Administrator's Guide
Xerox
®
WorkCentre
®
5945/5955 Multifunction Printer 67
System Administrator Guide
This chapter includes:
• Setting Access Rights .......................................................................................................................................................... 68
• Configuring Authentication Settings ........................................................................................................................... 70
• Secure HTTP (SSL) ................................................................................................................................................................ 80
• FIPS 140-2 ............................................................................................................................................................................... 81
• Stored Data Encryption ..................................................................................................................................................... 83
• IP Filtering ............................................................................................................................................................................... 84
• Audit Log ................................................................................................................................................................................. 86
• Configuring Authorization Settings ............................................................................................................................. 88
• Installation Policies ............................................................................................................................................................. 96
• McAfee Embedded Control .............................................................................................................................................. 97
• IPsec ........................................................................................................................................................................................ 103
• Security Certificates .......................................................................................................................................................... 108
• 802.1X ..................................................................................................................................................................................... 113
• System Timeout .................................................................................................................................................................. 115
• Overwriting Image Data ................................................................................................................................................. 116
• PostScript Passwords ........................................................................................................................................................ 120
• USB Port Security ............................................................................................................................................................... 121
• Displaying or Hiding Network Settings ..................................................................................................................... 123
• Hiding User Names on the Control Panel ................................................................................................................
124
• Verifying the Software ..................................................................................................................................................... 125
• Restricting Print File Software Updates .................................................................................................................... 126
• Specifying Email and Internet Fax Recipient Restrictions ................................................................................ 127
•
Disabling the System Administrator Password Reset ......................................................................................... 128
See also:
www.xerox.com/security
4
Security