Xerox 6100BD - Phaser Color Laser Printer Manuale di sicurezza - Pagina 30

Sfoglia online o scarica il pdf Manuale di sicurezza per Software Xerox 6100BD - Phaser Color Laser Printer. Xerox 6100BD - Phaser Color Laser Printer 38. Disk overwrite installation and usage
Anche per Xerox 6100BD - Phaser Color Laser Printer: Manuale di installazione (34 pagine), Specifiche tecniche (2 pagine), Manuale d'uso (32 pagine), Opuscolo e specifiche (4 pagine), Manuale d'uso (28 pagine), Manuale di installazione (2 pagine), Manuale di installazione (2 pagine), Nota di rilascio (2 pagine), Manuale introduttivo (37 pagine), Manuale (34 pagine), Manuale (34 pagine), Manuale introduttivo (34 pagine), Manuale d'uso (32 pagine), Manuale (11 pagine), Manuale di installazione e funzionamento (8 pagine)

Xerox 6100BD - Phaser Color Laser Printer Manuale di sicurezza
Using an Existing Signed Certificate from a Certificate Authority
26
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Click on the 'Enable SSL/TLS' checkbox at the top of the SSL/
TLS window.
Select a SSL/TLS mode of operation:
Normal (Encrypted and Unencrypted Access)
Secure (Encrypted Access Only)
Select encryption strength:
Normal (DES-MD5-56-bit)
Normal (DES-MD5-40-bit)
Normal (DES-MD5-128-bit)
Normal (3DES-MD5-128bit)
High (RC4-MD5-128-bit)
High (3DES-MD5-128-bit)
If SSL/TLS is not already enabled
Click 'Add Certificate'
Step 1 - Select "Signed Certificate from a Certificate Authority"
Step 2 - Select and enter either the server
Domain Name
IP Address
Other
Step 3 - Enter the requested information:
Organization (required)
Organizational Unit (optional)
E-mail (optional)
Locality (optional)
State/Province (optional)
Country (required)
Step 4 - Browse to the location of the signed certificate (.pem
file).
Step 5 - Verify information entered in previous steps.
Step 6 - A message will appear indicating that the certificate
has been installed.
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Security Guide