background image

 

Secure Installation and Operation of Your VersaLink

®

 Multifunction 

and Single Function Printer 

 

 

 

Purpose and Audience 

This

 docum

ent provides information on the secure installation, setup and operation. All customers, but  particularly those 

concerned with secure installation and operation of these devices, should follow these guidelines. 

Overview 

This document lists some important customer information and guidelines

1

 that will ensure that your device is operated and 

maintained in a secure manner.   

I.

 

Secure Installation and Set-up  

To set up the machines in a secure manner, follow the guidelines below: 

a.

 

Set up and configure the following security protocols and functions in the evaluated configuration: 

 

Immediate Image Overwrite 

 

On Demand Image Overwrite 

 

Data Encryption 

 

FIPS 140-2 Mode 

 

IP Filtering  

 

Audit Log 

 

Security Certificates, Transport Layer Security (TLS)/Secure Sockets Layer (SSL)

 

and HTTPS 

 

IPsec 

 

Local, Remote or Smart Card Authentication 

 

Local or Remote Authorization  

 

User Permissions 

 

Personalization 

 

802.1x Device Authentication 

 

Session Inactivity Timeout 

 

USB Port Security 

 

Embedded Fax Secure Receive  

 

Secure Print 

 

S/MIME 

System Administrator authentication is required when accessing the security features and administrative functions of the 
device  or  when  implementing  the  guidelines  and  recommendations  specified  in  this  document.  To  log  in  as  an 
authenticated System Administrator via the Embedded Web Server Interface ( denoted hereafter as the Web UI), follow 
the instructions under “Accessing the Embedded Web Server as a System Administrator” under “Accessing Administration 
and Configuration Settings” in Section 2 of the applicable System Administration Guide (SAG)

2

.  

To log in as an authenticated System Administrator via the Local User Interface (denoted hereafter in this document as 
the Control Panel), follow “Accessing the Control Panel as a System Administrator” under “Accessing Administration and 
Configuration Settings” in Section 2 of the SAG. 

To log in as an authenticated user who is not the System Administrator ‘admin’ user, follow the instructions for “Accessing 
the Embedded Web Server as a System Administrator” under “Accessing Administration and Configuration Settings” in 
Section 2 of the applicable System Administration Guide (SAG), except that instead of entering ‘admin’ for the User ID 
and the system administrator password the user should enter his/her User ID and his/her authentication password.  

For secure operation do not use the ‘Simple Login’ method. 

b.

 

Follow the instructions located in Chapter 4, Security, in the SAG to set up the security functions listed in Item a above. 

Note that whenever the SAG

 

requires that the System Administrator provide an IPv4 address, IPv6 address or port number 

the values should be those that pertain to the particular device being configured. 

                                                                    

1

 All guidelines in this document apply to the System Administrator unless explicitly stated otherwise. 

2

Xerox

®

 VersaLink

®

 Series Multifunction and Single Function Printers System Administrator Guide, Version 1.1, April 2017  

Summary of Contents for VersaLink

Page 1: ...Version 1 0 July 10 2017 Secure Installation and Operation Xerox VersaLink Multifunction and Single Function Printer...

Page 2: ...rights reserved Xerox and Xerox and Design and VersaLink are trademarks of Xerox Corporation in the United States and or other countries BR22046 Other company trademarks are also acknowledged Documen...

Page 3: ...Web Server Interface denoted hereafter as the Web UI follow the instructions under Accessing the Embedded Web Server as a System Administrator under Accessing Administration and Configuration Settings...

Page 4: ...tting the Network Login Method instructions in Section 4 of the SAG to set up an Authentication Server For the most secure network authentication the preferred authentication types are Kerberos or LDA...

Page 5: ...can be installed on the device follow the instructions for Creating a Certificate Signing Request under Security Certificates in Section 4 of the SAG to create the CSR If desired certificate path val...

Page 6: ...ession Inactivity Timeout Enable the session inactivity timers termination of an inactive session from the Web UI by following the instructions for Setting System Timeouts in Section 4 of the SAG The...

Page 7: ...setting Fax Forwarding in Configuring the Fax Settings at the Control Panel under Configuring General Settings and Policies 4 Scan to Email Set the domain filtering to limit the domains to which Scan...

Page 8: ...llowing internal customer policies and procedures required to evaluate and install devices in your environment III Secure Operation of Device Services Functions a Change the following passcodes on a r...

Page 9: ...riate training on how to use the device in a secure manner before being assigned user accounts to access the device j Users experiencing problems logging in to the device using the Web UI only on a pa...

Page 10: ...nter or suspect software problems should immediately contact the Xerox Customer Support Center to report the suspected problem and initiate the SPAR Software Problem Action Request 6 process for addre...

Reviews: