User's Manual

Table Of Contents
Xerox
®
B215 Multifunction Printer
User Guide
248
9
Security
This chapter describes how to configure the Security features for the device.
The following topics are mentioned in this chapter:
•Xerox
®
CentreWare
®
Internet Services ................................................................................................................ 249
Setting Access Rights ................................................................................................................................................. 252
Setting Print Permissions .......................................................................................................................................... 254
Device User Database ............................................................................................................................................... 255
Secure HTTP.................................................................................................................................................................... 256
IP Filtering ...................................................................................................................................................................... 257
IPSec ................................................................................................................................................................................. 258
Security Certificates .................................................................................................................................................... 259
Concealing or Showing Job Names ...................................................................................................................... 261
802.1x .............................................................................................................................................................................. 262
Displaying or Hiding Network Settings ............................................................................................................... 263
System Timeout ........................................................................................................................................................... 264
USB Port Security ......................................................................................................................................................... 265
Restricting Access to the Web User Interface .................................................................................................. 266
Software Verification Test ........................................................................................................................................ 267