Xerox Phaser 7500 管理员指南
Security Features
Phaser 7500 Color Printer
System Administrator Guide
System Administrator Guide
40
Root-Signed Certificates
Root-signed certificates are from a trusted Certificate Authority (CA). Using a certificate signed by a CA
enables you to load one certificate into each browser, allowing access to all printers. Certificates from a
trusted third party are considered more secure than self-signed certificates. Unlike self-signed
certificates, root-signed certificates are not susceptible to man-in-the-middle attacks.
enables you to load one certificate into each browser, allowing access to all printers. Certificates from a
trusted third party are considered more secure than self-signed certificates. Unlike self-signed
certificates, root-signed certificates are not susceptible to man-in-the-middle attacks.
See also:
Access Control Lists
Access control lists enable you to limit access to devices, as well as device configuration and
management features. By default, access control lists are unrestricted, which means all computers and
host systems are allowed access.
management features. By default, access control lists are unrestricted, which means all computers and
host systems are allowed access.
The printer has four access control lists that may be configured using CentreWare IS:
•
Print Host Access List: The computers from which users can print. For information on setting up
the Print Host Access List, see
the Print Host Access List, see
•
Administrator Access List: The computers from which you can change printer settings. For
information on setting up the Administrator Access List, see
information on setting up the Administrator Access List, see
•
Key User Access List: The computers from which key users can change printer settings. For
information on setting up the Key User Access List, see
information on setting up the Key User Access List, see
•
SNMP Access Control List: The host machines that are authorized to access the printer using
SNMP. For information on setting up the SNMP Access List, see
SNMP. For information on setting up the SNMP Access List, see