Security
This chapter includes:
•
Setting Access Rights .......................................................................................................................................................... 68
•
•
•
Secure HTTP (SSL) ................................................................................................................................................................ 88
•
FIPS 140-2 ............................................................................................................................................................................... 89
•
Stored Data Encryption ..................................................................................................................................................... 91
•
IP Filtering ............................................................................................................................................................................... 92
•
Audit Log ................................................................................................................................................................................. 94
•
Installation Policies ............................................................................................................................................................. 96
•
McAfee Embedded Control .............................................................................................................................................. 97
•
IPsec ........................................................................................................................................................................................ 100
•
Security Certificates .......................................................................................................................................................... 105
•
•
System Timeout .................................................................................................................................................................. 112
•
Overwriting Image Data ................................................................................................................................................. 113
•
PostScript Passwords ........................................................................................................................................................ 117
•
USB Port Security ............................................................................................................................................................... 118
•
•
•
Verifying the Software ..................................................................................................................................................... 121
•
•
•
See also:
www.xerox.com/security
®
®
Xerox
WorkCentre
7970 Multifunction Printer
System Administrator Guide
4
67