Do you have a question about the Xerox AltaLink C8045 and is the answer not in the manual?
Print Resolution | Up to 1200 x 2400 dpi |
---|---|
Monthly Duty Cycle | Up to 200, 000 pages |
Standard Paper Capacity | 1, 140 sheets |
Duplex Printing | Automatic |
Functions | Print, Copy, Scan, Fax |
Memory | 4 GB |
DADF Capacity | 130 sheets |
Scan Resolution | Up to 600 x 600 dpi |
Fax | Optional |
Type | Color Multifunction Printer |
Maximum Scan Size | 11.7 x 17 inches |
Fax Modem Speed | 33.6 Kbps |
Operating System Compatibility | Windows, macOS, Linux |
Print Speed | Up to 45 ppm |
Connectivity | Ethernet, USB |
Supported Paper Sizes | A3, A4, A5, B4, B5 |
Hard Drive | 320 GB |
Document Handler | DADF |
Paper Weight | 60 to 256 gsm |
Output Destinations | Email, Network, USB |
Copy Speed | Up to 45 ppm color / Up to 45 ppm black-and-white |
Network Connectivity | Ethernet 10/100/1000 Base-T |
Explains security controls to protect data resident within the product, including encryption and media sanitization.
Details that user data is encrypted by default using AES-256, with keys stored in RAM.
Describes the Trusted Platform Module (TPM) used for securely holding product storage encryption keys.
Explains compliance with NIST SP 800-88 Rev1 for securely erasing data on magnetic media.
Covers encryption of print job data at submission using IPPS (TLS) and HTTPS (TLS).
Discusses security for scanning hardcopy documents to external locations via various protocols.
Explains Internet Protocol Security (IPsec) for providing encryption and authentication at the packet level.
Covers 802.1x authentication and Cisco Identity Services Engine (ISE) for policy enforcement.
Describes Cisco ISE as an intelligent platform for mitigating security risks and enforcing policies.
Discusses BIOS security, including inaccessibility, digital signing for updates, and fail-secure behavior.
Details the BIOS is inaccessible, cannot be cleared, and is modified via digitally signed firmware updates.
Explains configuration and user data are encrypted by AES using unique device keys.
Covers firmware integrity verification through digital signatures and cryptographic hashing.
Details runtime security features like executable control and memory control using McAfee.