Set the SmartCard Logout Timing.....................................................6-8
Controlling Access to Tools and Features...................................................................6-8
Controlling Access for All Users.........................................................................6-8
Controlling Access for a Group of Users........................................................6-9
User Roles Access Setup.......................................................................................6-9
Device Access Setup............................................................................................6-10
Service Access Setup...........................................................................................6-10
Feature Access Setup..........................................................................................6-11
Digital Certificates............................................................................................................6-11
Installing a Digital Certificate.........................................................................6-11
Creating a Self-Signed Certificate.................................................................6-12
Creating a Request..............................................................................................6-12
Uploading a Certificate.....................................................................................6-13
Managing Certificates.......................................................................................6-13
Certificate Revocation Retrieval Settings...................................................6-13
Secure HTTP and SSL/TLS..............................................................................................6-14
Configuring Secure HTTP (SSL/TLS).............................................................6-14
S/MIME..................................................................................................................................6-15
IPsec.......................................................................................................................................6-16
Configuring IPSec................................................................................................6-16
802.1X....................................................................................................................................6-17
Configuring 802.1X.............................................................................................6-17
FIPS140-2 Data Encryption..........................................................................................6-18
Overwriting Image Data................................................................................................6-18
Manually Deleting Image Data.....................................................................6-18
Scheduling Routine Deletion of Image Data...........................................6-19
IP Filtering............................................................................................................................6-19
Creating an IP Filter Rule..................................................................................6-19
Audit Log..............................................................................................................................6-20
Enabling Audit Log..............................................................................................6-20
Saving an Audit Log............................................................................................6-20
Interpreting the Audit Log...............................................................................6-20
PDF and XPS Signatures.................................................................................................6-21
Address Book Security.....................................................................................................6-22
Controlling CentreWare Internet Services Address Book
Access.................................................................................................................6-22
Controlling Control Panel Address Book Access.......................................6-22
Restricting Access to Job Information......................................................................6-22
Hiding or Password Protecting Completed Job Information..............6-22
Hiding Active Job Information.......................................................................6-23
Xerox
®
Color C60/C70 Printeriv
System Administrator Guide
Table of Contents
Hello! Crazy discounts, hurry up! We are Drop Dead Studio and our goal is to help companies achieve impressive sales results through automated marketing. I. We sell fresh databases for GSA Search Engine Ranker. • The databases are updated monthly through 24/7 parsing and by connecting purchased databases from other sources. • You have the option to purchase a one-time fresh database or pay for a lifetime subscription for updates. ATTENTION! 40% discount only until 04/10/2024! When ap
Hello! Crazy discounts, hurry up! We are Drop Dead Studio and our goal is to help companies achieve impressive sales results through automated marketing. I. We sell fresh databases for GSA Search Engine Ranker. • The databases are updated monthly through 24/7 parsing and by connecting purchased databases from other sources. • You have the option to purchase a one-time fresh database or pay for a lifetime subscription for updates. ATTENTION! 40% discount only until 04/10/2024! When ap