Xerox® Security Guide for Office Class Products: AltaLink® VersaLink®
Outbound User Data .....................................................................................................................10
Protocol ............................................................................................................................................ 10
Encryption ........................................................................................................................................ 10
Description ....................................................................................................................................... 10
4
Network Security .............................................................................................................................12
TCP/IP Ports & Services ............................................................................................................................. 12
Network Encryption ..................................................................................................................................... 13
13
14
Public Key Encryption (PKI) ..........................................................................................................15
Device Certificates ........................................................................................................................... 15
Trusted Certificates .......................................................................................................................... 16
Certificate Validation ........................................................................................................................ 17
Network Access Control .............................................................................................................................. 18
18
Endpoint Firewall Options .............................................................................................................19
5
Fail Secure Vs Fail Safe .............................................................................................................................. 22
Pre-Boot Security ........................................................................................................................................ 22
22
Embedded Encryption ...................................................................................................................22
Boot Process Security ................................................................................................................................. 22
Firmware Integrity..........................................................................................................................22
November 2018
Page 2