Xerox WorkCentre 3655 Secure Installation And Operation Download Page 14

 

13 

 

 

Once Embedded Device Security is enabled on the device, any attempts to read from read-protected files and 
directories or to change write-protected files and directories will result in a Security Alert being recorded in the 
Audit Log. If configured, an email alert will also be sent. 

h.  Be careful not to create an IP Filtering rule that rejects incoming TCP traffic from all addresses with source port set 

to  80;  this  will  disable  the  Web  UI.  Also,  configure  IP  filtering  so  that  traffic  to  open  ports  from  external  users 
(specified by subnet mask) is dropped and so that following ports for web services are closed:  tcp ports 53202, 
53303, 53404 and tcp/udp port 3702. Also, ensure that entire access to the device is not blocked by defining, for 
example, a rule for IP Address 0.0.0.0 with a reject/drop action kept in Position 1 in the list of IP Filters.  

i. 

E

nsure the user permission roles names do not contain single quotes (‘) or double quotes (“). 

j. 

Ensure there are no jobs being held by the device when data encryption is enabled/disabled.  

k.  If  the  hash  algorithm  is  selected  to  be  SHA-256  (for  those  cases  (e.g.,  IPsec)  where  a  hash  algorithm  can  be 

selected) the Administrator may not be able to change the hash selection to be SHA-1.  

l. 

Users should be aware that correct remote repository document pathnames for the receipt of workflow scanning 
jobs should start wit

h one ‘\’ as opposed to the two ‘\’s shown in the SAG (e.g., page 140).   

m.  Users  should  be  provided  with  appropriate  training  on  how  to  use  the  device  in  a  secure  manner  before  being 

assigned user accounts to access the device.  

n.  Before upgrading software on the device via the Manual/Automatic Customer Software Upgrade, please check for 

the latest certified software versions. Otherwise, the machine may not remain in its evaluated configuration. 

o.  Users experiencing problems logging in to the device using the Web UI only on a particular web browser are advised 

to switch to a different web browser.   

p.  The  device  should  be  installed  in  a  standard  office  environment.  Office  personnel  should  be  made  aware  of 

authorized service calls (for example through appropriate signage) in order to discourage  unauthorized physical 
attacks such as attempts to remove the internal hard disk drive(s). Ensure that office personnel are made aware to 
pick up the outputs of print and copy jobs in a timely manner. 

q.  Caution:  The  device  allows  an  authenticated  System  Administrator  to  disable  functions  like  Image  Overwrite 

Security that are necessary for secure operation. Periodically review the configuration of all installed machines in 
your environment to verify that the proper evaluated configuration is maintained. 

r.  System Administrators should avoid opening emails and attachments from unknown sources unless the emails and 

attachments have been properly scanned for viruses, malware, etc.  

s.  System Administrators and users should: 

 

Whenever possible use a browser to access the WebUI whose only purpose is to access the WebUI. 

 

Always logoff the browser immediately after completing any tasks associated with accessing the WebUI.  

 

Not allow the browser to either save their username/password or “remember” their login.  

 

Follow  secure  measures,  only  use  browsers  with  TLS  1.0  and  above  and  not  open  any  malicious  links  or 
documents with their browser. 

IV. 

Secure Operation

 of Device Services/Functions Not Part of the Evaluated Configuration 

a.  Change  the  SNMPv1/v2c  public/private  community  strings  from  their  default  string  names  to  random  un-

guessable string names of at least 8 characters in length. 

b.  SNMPv3  cannot  be  enabled  until  SSL  and  HTTPS  (SSL)  are  enabled  on  the  machine. To  enable  SNMPv3 

follow the instructions f

or “Configuring SNMPv3” under “SNMP” in Section 3 of the SAG.  

Be  aware  that  in  configuring  SNMPv3  there  is  the  option  of  resetting  both  the  Privacy  and  Authentication 
passwords  back  to  their  default  values.  This  option  should  only  be  used  if  necessary  since  if  the  default 
passwords are not known no one will be able to access the SNMP administrator account

8

                     

8

The SNMP administrator account is strictly for the purposes of accessing and modifying the MIB objects via SNMP; it is separate from the 

System Administrator “admin” user account or user accounts given SA privileges by the System Administrator “admin” user. The administrator 

account cannot perform any System Administrator functions.   

Summary of Contents for WorkCentre 3655

Page 1: ...ntre 5845 5855 5865 5865i 5875 5875i 5890 5890i WorkCentre 5945 5945i 5955 5955i WorkCentre 6655 6655i WorkCentre 7220 7220i 7225 7225i WorkCentre 7830 7830i 7835 7835i 7845 7845i 7855 7855i WorkCentr...

Page 2: ...from the Common Criteria Certified Product website http www commoncriteriaportal org products html list of evaluated products from the Xerox security website http www xerox com information security c...

Page 3: ...Accessing Administration and Configuration Settings in Section 2 of the applicable System Administration Guide SAG 5 To log in to the Local User Interface denoted hereafter in this document as the Con...

Page 4: ...ructions in Section 4 of the SAG Set up unique user accounts with appropriate privileges on the device for all users who require access to the device by following the User Database instructions in Sec...

Page 5: ...ed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certificate befor...

Page 6: ...number for the Audit Log Server Enter the directory path to the filename where the transferred Audit Log is to be stored Enter the login name and password to access the Audit Log server Either schedu...

Page 7: ...re print job only the submitter of a held print job can release the job and only the System Administrator can delete any print job 16 802 1x Device Authentication Enable and configure 802 1x device au...

Page 8: ...ption and signing Workflow Scanning Scan to Mailbox Scan to USB Print from USB Print from Mailbox NTP SMB Filing When setting up the device to be in the evaluated configuration perform the following s...

Page 9: ...Fax in Section 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remot...

Page 10: ...encryption and signing of Scan to Email jobs by following the instructions for Configuring Email Encryption Settings and Configuring Email Signing Settings respectively under Configuring Email Securit...

Page 11: ...0 of the SAG II Secure Acceptance Secure acceptance once device delivery and installation is completed should be done by Printing out a Configuration Report from the Web UI by following the Printing t...

Page 12: ...age will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same time a copy job is being processed by the device...

Page 13: ...certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository When an SSL certificate for a remote SSL repository fails its validation checks...

Page 14: ...rvice calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts to remove the internal hard disk drive s Ensure that office personnel are made...

Page 15: ...vice Allows the user to pause an active copy print workflow scanning scan to email Internet Fax or Embedded Fax job while it is being processed Is accessible by selecting the Stop machine hard button...

Page 16: ...Filter guess algorithm will use a strict or loose interpretation Is accessible by typing http IP Address diagnostics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator...

Page 17: ...t be displayed for a device in the evaluated configuration Scan Image Compression Allows the System Administrator to manage the asymmetric sub sampling options of scan image processing Is accessible b...

Page 18: ...m the Web User Interface with no user login and authentication required Site Map Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by se...

Page 19: ...oss of business profits or special damages even if Xerox Corporation has been advised of the possibility of such damages Some states do not allow the exclusion or limitation of liability for consequen...

Reviews: