Xerox 6100BD - Phaser Color Laser Printer Güvenlik Kılavuzu - Sayfa 30

Yazılım Xerox 6100BD - Phaser Color Laser Printer için çevrimiçi göz atın veya pdf Güvenlik Kılavuzu indirin. Xerox 6100BD - Phaser Color Laser Printer 38 sayfaları. Disk overwrite installation and usage
Ayrıca Xerox 6100BD - Phaser Color Laser Printer için: Kurulum Kılavuzu (34 sayfalar), Teknik Özellikler (2 sayfalar), Kullanıcı Kılavuzu (32 sayfalar), Broşür ve Teknik Özellikler (4 sayfalar), Kullanıcı Kılavuzu (28 sayfalar), Kurulum Kılavuzu (2 sayfalar), Kurulum Kılavuzu (2 sayfalar), Yayın Notu (2 sayfalar), Başlangıç Kılavuzu (37 sayfalar), Manuel (34 sayfalar), Manuel (34 sayfalar), Başlangıç Kılavuzu (34 sayfalar), Kullanıcı Kılavuzu (32 sayfalar), Manuel (11 sayfalar), Kurulum ve Kullanım Kılavuzu (8 sayfalar)

Xerox 6100BD - Phaser Color Laser Printer Güvenlik Kılavuzu
Using an Existing Signed Certificate from a Certificate Authority
26
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Click on the 'Enable SSL/TLS' checkbox at the top of the SSL/
TLS window.
Select a SSL/TLS mode of operation:
Normal (Encrypted and Unencrypted Access)
Secure (Encrypted Access Only)
Select encryption strength:
Normal (DES-MD5-56-bit)
Normal (DES-MD5-40-bit)
Normal (DES-MD5-128-bit)
Normal (3DES-MD5-128bit)
High (RC4-MD5-128-bit)
High (3DES-MD5-128-bit)
If SSL/TLS is not already enabled
Click 'Add Certificate'
Step 1 - Select "Signed Certificate from a Certificate Authority"
Step 2 - Select and enter either the server
Domain Name
IP Address
Other
Step 3 - Enter the requested information:
Organization (required)
Organizational Unit (optional)
E-mail (optional)
Locality (optional)
State/Province (optional)
Country (required)
Step 4 - Browse to the location of the signed certificate (.pem
file).
Step 5 - Verify information entered in previous steps.
Step 6 - A message will appear indicating that the certificate
has been installed.
NOTE: During steps 2-5, the user may go back and correct any
mistakes made in previous steps.
Security Guide