Xerox
®
B215 Multifunction Printer
User Guide
248
9
Security
This chapter describes how to configure the Security features for the device.
The following topics are mentioned in this chapter:
•Xerox
®
CentreWare
®
Internet Services ................................................................................................................ 249
• Setting Access Rights ................................................................................................................................................. 252
• Setting Print Permissions .......................................................................................................................................... 254
• Device User Database ............................................................................................................................................... 255
• Secure HTTP.................................................................................................................................................................... 256
• IP Filtering ...................................................................................................................................................................... 257
• IPSec ................................................................................................................................................................................. 258
• Security Certificates .................................................................................................................................................... 259
• Concealing or Showing Job Names ...................................................................................................................... 261
• 802.1x .............................................................................................................................................................................. 262
• Displaying or Hiding Network Settings ............................................................................................................... 263
• System Timeout ........................................................................................................................................................... 264
• USB Port Security ......................................................................................................................................................... 265
• Restricting Access to the Web User Interface .................................................................................................. 266
• Software Verification Test ........................................................................................................................................ 267