Xerox Versant 180 Press Güvenlik Kılavuzu - Sayfa 19
Yazıcı Xerox Versant 180 Press için çevrimiçi göz atın veya pdf Güvenlik Kılavuzu indirin. Xerox Versant 180 Press 45 sayfaları. Quick reference for printing extra large sheets (xls) on the ex 180 and ex-i 180 print servers, powered by fiery
Ayrıca Xerox Versant 180 Press için: Hızlı Referans (6 sayfalar), Hızlı Referans (2 sayfalar)
Xerox® Security Guide for Entry Production Color Class Products
o
Prevent impersonation (aka spoofing) of a printer/MFP
o
Automatically prevent connection of non-approved print products
o
Smart rules-based policies to govern user interaction with network printing products
Provide simplified implementation of security policies for printers and MFPs by:
o
Providing real time policy violation alerts and logging
o
Enforcing network segmentation policy
o
Isolating the printing products to prevent general access to printers and MFPs in
restricted areas
Automated access to policy enforcement
Provide extensive reporting of printing product network activity
Network Access Control
Cisco ISE
Contextual Endpoint Connection Management
Traditionally network connection management has been limited to managing endpoints by IP address and
use of VLANs and firewalls. This is effective, but highly complex to manage for every endpoint on a
network. Managing, maintaining, and reviewing the ACLs (and the necessary change management and
audit processes to support them) quickly become prohibitively expensive. It also lacks the ability to
manage endpoints contextually.
Connectivity of Versant® and ColorPress® devices can be fully managed contextually by Cisco
TrustSec. TrustSec uses Security Group Tags (SGT) that are associated with an endpoint's user, device,
and location attributes. SG-ACLs can also block unwanted traffic so that malicious reconnaissance
activities and even remote exploitation from malware can be effectively prevented.
FIPS140-2 Compliance Validation
When enabled, the product will validate its current configuration to identify cryptographic modules in use.
Modules which are not FIPS 140-2 (Level 1) compliant will be reported.
Versant® products include FIPS compliant algorithms of Kerberos, however an exception can be
approved to run these in non-FIPS compliant mode when configured for non-FIPS algorithms.
Versant® products use encryption algorithms for Kerberos, SMB, and PDF Direct Print Service that are
not approved by FIPS140-2. They can however operate in FIPS140-2 approved Mode in order to
maintain compatibility with conventional products after an exception is approved by a system
administrator. They do not use FIPS compliant algorithms when in this configuration.
Additional Network Security Controls
Additional network security controls are discussed in the following sections.
Endpoint Firewall Options
Firewall
Stateful Firewall
March 2019
Versant® 80/180 Press Versant® 2100/3100
Press
Versant 80 Press, Versant
Versant 2100 Press,
180 Press
Versant 3100 Press
Supported
Supported
Versant® 80/180 Press Versant® 2100/3100
Press
Versant 80 Press, Versant
Versant 2100 Press,
180 Press
Versant 3100 Press
Stateful Packet Filter
IP Whitelisting
Supported
Supported
Color 800/100 Press®
Color 800/1000 Presses,
Color 800i/1000i Presses
(Not Supported)
Color 800/100 Press®
Color 800/1000 Presses,
Color 800i/1000i Presses
IP Whitelisting
Supported
Page 3-17