EasyManua.ls Logo

Fuji Xerox Color C60

Fuji Xerox Color C60
178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Set the SmartCard Logout Timing.....................................................6-8
Controlling Access to Tools and Features...................................................................6-8
Controlling Access for All Users.........................................................................6-8
Controlling Access for a Group of Users........................................................6-9
User Roles Access Setup.......................................................................................6-9
Device Access Setup............................................................................................6-10
Service Access Setup...........................................................................................6-10
Feature Access Setup..........................................................................................6-11
Digital Certificates............................................................................................................6-11
Installing a Digital Certificate.........................................................................6-11
Creating a Self-Signed Certificate.................................................................6-12
Creating a Request..............................................................................................6-12
Uploading a Certificate.....................................................................................6-13
Managing Certificates.......................................................................................6-13
Certificate Revocation Retrieval Settings...................................................6-13
Secure HTTP and SSL/TLS..............................................................................................6-14
Configuring Secure HTTP (SSL/TLS).............................................................6-14
S/MIME..................................................................................................................................6-15
IPsec.......................................................................................................................................6-16
Configuring IPSec................................................................................................6-16
802.1X....................................................................................................................................6-17
Configuring 802.1X.............................................................................................6-17
FIPS140-2 Data Encryption..........................................................................................6-18
Overwriting Image Data................................................................................................6-18
Manually Deleting Image Data.....................................................................6-18
Scheduling Routine Deletion of Image Data...........................................6-19
IP Filtering............................................................................................................................6-19
Creating an IP Filter Rule..................................................................................6-19
Audit Log..............................................................................................................................6-20
Enabling Audit Log..............................................................................................6-20
Saving an Audit Log............................................................................................6-20
Interpreting the Audit Log...............................................................................6-20
PDF and XPS Signatures.................................................................................................6-21
Address Book Security.....................................................................................................6-22
Controlling CentreWare Internet Services Address Book
Access.................................................................................................................6-22
Controlling Control Panel Address Book Access.......................................6-22
Restricting Access to Job Information......................................................................6-22
Hiding or Password Protecting Completed Job Information..............6-22
Hiding Active Job Information.......................................................................6-23
Xerox
®
Color C60/C70 Printeriv
System Administrator Guide
Table of Contents

Table of Contents

Other manuals for Fuji Xerox Color C60

Related product manuals