background image

 

 

f.

 

IPsec

:  Enable  and  configure  IPsec  by  following  the  instructions  under  “IPsec”  in  Section  4  of  the  SAG.    Note  that  IPsec 

should be used to secure printing jobs; HTTPS (SSL) should be used to secure scanning jobs.  Use the default values for IPsec 

parameters whenever possible for secure IPsec setup.  
Note: IPsec is disabled when the device is placed in FIPS 140-2 mode. The system administrator should not enable IPsec 

when the device is already placed in FIPS 140-2 mode. 

V.

 

The following windows are available to any authenticated and authorized user from the Local User Interface. These windows 

provide standard machine services or  job management capability: 

 

Pausing an active job being processed by the device 

– Allows the user to pause an active copy, print, workflow scanning, 

scan to email, Internet Fax or Embedded Fax job while it is being processed. Is accessible by selecting the [

Stop

] machine 

hard button while a job is being processed by the device.  

VI.

 

The Web UI provides a set of on-line help pages that provide guidance on most of the Web UI pages. These on-line help pages 
can be accessed from the Web UI by selecting the [

Help

] button on the upper right hand corner of every Web UI page; the on-

line help page corresponding to the Web UI page being viewed will be displayed. There is also a ‘Contents’ list of all Web UI help 

pages  to  the  left  of  each  help  page;  scrolling  through  the  content  list  and  selecting  the  desired  page  will  also  cause  the 

applicable on-line help page to be displayed. 
 

VII.

 

The following pages are available from the Web User Interface with no user login and authentication required: 

 

Index

 - Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab. Is accessible 

by selecting the [

Index

] button in the upper right hand corner of every Web User Interface page. 

 

Exit from Sleep Mode

 – Automatically informs the user, when the Network Controller is in ‘Sleep Mode’ at the time the user 

attempts to make a change to current settings on a Web User Interface web page, that the Network Controller needs to be 

taken out of ‘Sleep Mode’ before the requested changes can be made.  

VIII.

 

Customers who required specialized changes to support unique workflows in their environment may request specific changes to 

normal  behavior.  Xerox  will  supply  these  SPAR  releases  to  the  specific  customers  requesting  the  change.  Please  note  that  in 

general enabling a specialized customer-specific feature will take the system out of the evaluated configuration. 

 

Contact 

For additional information or clarification on any of the product information given here, contact Xerox support. 

Disclaimer 

The information provided in this Xerox Product Response is provided "as is" without warranty of any kind. Xerox Corporation 

disclaims  all  warranties,  either  express  or  implied,  including  the  warranties  of  merchantability  and  fitness  for  a  particular 

purpose. In no event shall Xerox Corporation be liable for any damages whatsoever resulting from user's use or disregard of 

the information provided in  this Xerox Product Response including direct, indirect, incidental, consequential, loss  of business 

profits or special damages, even if Xerox Corporation has been advised of the possibility of such damages. Some states do no 

allow the exclusion or limitation of liability for consequential damages so the foregoing limitation may not apply. 

Содержание WorkCentre 4265

Страница 1: ...Version 1 1 May 10 2015 Secure Installation and Operation of Your WorkCentre 4265...

Страница 2: ...om information security common criteria certified enus html or from your Xerox representative I Secure Installation and Set up in the Evaluated Configuration To set up the machines in the evaluated co...

Страница 3: ...tablish user authentication via a Smart Card by following either the Configuring Smart Card Authentication Settings instructions in Section 4 of the SAG 3 Authorization Either local authorization or n...

Страница 4: ...0 2 Standard by following the instructions for Enabling FIPS 140 Mode and Checking for Compliance in Section 4 of the SAG 10 Data Encryption Data encryption is enabled by default on the device and the...

Страница 5: ...re verification test feature by performing the following from the Web UI Select the Properties tab Select the following entries from the Properties Content menu Security Software Verification Test Sel...

Страница 6: ...n to Email Address The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remote Polling should only be used by the System Administrator Printing of Embedded Fax...

Страница 7: ...Services in Section 2 of the SAG Comparing the software firmware version listed on the Configuration Report with the Evaluated Software Firmware version listed in Table 2 of the Xerox Multi Function...

Страница 8: ...ing that an ODIO be run will appear on the Control Panel An Immediate Image Overwrite Error Sheet will also be printed but may contain incomplete status information Immediately perform the requested O...

Страница 9: ...uld avoid opening emails and attachments from unknown sources unless the emails and attachments have been properly scanned for viruses malware etc o System Administrators and users should logoff immed...

Страница 10: ...nd authentication required Index Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by selecting the Index button in the upper right hand...

Отзывы: