Administrator's Guide
Contents 
4  Xerox
®
 ColorQube 8580/8880 Color Printer 
  System Administrator Guide 
AirPrint ................................................................................................................................................................................... 36 
SNMP ..................................................................................................................................................................................... 37 
SNMP v1/v2c............................................................................................................................................................... 37 
SNMP v3 ....................................................................................................................................................................... 38 
Configuring the SNMP Access Control List .................................................................................................... 41 
Disabling and Enabling SNMP ............................................................................................................................ 41 
FTP .......................................................................................................................................................................................... 42 
Email Server or SMTP ...................................................................................................................................................... 43 
Configuring MaiLinX ........................................................................................................................................................ 44 
EtherTalk............................................................................................................................................................................... 45 
WSD ........................................................................................................................................................................................ 46 
Configuring WSD ...................................................................................................................................................... 46 
4    Security  47 
Optimizing Printer Security in a High-Risk Environment .................................................................................. 48 
Administrative Security Settings ................................................................................................................................ 49 
Access Control Lists .................................................................................................................................................. 49 
Configuring Administrative Security Settings .............................................................................................. 50 
Printing Security Settings .............................................................................................................................................. 51 
Setting the Print Host Access List ...................................................................................................................... 51 
Configuring the Removal of Print Jobs ............................................................................................................ 51 
Deleting Secure Jobs ............................................................................................................................................... 52 
Job Accounting .......................................................................................................................................................... 53 
About Certificates ............................................................................................................................................................. 54 
Installing a Digital Certificate ............................................................................................................................. 55 
Adding or Creating a Certificate ........................................................................................................................ 
55 
Managing Certificates ............................................................................................................................................ 56 
Setting the Certificate Key Length .................................................................................................................... 56 
Configuring 802.1X .......................................................................................................................................................... 57 
About HTTPS and SSL ..................................................................................................................................................... 58 
Configuring HTTPS and SSL ......................................................................................................................................... 59 
IPsec ....................................................................................................................................................................................... 60 
Enabling IPsec ............................................................................................................................................................ 60 
Disabling IPsec ........................................................................................................................................................... 61 
Managing Security Policies ................................................................................................................................... 61 
Managing Host Groups .......................................................................................................................................... 62 
Managing Protocol Groups ................................................................................................................................... 62 
Managing Actions .................................................................................................................................................... 63 
Setting Access Control Levels ...................................................................................................................................... 65 
Setting Access Control Levels .............................................................................................................................. 65 
5    Administrator Tools  67 
Accessing Usage Profile Reports ................................................................................................................................ 68 
Configuring Emulations ................................................................................................................................................. 69 










