Xerox
®
 B215 Multifunction Printer
User Guide
248
9
Security
This chapter describes how to configure the Security features for the device.
The following topics are mentioned in this chapter:
•Xerox
®
 CentreWare
®
 Internet Services  ................................................................................................................ 249
• Setting Access Rights  ................................................................................................................................................. 252
• Setting Print Permissions  .......................................................................................................................................... 254
• Device User Database  ............................................................................................................................................... 255
• Secure HTTP.................................................................................................................................................................... 256
• IP Filtering  ...................................................................................................................................................................... 257
• IPSec ................................................................................................................................................................................. 258
• Security Certificates .................................................................................................................................................... 259
• Concealing or Showing Job Names ...................................................................................................................... 261
• 802.1x .............................................................................................................................................................................. 262
• Displaying or Hiding Network Settings ............................................................................................................... 263
• System Timeout  ........................................................................................................................................................... 264
• USB Port Security ......................................................................................................................................................... 265
• Restricting Access to the Web User Interface  .................................................................................................. 266
• Software Verification Test ........................................................................................................................................ 267