Security4
This chapter includes:
•Setting up Access Rights on page 54
•Controlling Access to Tools and Features on page 61
•Digital Certificates on page 62
•Secure HTTP (SSL) on page 65
•IPsec on page 66
•802.1X on page 71
•Stored Data Encryption on page 73
•Overwriting Image Data on page 74
•IP Filtering on page 76
•Audit Log on page 78
See also: www.xerox.com/security
WorkCentre 7755/7765/7775 Multifunction Printer | 53 |
System Administrator Guide |
|