O P E R A T I O N A L C O N S I D E R A T I O N S A L T A L I N K ® C 8 0 0 0 S E R I E SCustomer Expectation and Installation Guide 27Network Connectivity ExpectationsUSB Wireless Network Adapter Your Xerox Device can be equipped with an optional Xerox USB 802.11b/g/n (2.4GHz) Wireless Adapter to enable WiFi connectivity. When utilizing thisXerox Device over WiFi, it is important to understand the performance impacts that may result from WiFi technology. Compared to a wired Ethernetconnection, WiFi performance varies significantly due to many factors that are specific to wireless technology. Some of these factors include: WiFi LAN Overhead, Proximity to Access Point (AP) and Physical Obstacles (i.e. Signal Strength), Network usage / APLoading and Radio Frequency (RF) interference. For more information, refer to the Xerox USB Wireless Adapter – WiFi Performance PrimerScanning Expectations The Xerox® C8030/8035/8045/8055/8070 supports scan to network folder, Scan to USB, Scan to Mailbox, Scan to Home and Scan to email functionalityas standard.Scan Resolution The maximum image scan resolution is 600 dpi. The default scan resolution is set to 200dpi. Note: Several resolution settings are selectable via the User Interface touch panel. Lower resolutions will result in files that are smaller in size therebyreducing network traffic. When scanning the OCR processing, image compression, file formatting and file transfer operations all continue after the job has completed scanningby the scanner.Heavy print usage may delay the processing of scan jobs.Security ExpectationsXerox Smart Card, Kerberos, and FIPS140-2 support includes: CAC, PIV, .NET cards, S/MIME- encrypted email to self and others via LDAP or Address Book. Email signing. FIPS 140-2 encryption (SSL only) FIPS 140-2 encryption (Disk & IPsec) only for IPv4McAfee Embedded Control McAfee® Built-in Enhanced Security is the Standard offering on the C8000 series that can detect and prevent unauthorized read-modify-write of files byunauthorized persons/systems. Built-in security prevents unauthorized reading, writing, adding of any of the systems protected files & directories. Anyunauthorized attempt to modify these protected filed are recorded to the audit log on the device and can be setup to send email alerts thru CWIS,Embedded Web Server Web, Xerox Device Manager, or McAfee ePolicy Orchestrator. Optional purchasable McAfee®Integrity Control provides the same protections as Embedded Security with some key additions. Prevents new files from being EXECUTED from ANY location via untrusted means. By utilizing whitelisting technology from McAfee the multi-functiondevice prevents a targeted attack from executing an unauthorized and possibly malicious program such as malware. Prevents WRITING of protected executable files. Integrity Control prevents the malicious overwrite of operating system thru executables. FileInventory is hashed to prevent malicious changing of it.Cisco TrustSec Identity Services Integration® Automatically tracks new devices (via Profiler with Advanced license) connecting to the network "Firewall" the printer to prevent general access to restricted printers Automatically provision and grant printers appropriate network access to prevent impersonation & inappropriate access Single inventory for printer management, access and location-aware printer management