Xerox® Security Guide for Office Class Products:  AltaLink®  VersaLink® 
November 2018   Page  2 
 
 
Outbound User Data .....................................................................................................................10 
Scanning to Network Repository, Email, Fax Server ....................................................................... 10 
Protocol ............................................................................................................................................ 10 
Encryption ........................................................................................................................................ 10 
Description ....................................................................................................................................... 10 
Scanning to User Local USB Storage Product ................................................................................ 11 
Add on Apps- Cloud, Google, DropBox, and others .....................................................................11 
4  Network Security .............................................................................................................................12 
TCP/IP Ports & Services ............................................................................................................................. 12 
Listening services (inbound ports) ................................................................................................12 
Network Encryption ..................................................................................................................................... 13 
IPSec  13 
Wireless 802.11 Wi-Fi Protected Access (WPA) ..........................................................................14 
TLS  14 
Public Key Encryption (PKI) ..........................................................................................................15 
Device Certificates ........................................................................................................................... 15 
Trusted Certificates .......................................................................................................................... 16 
Certificate Validation ........................................................................................................................ 17 
Email Signing and Encryption using S/MIME ................................................................................17 
SNMPv3  17 
Network Access Control .............................................................................................................................. 18 
802.1x  18 
Cisco Identity Services Engine (ISE) ............................................................................................18 
Cisco ISE allows you to deploy the following controls and monitoring of Xerox products: .............. 18 
Contextual Endpoint Connection Management .......................................................................................... 19 
FIPS140-2 Compliance Validation .............................................................................................................. 19 
Additional Network Security Controls .......................................................................................................... 19 
Endpoint Firewall Options .............................................................................................................19 
IP Whitelisting (IP Address Filtering) ................................................................................................ 20 
Stateful Firewall (Advanced IP Filtering) .......................................................................................... 20 
5  Device Security: BIOS, Firmware, OS, Runtime, and Operational security controls ...............21 
Fail Secure Vs Fail Safe .............................................................................................................................. 22 
Pre-Boot Security ........................................................................................................................................ 22 
BIOS  22 
Embedded Encryption ...................................................................................................................22 
Boot Process Security ................................................................................................................................. 22 
Firmware Integrity..........................................................................................................................22