Xerox Versant 80 Press 보안 매뉴얼 - 페이지 19

{카테고리_이름} Xerox Versant 80 Press에 대한 보안 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Xerox Versant 80 Press 45 페이지. Entry production color presses
Xerox Versant 80 Press에 대해서도 마찬가지입니다: 안전 매뉴얼 (26 페이지), 고객 기대치 및 설치 매뉴얼 (48 페이지)

Xerox Versant 80 Press 보안 매뉴얼
Xerox® Security Guide for Entry Production Color Class Products
o
Prevent impersonation (aka spoofing) of a printer/MFP
o
Automatically prevent connection of non-approved print products
o
Smart rules-based policies to govern user interaction with network printing products
Provide simplified implementation of security policies for printers and MFPs by:
o
Providing real time policy violation alerts and logging
o
Enforcing network segmentation policy
o
Isolating the printing products to prevent general access to printers and MFPs in
restricted areas
Automated access to policy enforcement
Provide extensive reporting of printing product network activity
Network Access Control
Cisco ISE

Contextual Endpoint Connection Management

Traditionally network connection management has been limited to managing endpoints by IP address and
use of VLANs and firewalls. This is effective, but highly complex to manage for every endpoint on a
network. Managing, maintaining, and reviewing the ACLs (and the necessary change management and
audit processes to support them) quickly become prohibitively expensive. It also lacks the ability to
manage endpoints contextually.
Connectivity of Versant® and ColorPress® devices can be fully managed contextually by Cisco
TrustSec. TrustSec uses Security Group Tags (SGT) that are associated with an endpoint's user, device,
and location attributes. SG-ACLs can also block unwanted traffic so that malicious reconnaissance
activities and even remote exploitation from malware can be effectively prevented.

FIPS140-2 Compliance Validation

When enabled, the product will validate its current configuration to identify cryptographic modules in use.
Modules which are not FIPS 140-2 (Level 1) compliant will be reported.
Versant® products include FIPS compliant algorithms of Kerberos, however an exception can be
approved to run these in non-FIPS compliant mode when configured for non-FIPS algorithms.
Versant® products use encryption algorithms for Kerberos, SMB, and PDF Direct Print Service that are
not approved by FIPS140-2. They can however operate in FIPS140-2 approved Mode in order to
maintain compatibility with conventional products after an exception is approved by a system
administrator. They do not use FIPS compliant algorithms when in this configuration.

Additional Network Security Controls

Additional network security controls are discussed in the following sections.
Endpoint Firewall Options
Firewall
Stateful Firewall
March 2019
Versant® 80/180 Press Versant® 2100/3100
Press
Versant 80 Press, Versant
Versant 2100 Press,
180 Press
Versant 3100 Press
Supported
Supported
Versant® 80/180 Press Versant® 2100/3100
Press
Versant 80 Press, Versant
Versant 2100 Press,
180 Press
Versant 3100 Press
Stateful Packet Filter
IP Whitelisting
Supported
Supported
Color 800/100 Press®
Color 800/1000 Presses,
Color 800i/1000i Presses
(Not Supported)
Color 800/100 Press®
Color 800/1000 Presses,
Color 800i/1000i Presses
IP Whitelisting
Supported
Page 3-17