laptop.
Security Applications Blocking Communications
Some security applications that programmatically monitor network traffic
are designed/configured to detect unauthorized communications, either
from within the network or from outside of it, and to proactively block them.
Check with the customer
Data acquisition agent applications (proxies) are installed on customer
workstations that routinely get turned off, perhaps for days at a time,
resulting in loss of communication. Discuss with your customer where the
proxy client software has been loaded. Recommend that, when possible,
proxy applications be installed on a server that is expected to remain
powered on 24/7 rather than on an individual’s workstation or laptop.
Security Applications Blocking Communications
Some security applications that programmatically monitor network traffic
are designed/configured to detect unauthorized communications, either
from within the network or from outside of it, and to proactively block them.
Check with the customer
’s IT System Administrator to determine if they
are running any network traffic monitoring applications of this type and, if
so, explore alternatives that may allow uninterrupted communications
so, explore alternatives that may allow uninterrupted communications