Security
This chapter includes:
•
Setting Access Rights ...................................................................................................................................................... 66
•
•
•
Secure HTTP (SSL) ............................................................................................................................................................ 85
•
FIPS 140-2 .......................................................................................................................................................................... 86
•
Stored Data Encryption ................................................................................................................................................. 88
•
IP Filtering .......................................................................................................................................................................... 89
•
Audit Log ............................................................................................................................................................................. 91
•
Installation Policies ......................................................................................................................................................... 93
•
McAfee Embedded Control .......................................................................................................................................... 94
•
IPsec ...................................................................................................................................................................................... 97
•
Security Certificates ...................................................................................................................................................... 102
•
•
System Timeout .............................................................................................................................................................. 109
•
Overwriting Image Data ............................................................................................................................................. 110
•
PostScript Passwords .................................................................................................................................................... 113
•
USB Port Security ........................................................................................................................................................... 114
•
•
•
Verifying the Software ................................................................................................................................................. 117
•
•
•
See also:
www.xerox.com/security
WorkCentre 7800 Series Multifunction Printer
System Administrator Guide
4
65