Xerox 6180N FreeFlow® Print Server Security Guide - Page 4

Using the Print Server SSL/TLS Security Feature .2-24 - network scanning

Page 4 highlights

Tab l e of c o n te nts Audit Logs 2-21 GUI Logging 2-21 User Activity on the System 2-22 Date/Time User Login/Logout 2-22 Changing individual passwords 2-22 Accessing the Xerox FreeFlow Print Server through ADS . . . 2-22 Limiting access 2-23 IP Filtering 2-23 Remote Workflow 2-24 Secure Socket Layer 2-24 Using the Print Server SSL/TLS Security Feature 2-24 Creating and Using a Self-Signed Certificate 2-25 Using an Existing Signed Certificate from a Certificate Authority 2-26 Digital Certificates 2-27 Network Protocol 2-27 Secure Print 2-29 MICR mode 2-29 Prevent Unauthorized Queue Changes 2-30 Queue Lock 2-30 Roles and responsibilities 2-30 Xerox responsibilities 2-30 Customer Responsibilities 2-31 Security tips 2-31 Virus Scan 2-32 Online Help for security 2-32 Xerox FreeFlow Print Server Security Guide ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38

Xerox FreeFlow Print Server Security Guide
ii
Table of contents
Audit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
GUI Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
User Activity on the System . . . . . . . . . . . . . . . . . . . . . . . 2-22
Date/Time User Login/Logout. . . . . . . . . . . . . . . . . . . . . . 2-22
Changing individual passwords . . . . . . . . . . . . . . . . . . . . 2-22
Accessing the Xerox FreeFlow Print Server through ADS . . . 2-22
Limiting access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
IP Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Remote Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Secure Socket Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Using the Print Server SSL/TLS Security Feature . . . . . . 2-24
Creating and Using a Self-Signed Certificate . . . . . . . . . . 2-25
Using an Existing Signed Certificate from a Certificate Author-
ity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Digital Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27
Network Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27
Secure Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
MICR mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Prevent Unauthorized Queue Changes . . . . . . . . . . . . . . . . . 2-30
Queue Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Roles and responsibilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Xerox responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Customer Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Security tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Virus Scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
Online Help for security. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32