EasyManuals Logo

Xerox VersaLink C8000 Security Guide

Xerox VersaLink C8000
70 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
Xerox® Security Guide for Office Class Products: AltaLink® VersaLink®
November 2018 Page 2
Outbound User Data .....................................................................................................................10
Scanning to Network Repository, Email, Fax Server ....................................................................... 10
Protocol ............................................................................................................................................ 10
Encryption ........................................................................................................................................ 10
Description ....................................................................................................................................... 10
Scanning to User Local USB Storage Product ................................................................................ 11
Add on Apps- Cloud, Google, DropBox, and others .....................................................................11
4 Network Security .............................................................................................................................12
TCP/IP Ports & Services ............................................................................................................................. 12
Listening services (inbound ports) ................................................................................................12
Network Encryption ..................................................................................................................................... 13
IPSec 13
Wireless 802.11 Wi-Fi Protected Access (WPA) ..........................................................................14
TLS 14
Public Key Encryption (PKI) ..........................................................................................................15
Device Certificates ........................................................................................................................... 15
Trusted Certificates .......................................................................................................................... 16
Certificate Validation ........................................................................................................................ 17
Email Signing and Encryption using S/MIME ................................................................................17
SNMPv3 17
Network Access Control .............................................................................................................................. 18
802.1x 18
Cisco Identity Services Engine (ISE) ............................................................................................18
Cisco ISE allows you to deploy the following controls and monitoring of Xerox products: .............. 18
Contextual Endpoint Connection Management .......................................................................................... 19
FIPS140-2 Compliance Validation .............................................................................................................. 19
Additional Network Security Controls .......................................................................................................... 19
Endpoint Firewall Options .............................................................................................................19
IP Whitelisting (IP Address Filtering) ................................................................................................ 20
Stateful Firewall (Advanced IP Filtering) .......................................................................................... 20
5 Device Security: BIOS, Firmware, OS, Runtime, and Operational security controls ...............21
Fail Secure Vs Fail Safe .............................................................................................................................. 22
Pre-Boot Security ........................................................................................................................................ 22
BIOS 22
Embedded Encryption ...................................................................................................................22
Boot Process Security ................................................................................................................................. 22
Firmware Integrity..........................................................................................................................22

Table of Contents

Other manuals for Xerox VersaLink C8000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Xerox VersaLink C8000 and is the answer not in the manual?

Xerox VersaLink C8000 Specifications

General IconGeneral
Print TechnologyLaser
FunctionsPrint
Print Speed (Color)Up to 45 ppm
Print Resolution1200 x 2400 dpi
Mobile PrintingApple AirPrint, Google Cloud Print, Mopria, Xerox Print Service Plug-in for Android
Memory2 GB
Duplex PrintingAutomatic
Control Panel5-inch color touchscreen
Operating System CompatibilityWindows, macOS, Linux
Print SpeedUp to 45 ppm
Media Sizes SupportedA4, A5, B5
Media TypesPlain, Recycled, Bond, Cardstock, Labels, Envelopes
ConnectivityEthernet, USB 3.0, NFC
Hard Drive320 GB

Related product manuals