Xerox
®
WorkCentre
®
6655 Color Multifunction Printer
69
System Administrator Guide
This chapter includes:
•
Setting Access Rights ...................................................................................................................................................... 70
•
Configuring Authentication Settings ........................................................................................................................ 72
•
Configuring Authorization Settings .......................................................................................................................... 81
•
Secure HTTP (SSL) ............................................................................................................................................................ 89
•
FIPS 140-2 .......................................................................................................................................................................... 90
•
Stored Data Encryption ................................................................................................................................................. 92
•
IP Filtering .......................................................................................................................................................................... 93
•
Audit Log ............................................................................................................................................................................. 95
•
Installation Policies ......................................................................................................................................................... 97
•
McAfee Embedded Control .......................................................................................................................................... 98
•
IPsec .................................................................................................................................................................................... 100
•
Security Certificates ...................................................................................................................................................... 105
•
802.1X ................................................................................................................................................................................ 110
•
System Timeout .............................................................................................................................................................. 112
•
Overwriting Image Data ............................................................................................................................................. 114
•
PostScript Passwords .................................................................................................................................................... 117
•
USB Port Security ........................................................................................................................................................... 118
•
Hiding User Names on the Control Panel ............................................................................................................. 119
•
Verifying the Software ................................................................................................................................................. 120
•
Restricting Print File Software Updates ................................................................................................................. 121
•
Specifying Email and Internet Fax Recipient Restrictions .............................................................................. 122
•
Disabling the System Administrator Password Reset ....................................................................................... 123
See also:
4
Security