User's Manual
Table Of Contents
- Safety
- Getting Started
- Installation and Setup
- Using the Services
- Printing
- Paper and Media
- Maintenance
- Troubleshooting
- Security
- Specifications
- Regulatory Information
- Recycling and Disposal
Xerox
®
B205 Multifunction Printer
User Guide
222
9
Security
This chapter describes how to configure the Security features for the device.
The following topics are mentioned in this chapter:
•Xerox
®
CentreWare
®
Internet Services ................................................................................................................ 223
• Secure HTTP.................................................................................................................................................................... 226
• IP Filtering ...................................................................................................................................................................... 227
• IPSec ................................................................................................................................................................................. 228
• Security Certificates .................................................................................................................................................... 229
• Concealing or Showing Job Names ...................................................................................................................... 231
• 802.1x .............................................................................................................................................................................. 232
• Displaying or Hiding Network Settings ............................................................................................................... 233
• System Timeout ........................................................................................................................................................... 234
• USB Port Security ......................................................................................................................................................... 235
• Restricting Access to the Web User Interface .................................................................................................. 236
• Software Verification Test ........................................................................................................................................ 237










