O P E R A T I O N A L   C O N S I D E R A T I O N S    A L T A L I N K
®
  C 8 0 0 0   S E R I E S  
Customer Expectation and Installation Guide          27 
 
 
Network Connectivity Expectations 
USB Wireless Network Adapter 
  Your Xerox Device can be equipped with an optional Xerox USB 802.11b/g/n (2.4GHz) Wireless Adapter to enable WiFi connectivity. When utilizing this 
Xerox Device over WiFi, it is important to understand the performance impacts that may result from WiFi technology. Compared to a wired Ethernet 
connection, WiFi performance varies significantly due to many factors that are specific to wireless technology. 
  Some of these factors include: WiFi LAN Overhead, Proximity to Access Point (AP) and Physical Obstacles (i.e. Signal Strength), Network usage / AP 
Loading and Radio Frequency (RF) interference. 
  For more information, refer to the Xerox USB Wireless Adapter – WiFi Performance Primer 
 
Scanning Expectations 
  The Xerox
®
 C8030/8035/8045/8055/8070 supports scan to network folder, Scan to USB, Scan to Mailbox, Scan to Home and Scan to email functionality 
as standard. 
 
Scan Resolution 
  The maximum image scan resolution is 600 dpi.  The default scan resolution is set to 200dpi. 
  Note: Several resolution settings are selectable via the User Interface touch panel. Lower resolutions will result in files that are smaller in size thereby 
reducing network traffic. 
  When scanning the OCR processing, image compression, file formatting and file transfer operations all continue after the job has completed scanning 
by the scanner. 
Heavy print usage may delay the processing of scan jobs. 
 
Security Expectations 
Xerox Smart Card, Kerberos, and FIPS140-2 support includes: 
  CAC, PIV, .NET cards, S/MIME- encrypted email to self and others via LDAP or Address Book. Email signing. 
  FIPS 140-2 encryption (SSL only) 
  FIPS 140-2 encryption (Disk & IPsec) only for IPv4 
McAfee Embedded Control 
  McAfee
®
 Built-in Enhanced Security is the Standard offering on the C8000 series that can detect and prevent unauthorized read-modify-write of files by 
unauthorized persons/systems. Built-in security prevents unauthorized reading, writing, adding of any of the systems protected files & directories. Any 
unauthorized attempt to modify these protected filed are recorded to the audit log on the device and can be setup to send email alerts thru CWIS, 
Embedded Web Server Web, Xerox Device Manager, or McAfee ePolicy Orchestrator.  
  Optional purchasable McAfee
®
Integrity Control provides the same protections as Embedded Security with some key additions.  
  Prevents new files from being EXECUTED from ANY location via untrusted means. By utilizing whitelisting technology from McAfee the multi-function 
device prevents a targeted attack from executing an unauthorized and possibly malicious program such as malware.  
  Prevents WRITING of protected executable files. Integrity Control prevents the malicious overwrite of operating system thru executables. File 
Inventory is hashed to prevent malicious changing of it. 
Cisco TrustSec Identity Services Integration
®
 
  Automatically tracks new devices (via Profiler with Advanced license) connecting to the network  
  "Firewall" the printer to prevent general access to restricted printers  
  Automatically provision and grant printers appropriate network access to prevent impersonation & inappropriate access  
  Single inventory for printer management, access and location-aware printer management