Security
This chapter includes:
•
Setting Access Rights ...................................................................................................................................................... 70
•
•
•
Secure HTTP (SSL) ............................................................................................................................................................ 89
•
FIPS 140-2 .......................................................................................................................................................................... 90
•
Stored Data Encryption ................................................................................................................................................. 92
•
IP Filtering .......................................................................................................................................................................... 93
•
Audit Log ............................................................................................................................................................................. 95
•
Installation Policies ......................................................................................................................................................... 97
•
McAfee Embedded Control .......................................................................................................................................... 98
•
IPsec .................................................................................................................................................................................... 100
•
Security Certificates ...................................................................................................................................................... 105
•
•
System Timeout .............................................................................................................................................................. 112
•
Overwriting Image Data ............................................................................................................................................. 114
•
PostScript Passwords .................................................................................................................................................... 117
•
USB Port Security ........................................................................................................................................................... 118
•
•
Verifying the Software ................................................................................................................................................. 120
•
•
•
See also:
www.xerox.com/security
Xerox
®
WorkCentre
®
6655 Color Multifunction Printer
System Administrator Guide
4
69