Fuji Xerox C2265 Manual page 19

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Fuji Xerox C2265/C2263
Set the ID and the password of key operator (only a key operator is privileged);
Refer to and set the ID of SA / general user and set the password(with local authentication
only);
Refer to and set the access denial when system administrator's authentication fails;
Refer to and set the limit of user password length (for general user and SA, with local
authentication only);
Refer to and set the SSL/TLS communication;
Refer to and set the IPSec communication;
Refer to and set the S/MIME communication;
Refer to and set the User Authentication;
Refer to and set the Store Print;
Refer to and set the date and time;
Refer to and set Auto Clear of Control Panel;
Refer to and set the Self Test;
Refer to and set the Report print;
Additionally, this TOE allows only the system administrator, who is authenticated from the
system administrator client via Web browser using CWIS, to refer to and set the following
security functions via CWIS:
Set the ID and the password of key operator (only a key operator is privileged);
Refer to and set the ID of SA / general user and set the password(with local authentication
only);
Refer to and set the access denial when system administrator's authentication fails;
Refer to and set the limit of user password length (for general user and SA, with local
authentication only);
Refer to and set the Security Audit Log;
Refer to and set the SSL/TLS communication;
Refer to and set the IPSec communication;
Refer to and set the S/MIME communication;
Create/upload/download an X.509 certificate;
Refer to and set the User Authentication;
Refer to and set the Auto Clear of CWIS;
(5) Customer Engineer Operation Restriction
This TOE allows only the authenticated system administrator to refer to or enable/disable
the Customer Engineer Operation Restriction setting from the control panel and CWIS. For
this, CE cannot refer to or change the setting of each function described in (4) System
Administrator's Security Management.
(6) Security Audit Log
The important events of TOE such as device failure, configuration change, and user
operation are traced and recorded based on when and who operated what function. Only a
Security Target
- 14 -
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents