EasyManuals Logo
Home>Xerox>All in One Printer>AltaLink C8030

Xerox AltaLink C8030 User Manual

Xerox AltaLink C8030
70 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
Xerox® Security Guide for Office Class Products: AltaLink® VersaLink®
November 2018 Page 2
Outbound User Data .....................................................................................................................10
Scanning to Network Repository, Email, Fax Server ....................................................................... 10
Protocol ............................................................................................................................................ 10
Encryption ........................................................................................................................................ 10
Description ....................................................................................................................................... 10
Scanning to User Local USB Storage Product ................................................................................ 11
Add on Apps- Cloud, Google, DropBox, and others .....................................................................11
4 Network Security .............................................................................................................................12
TCP/IP Ports & Services ............................................................................................................................. 12
Listening services (inbound ports) ................................................................................................12
Network Encryption ..................................................................................................................................... 13
IPSec 13
Wireless 802.11 Wi-Fi Protected Access (WPA) ..........................................................................14
TLS 14
Public Key Encryption (PKI) ..........................................................................................................15
Device Certificates ........................................................................................................................... 15
Trusted Certificates .......................................................................................................................... 16
Certificate Validation ........................................................................................................................ 17
Email Signing and Encryption using S/MIME ................................................................................17
SNMPv3 17
Network Access Control .............................................................................................................................. 18
802.1x 18
Cisco Identity Services Engine (ISE) ............................................................................................18
Cisco ISE allows you to deploy the following controls and monitoring of Xerox products: .............. 18
Contextual Endpoint Connection Management .......................................................................................... 19
FIPS140-2 Compliance Validation .............................................................................................................. 19
Additional Network Security Controls .......................................................................................................... 19
Endpoint Firewall Options .............................................................................................................19
IP Whitelisting (IP Address Filtering) ................................................................................................ 20
Stateful Firewall (Advanced IP Filtering) .......................................................................................... 20
5 Device Security: BIOS, Firmware, OS, Runtime, and Operational security controls ...............21
Fail Secure Vs Fail Safe .............................................................................................................................. 22
Pre-Boot Security ........................................................................................................................................ 22
BIOS 22
Embedded Encryption ...................................................................................................................22
Boot Process Security ................................................................................................................................. 22
Firmware Integrity..........................................................................................................................22

Table of Contents

Other manuals for Xerox AltaLink C8030

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Xerox AltaLink C8030 and is the answer not in the manual?

Xerox AltaLink C8030 Specifications

General IconGeneral
BrandXerox
ModelAltaLink C8030
CategoryAll in One Printer
LanguageEnglish

Related product manuals