Xerox AltaLink B8045 Security Manual page 4

Office class multi-function products & single-function printers
Hide thumbs Also See for AltaLink B8045:
Table of Contents

Advertisement

Xerox® Security Guide for Office Class Products: AltaLink®  VersaLink®
Outbound User Data .....................................................................................................................10
Scanning to Network Repository, Email, Fax Server ....................................................................... 10
Protocol ............................................................................................................................................ 10
Encryption ........................................................................................................................................ 10
Description ....................................................................................................................................... 10
Scanning to User Local USB Storage Product ................................................................................ 11
Add on Apps- Cloud, Google, DropBox, and others .....................................................................11
4
Network Security .............................................................................................................................12
TCP/IP Ports & Services ............................................................................................................................. 12
Listening services (inbound ports) ................................................................................................12
Network Encryption ..................................................................................................................................... 13
13
Wireless 802.11 Wi-Fi Protected Access (WPA) ..........................................................................14
14
Public Key Encryption (PKI) ..........................................................................................................15
Device Certificates ........................................................................................................................... 15
Trusted Certificates .......................................................................................................................... 16
Certificate Validation ........................................................................................................................ 17
Email Signing and Encryption using S/MIME ................................................................................17
Network Access Control .............................................................................................................................. 18
18
Cisco Identity Services Engine (ISE) ............................................................................................18
Contextual Endpoint Connection Management .......................................................................................... 19
FIPS140-2 Compliance Validation .............................................................................................................. 19
Additional Network Security Controls .......................................................................................................... 19
Endpoint Firewall Options .............................................................................................................19
IP Whitelisting (IP Address Filtering) ................................................................................................ 20
Stateful Firewall (Advanced IP Filtering) .......................................................................................... 20
5
Fail Secure Vs Fail Safe .............................................................................................................................. 22
Pre-Boot Security ........................................................................................................................................ 22
22
Embedded Encryption ...................................................................................................................22
Boot Process Security ................................................................................................................................. 22
Firmware Integrity..........................................................................................................................22
November 2018
Page 2

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents