ColorQube™ 9201/9202/9203

Security

6.Select [IP Filtering] in the directory tree.

Defining IP Filtering with the Define IP Filter Rule dialog

7.Click on the [Add] button to display the Add IP Filter Rule page.

8.From the [Protocol] drop-down list, select the protocol (All, TCP, UDP or ICMP) that the rule will apply to.

9.From the [Action] drop-down list, select how you wish IP Filtering to handle the incoming packet.

10.From the [Move This Rule To] drop-down list, select either End of List or Beginning of List for the location of this rule. Note that rule order is important in IP Filtering because rules can negate each other if placed in an incorrect order.

11.Enter the [Source IP Address] to which this rule will apply.

12.Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of 0 to 32 corresponds to the 32 bit binary number comprising IP addresses. A number of 8, for example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask of 255, 255, 255, 0).

13.[Source Port]: This selection is only available when the Protocol has been set to TCP. Enter the originating port (if applicable) that the rule has been created to handle. If the incoming packet did not originate from this source port, the rule will not be applied.

14.[Destination Port]: This selection is only available when the protocol is set to TCP or UDP. Enter the destination port that the rule has been created to handle. If the incoming packet was not sent to this port, the rule will not be applied.

15.[ICMP Message]: This selection is only available when the protocol is set to ICMP. Select which ICMP Message the rule is meant to handle.

16.Click on the [Apply] button to accept the changes or on the [Cancel] button to exit the window without saving changes.

Note

The settings are not applied until you restart the device.

Audit Log

Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based processes running on the server, exposure to access attacks, eavesdropping, file tampering, service disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by the System Administrator, often with the aid of third party analyzing tools, helps to assess attempted server security breaches, identify actual breaches, and prevent future breaches. Access to the log’s data is protected by enabling SSL (Secure Sockets Layer) protocols. The audit log, and its associated data protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria, set by the United States Department of Defense. To enable this feature, perform the following steps.

IMPORTANT: Audit Log cannot be enabled until SSL (Secure Sockets Layer) is enabled on the device. To enable SSL on a device, the device needs to have a Server Certificate. For instructions to set up a Server Certificate, see Machine Digital Certificate Management on page 8-9.

1.At your Workstation, open the web browser and enter the IP address of the device in the Address bar, and press [Enter].

2.Click the [Properties] tab.

3.If prompted, enter the Administrator User ID and Password. The default is [admin] and [1111].

4.Click on the [Login] button.

System Administrator Guide

8-5

Page 131
Image 131
Xerox 9203, 9202, 9201 manual Audit Log, Defining IP Filtering with the Define IP Filter Rule dialog

9202, 9201, 9203 specifications

The Xerox 9201, 9202, and 9203 copiers, introduced during the late 1970s and early 1980s, represent a significant leap in office automation technology. These models were part of Xerox's innovative line of copiers, catering to various business needs through their unique features and capabilities.

One of the cornerstone technologies behind the Xerox 9200 series is xerography, a process developed by Chester Carlson in the 1930s. The photocopiers use a dry electrophotographic process, which relies on a photosensitive drum, enabling high-quality and high-speed copying. This technology championed the transition from traditional printing methods to more efficient office practices, revolutionizing how documents were reproduced.

The Xerox 9201 was known for its robust capability to handle a significant volume of copies, appealing primarily to mid-sized organizations. It boasted an impressive speed of up to 80 copies per minute, catering to high-demand settings without compromising the quality of output.

The Xerox 9202 was an enhancement over its predecessor, introducing more advanced features such as automatic document feeding, which significantly reduced manual handling and increased productivity. It also supported various paper sizes, making it versatile for different tasks, from simple memos to full-size reports. Additional capabilities included collating, sorting, and stapling, allowing users to complete comprehensive document preparation in a single pass.

The Xerox 9203 further built upon these advancements, offering even faster copying speeds of up to 100 copies per minute. It also allowed for electronic sorting and featured an integrated mail room solution ideal for larger organizations. The 9203’s user interface was designed for ease of use, paving the way for accessible technology in the workplace.

All three models leveraged advanced optics and imaging technology to ensure sharp, clear reproductions. The capacity for duplex printing was a notable feature, enabling users to print on both sides of the paper, which not only saved resources but also contributed to environmentally friendly practices.

Overall, the Xerox 9200 series exemplified the transition towards multifunctional copiers that incorporated advanced features for efficiency, quality, and ease of use in office environments. Their impact on the industry helped shape modern photocopying, setting the benchmark for future models through their blend of technology and practicality. These machines remain a testament to Xerox's legacy in imaging technology and office automation.