Security
This chapter includes:
•
Setting Access Rights ...................................................................................................................................................... 74
•
•
•
Secure HTTP (SSL) ............................................................................................................................................................ 95
•
FIPS 140-2 .......................................................................................................................................................................... 96
•
Stored Data Encryption ................................................................................................................................................. 98
•
IP Filtering .......................................................................................................................................................................... 99
•
Audit Log ........................................................................................................................................................................... 101
•
Installation Policies ....................................................................................................................................................... 104
•
McAfee Embedded Control ........................................................................................................................................ 105
•
IPsec .................................................................................................................................................................................... 108
•
Security Certificates ...................................................................................................................................................... 113
•
•
System Timeout .............................................................................................................................................................. 123
•
Overwriting Image Data ............................................................................................................................................. 124
•
PostScript Passwords .................................................................................................................................................... 128
•
USB Port Security ........................................................................................................................................................... 129
•
•
•
Verifying the Software ................................................................................................................................................. 132
•
•
•
See also:
www.xerox.com/security
®
®
Xerox
WorkCentre
7800/7800i Series Color Multifunction Printer
System Administrator Guide
4
73