EasyManuals Logo

Xerox versalink C7030 Security Guide

Xerox versalink C7030
70 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
Xerox® Security Guide for Office Class Products: AltaLink® VersaLink®
November 2018 Page 2
Outbound User Data .....................................................................................................................10
Scanning to Network Repository, Email, Fax Server ....................................................................... 10
Protocol ............................................................................................................................................ 10
Encryption ........................................................................................................................................ 10
Description ....................................................................................................................................... 10
Scanning to User Local USB Storage Product ................................................................................ 11
Add on Apps- Cloud, Google, DropBox, and others .....................................................................11
4 Network Security .............................................................................................................................12
TCP/IP Ports & Services ............................................................................................................................. 12
Listening services (inbound ports) ................................................................................................12
Network Encryption ..................................................................................................................................... 13
IPSec 13
Wireless 802.11 Wi-Fi Protected Access (WPA) ..........................................................................14
TLS 14
Public Key Encryption (PKI) ..........................................................................................................15
Device Certificates ........................................................................................................................... 15
Trusted Certificates .......................................................................................................................... 16
Certificate Validation ........................................................................................................................ 17
Email Signing and Encryption using S/MIME ................................................................................17
SNMPv3 17
Network Access Control .............................................................................................................................. 18
802.1x 18
Cisco Identity Services Engine (ISE) ............................................................................................18
Cisco ISE allows you to deploy the following controls and monitoring of Xerox products: .............. 18
Contextual Endpoint Connection Management .......................................................................................... 19
FIPS140-2 Compliance Validation .............................................................................................................. 19
Additional Network Security Controls .......................................................................................................... 19
Endpoint Firewall Options .............................................................................................................19
IP Whitelisting (IP Address Filtering) ................................................................................................ 20
Stateful Firewall (Advanced IP Filtering) .......................................................................................... 20
5 Device Security: BIOS, Firmware, OS, Runtime, and Operational security controls ...............21
Fail Secure Vs Fail Safe .............................................................................................................................. 22
Pre-Boot Security ........................................................................................................................................ 22
BIOS 22
Embedded Encryption ...................................................................................................................22
Boot Process Security ................................................................................................................................. 22
Firmware Integrity..........................................................................................................................22

Table of Contents

Other manuals for Xerox versalink C7030

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Xerox versalink C7030 and is the answer not in the manual?

Xerox versalink C7030 Specifications

General IconGeneral
Print TechnologyLaser
Automatic DuplexingYes
Scan Resolution600 x 600 dpi
FunctionsPrint, Copy, Scan, Fax
Mobile PrintingApple AirPrint, Google Cloud Print, Mopria, Xerox Print Service Plug-in for Android
Fax Speed33.6 Kbps
Operating System CompatibilityWindows, Mac OS, Linux
Print SpeedUp to 30 ppm
Print Resolution1200 x 2400 dpi
ConnectivityUSB, Ethernet, Wi-Fi
Copy SpeedUp to 30 ppm color / black & white
Processor1.05 GHz
Memory2 GB
Paper SizesA3, A4, A5, B5
Scan SpeedUp to 55 ipm
Duplex Scan SpeedUp to 28 ipm color / 28 ipm black & white
Dimensions590 x 640 x 1130 mm
Maximum Paper SizeA3

Related product manuals