background image

 

 

ii.  Set the permission for all Non-Logged In Users Roles 

(see “User Roles” in Section 4 of the SAG) to be 

Not Allowed

Not Allowed & Hidden

 or 

Never

, as appropriate, for the following: (1) all print permission 

categories (by following the “Editing Print Permissions for the Non-Logged In Users Role” under 
“Configuring Authorization Settings” in Section 4 of the SAG) and (2) all services and tools (by following 
the “Editing Services and Tools Permissions for the Non-Logged In Users Role” under “Configuring 
Authorization Settings” in Section 4 of the SAG). Also set the  

Network Authorization 

i. 

Establish remote authorization using LDAP by following the “Configuring Network Authorization Settings” 
and “Configuring Network Authorization Server Settings” instructions in Section 4 of the SAG. Make sure 
to follow only the instructions pertaining to setting up an LDAP Server. 

Network Authorization using an SMB server is not part of the evaluated configuration and should not be 
used.  

4. 

Personalization

Enable personalization by following the instructions for “Specifying the Method the Printer 

Uses to Acquire Email Address of Users” under “Configuring Smart Card Authentication Settings” under 
“Configuring Authentication Settings” in Section 4 of the SAG. Configure personalization by following the 
instructions for “Configuring User Mappings” under “LDAP” in Section 3 of the SAG. 

5. 

Immediate  Image  Overwrite

:  Follow  the  instructi

ons  under  ‘Enabling  Immediate  Image  Overwrite  at  the 

Control Panel’ or ‘Enabling Immediate Image Overwrite’ in Section 4 of the SAG to enable Immediate Image 
Overwrite from the Control Panel or the Web UI, respectively. 

Both Immediate Image Overwrite and On Demand Image Overwrite are enabled by default at the factory when 
the device is first delivered. 

6. 

Security Certificates

: Install a digital certificate on the device before enabling SSL by following the appropriate 

instructions  under  “Security  Certificates”  in  in  Section  4  of  the  SAG  for  installing  the  any  one  of  the  digital 
certificates (Device Certificate, CA Certificate or Trusted Certificate) the device supports.  

Note  that  a  Xerox  self-signed  certificate  is  installed  by  default  on  the  device. If  a  CA  certificate  is  desired  a 
Certificate  Signing Request (CSR)  will  have  to be sent to a  Certificate Authority to obtain the CA Certificate 
before  it  can  be  installed  on  the  device.  F

ollow the instructions for “Creating a  Certificate  Signing Request” 

under “Security Certificates” in in Section 4 of the SAG to create the CSR. 

7. 

Transport Layer Security (TLS)/Secure Sockets Layer (SSL)

i. 

Follow  the  instructions  under  ‘Enabling  DND/DDNS  Settings  the  Control  Panel’  or  ‘”DNS”  (under 
“Configuring IP Settings in CentreWare Internet Services”) in Section 3 of the SAG for entering the host 
and  domain  names,  to  assign  the  machine  a  valid,  fully  qualified  machine  name  and  domain  from  the 
Control Panel or the Web UI, respectively (required for SSL to work properly). 

ii.  If a self-signed certificate is to be used download the generic Xerox root CA certificate from the device by 

following the instructions for saving the certificate file under “Viewing, Saving or Deleting a Certificate” in 
Section  4  of  the  SAG  and  then  installing  the  saved  certificate  in  the  certificate  store  of  the  System 
Administrator's browser. 

iii.  Enable HTTPS by following the  instructions 

for “Enabling HTTPS (SSL)” under “Secure HTTP (SSL)” in 

Section  4  of  the  SAG. 

Set  the  ‘Force  Traffic  over  SSL’  option  to  be 

Yes  (all  HTTP  requests  will  be 

switched to HTTPS)

iv.  Disable  SSLv3.0  in  favor  of  TLS  v1.x  to  avoid  vulnerabilities  associated  with  downgrading  from  TLS  to 

SSLv3.0.  

