Security
This chapter includes:
•
Setting Access Rights .......................................................................................................................................................... 50
•
•
About User Permissions ..................................................................................................................................................... 58
®
•
Standard Accounting ....................................................................................................................... 59
•
•
Secure HTTP (SSL) ................................................................................................................................................................ 61
•
FIPS 140-2 ............................................................................................................................................................................... 62
•
IP Filtering ............................................................................................................................................................................... 63
•
Managing the Audit Log ................................................................................................................................................... 64
•
IPsec .......................................................................................................................................................................................... 65
•
802.1X ....................................................................................................................................................................................... 66
•
System Timeout .................................................................................................................................................................... 68
•
Overwriting Image Data ................................................................................................................................................... 69
•
USB Port Security ................................................................................................................................................................. 71
•
•
Security Certificates ............................................................................................................................................................ 73
See also:
www.xerox.com/security
®
®
Xerox
WorkCentre
4265 Multifunction Printer
System Administrator Guide
4
49