Xerox Versant 80 Press Beveiligingshandleiding - Pagina 18
Blader online of download pdf Beveiligingshandleiding voor {categorie_naam} Xerox Versant 80 Press. Xerox Versant 80 Press 45 pagina's. Entry production color presses
Ook voor Xerox Versant 80 Press: Veiligheidshandboek (26 pagina's), Klantverwachting en installatiehandleiding (48 pagina's)
Xerox® Security Guide for Entry Production Color Class Products
Network Access Control
802.1x
In 802.1X authentication, when the product is connected to the LAN port of Authenticator such as the
switch as shown below, the Authentication Server authenticates the product, and the Authenticator
controls access of the LAN port according to the authentication result. The product starts authentication
processing at startup when the startup settings for 802.1X authentication are enabled.
Product
(Supplicant)
Network Access Control
802.1x
Authentication Methods
Cisco Identity Services Engine (ISE)
Cisco ISE is an intelligent security policy enforcement platform that mitigates security risks by providing a
complete view of which users and what products are being connected across the entire network
infrastructure. It also provides control over what users can access on your network and where they can
go. Cisco's ISE includes over 200 Xerox® product profiles that are ready for security policy enablement.
This allows ISE to automatically detect Xerox® products in your network. Xerox® products are organized
in Cisco ISE under product families, such as Versant®, enabling Cisco ISE to automatically detect and
profile new Xerox® products from the day they are released. Customers who use Cisco ISE find that
including Xerox® products in their security policies is simpler and requires minimal effort.
Cisco ISE Profiling Services provides dynamic detection and classification of endpoints connected to the
network. ISE collects various attributes for each network endpoint to build an endpoint database. The
classification process matches the collected attributes to prebuilt or user-defined conditions, which are
then correlated to an extensive library of product profiles. These profiles include a wide range of product
types, including tablets, smartphones, cameras, desktop operating systems (for example, Windows®,
Mac OS® X, Linux® and others), and workgroup systems such as Xerox printers and MFPs.
Once classified, endpoints can be authorized to the network and granted access based on their profile
signature. For example, guests to your network will have different level of access to printers and other
end points in your network. For instance, you and your employees can get full printer access when
accessing the network from a corporate workstation but be granted limited printer access when accessing
the network from your personal Apple® iPhone®.
Cisco ISE allows you to deploy the following controls and monitoring of Xerox® products:
Automatically provision and grant network access rights to printers and MFPs to prevent
inappropriate access (including automatically tracking new printing products connecting to the
network):
o
Block non-printers from connecting on ports assigned to printers
March 2019
Authenticator
(e.g. Switch)
EAPOL
Versant® 80/180 Press Versant® 2100/3100
Versant 80 Press, Versant
180 Press
Supported
PSK, AES (CCMP)/TKIP,
PEAPv0/MS-CHAPv2,
EAP-TLS, EAP-
TTLS/PAP, EAP-
TTLS/MS-CHAPv2, EAP-
TTLS/EAP-TLS
Authentication
Server
Color 800/100 Press®
Press
Versant 2100 Press,
Color 800/1000 Presses,
Versant 3100 Press
Color 800i/1000i Presses
Supported
Supported
MD5, MS-CHAPv2,
MD5, MS-CHAPv2,
PEAP/MS-CHAPv2, EAP-
PEAP/MS-CHAPv2,
TLS
EAP-TLS
Page 3-16