8. 

FIPS 140-2 Mode

: Encryption of transmitted and stored data by the device must meet the FIPS 140-2 Standard. 

Enable the use of encryption in “FIPS 140 mode” and check for compliance of certificates stored on the device 
to  the  FIPS  140-

2  Standard  by  follow  the  instructions  for  “Enabling  FIPS  140  Mode  and  Checking  for 

Compliance” in Section 4 of the SAG.  

Since Kerberos and SFTP are not FIPS compliant secure protocols, make sure when enabling FIPS mode that 
you set up the proper exceptions for both Kerberos and SFTP. 

9. 

Data Encryption

: Enable data 

encryption by following the instructions under “Enabling Encryption of Stored 

Data”  in  Section  4 of the  SAG;  data encryption is enabled by default  at the factory  when  the  device is first 
delivered.  Before  enabling  disk  encryption,  ensure  that  the  WorkCentre  5845/5855/5865/5875/5890, 

Содержание WorkCentre 3655

Страница 1: ...ntre 5845 5855 5865 5865i 5875 5875i 5890 5890i WorkCentre 5945 5945i 5955 5955i WorkCentre 6655 6655i WorkCentre 7220 7220i 7225 7225i WorkCentre 7830 7830i 7835 7835i 7845 7845i 7855 7855i WorkCentr...

Страница 2: ...from the Common Criteria Certified Product website http www commoncriteriaportal org products html list of evaluated products from the Xerox security website http www xerox com information security c...

Страница 3: ...Accessing Administration and Configuration Settings in Section 2 of the applicable System Administration Guide SAG 5 To log in to the Local User Interface denoted hereafter in this document as the Con...

Страница 4: ...ructions in Section 4 of the SAG Set up unique user accounts with appropriate privileges on the device for all users who require access to the device by following the User Database instructions in Sec...

Страница 5: ...ed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certificate befor...

Страница 6: ...number for the Audit Log Server Enter the directory path to the filename where the transferred Audit Log is to be stored Enter the login name and password to access the Audit Log server Either schedu...

Страница 7: ...re print job only the submitter of a held print job can release the job and only the System Administrator can delete any print job 16 802 1x Device Authentication Enable and configure 802 1x device au...

Страница 8: ...ption and signing Workflow Scanning Scan to Mailbox Scan to USB Print from USB Print from Mailbox NTP SMB Filing When setting up the device to be in the evaluated configuration perform the following s...

Страница 9: ...Fax in Section 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remot...

Страница 10: ...encryption and signing of Scan to Email jobs by following the instructions for Configuring Email Encryption Settings and Configuring Email Signing Settings respectively under Configuring Email Securit...

Страница 11: ...0 of the SAG II Secure Acceptance Secure acceptance once device delivery and installation is completed should be done by Printing out a Configuration Report from the Web UI by following the Printing t...

Страница 12: ...age will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same time a copy job is being processed by the device...

Страница 13: ...certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository When an SSL certificate for a remote SSL repository fails its validation checks...

Страница 14: ...rvice calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts to remove the internal hard disk drive s Ensure that office personnel are made...

Страница 15: ...vice Allows the user to pause an active copy print workflow scanning scan to email Internet Fax or Embedded Fax job while it is being processed Is accessible by selecting the Stop machine hard button...

Страница 16: ...Filter guess algorithm will use a strict or loose interpretation Is accessible by typing http IP Address diagnostics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator...

Страница 17: ...t be displayed for a device in the evaluated configuration Scan Image Compression Allows the System Administrator to manage the asymmetric sub sampling options of scan image processing Is accessible b...

Страница 18: ...m the Web User Interface with no user login and authentication required Site Map Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by se...

Страница 19: ...oss of business profits or special damages even if Xerox Corporation has been advised of the possibility of such damages Some states do not allow the exclusion or limitation of liability for consequen...

Отзывы:

Похожие инструкции для WorkCentre 3655