Xerox 6100BD - Phaser Color Laser Printer Beveiligingshandleiding - Pagina 30

Blader online of download pdf Beveiligingshandleiding voor {categorie_naam} Xerox 6100BD - Phaser Color Laser Printer. Xerox 6100BD - Phaser Color Laser Printer 38 pagina's. Disk overwrite installation and usage
Ook voor Xerox 6100BD - Phaser Color Laser Printer: Installatiehandleiding (34 pagina's), Specificaties (2 pagina's), Gebruikershandleiding (32 pagina's), Brochure & specificaties (4 pagina's), Gebruikershandleiding (28 pagina's), Installatiehandleiding (2 pagina's), Installatiehandleiding (2 pagina's), Release Release (2 pagina's), Aan de slag handleiding (37 pagina's), Handmatig (34 pagina's), Handmatig (34 pagina's), Aan de slag handleiding (34 pagina's), Gebruikershandleiding (32 pagina's), Handmatig (11 pagina's), Installatie- en bedieningshandleiding (8 pagina's)

Xerox 6100BD - Phaser Color Laser Printer Beveiligingshandleiding
Using an Existing Signed Certificate from a Certificate Authority
26
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Click on the 'Enable SSL/TLS' checkbox at the top of the SSL/
TLS window.
Select a SSL/TLS mode of operation:
Normal (Encrypted and Unencrypted Access)
Secure (Encrypted Access Only)
Select encryption strength:
Normal (DES-MD5-56-bit)
Normal (DES-MD5-40-bit)
Normal (DES-MD5-128-bit)
Normal (3DES-MD5-128bit)
High (RC4-MD5-128-bit)
High (3DES-MD5-128-bit)
If SSL/TLS is not already enabled
Click 'Add Certificate'
Step 1 - Select "Signed Certificate from a Certificate Authority"
Step 2 - Select and enter either the server
Domain Name
IP Address
Other
Step 3 - Enter the requested information:
Organization (required)
Organizational Unit (optional)
E-mail (optional)
Locality (optional)
State/Province (optional)
Country (required)
Step 4 - Browse to the location of the signed certificate (.pem
file).
Step 5 - Verify information entered in previous steps.
Step 6 - A message will appear indicating that the certificate
has been installed.
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Security Guide