Network Connectivity Expectations; Scanning Expectations - Xerox AltaLink C8030 Customer Expectation & Installation Manual

Version 2.7, c8000 series
Hide thumbs Also See for AltaLink C8030:
Table of Contents

Advertisement

O P E R A T I O N A L C O N S I D E R A T I O N S

Network Connectivity Expectations

USB Wireless Network Adapter
 Your Xerox Device can be equipped with an optional Xerox USB 802.11b/g/n (2.4GHz) Wireless Adapter to enable WiFi connectivity. When utilizing this
Xerox Device over WiFi, it is important to understand the performance impacts that may result from WiFi technology. Compared to a wired Ethernet
connection, WiFi performance varies significantly due to many factors that are specific to wireless technology.
 Some of these factors include: WiFi LAN Overhead, Proximity to Access Point (AP) and Physical Obstacles (i.e. Signal Strength), Network usage / AP
Loading and Radio Frequency (RF) interference.
 For more information, refer to the Xerox USB Wireless Adapter – WiFi Performance Primer

Scanning Expectations

 The Xerox
®
C8030/8035/8045/8055/8070 supports scan to network folder, Scan to USB, Scan to Mailbox, Scan to Home and Scan to email functionality
as standard.
Scan Resolution
 The maximum image scan resolution is 600 dpi. The default scan resolution is set to 200dpi.
 Note: Several resolution settings are selectable via the User Interface touch panel. Lower resolutions will result in files that are smaller in size thereby
reducing network traffic.
 When scanning the OCR processing, image compression, file formatting and file transfer operations all continue after the job has completed scanning
by the scanner.
Heavy print usage may delay the processing of scan jobs.
Security Expectations
Xerox Smart Card, Kerberos, and FIPS140-2 support includes:
 CAC, PIV, .NET cards, S/MIME- encrypted email to self and others via LDAP or Address Book. Email signing.
 FIPS 140-2 encryption (SSL only)
 FIPS 140-2 encryption (Disk & IPsec) only for IPv4
McAfee Embedded Control
 McAfee
®
Built-in Enhanced Security is the Standard offering on the C8000 series that can detect and prevent unauthorized read-modify-write of files by
unauthorized persons/systems. Built-in security prevents unauthorized reading, writing, adding of any of the systems protected files & directories. Any
unauthorized attempt to modify these protected filed are recorded to the audit log on the device and can be setup to send email alerts thru CWIS,
Embedded Web Server Web, Xerox Device Manager, or McAfee ePolicy Orchestrator.
 Optional purchasable McAfee
 Prevents new files from being EXECUTED from ANY location via untrusted means. By utilizing whitelisting technology from McAfee the multi-function
device prevents a targeted attack from executing an unauthorized and possibly malicious program such as malware.
 Prevents WRITING of protected executable files. Integrity Control prevents the malicious overwrite of operating system thru executables. File
Inventory is hashed to prevent malicious changing of it.
Cisco TrustSec Identity Services Integration
 Automatically tracks new devices (via Profiler with Advanced license) connecting to the network
 "Firewall" the printer to prevent general access to restricted printers
 Automatically provision and grant printers appropriate network access to prevent impersonation & inappropriate access
 Single inventory for printer management, access and location-aware printer management
Customer Expectation and Installation Guide
®
Integrity Control provides the same protections as Embedded Security with some key additions.
®
A L T A L I N K
C 8 0 0 0 S E R I E S
®
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents