background image

Secure Installation and Operation of Your WorkCentre™ 5135/5150 

 

Purpose and Audience 

This

 

document provides information on the secure installation and operation of a WorkCentre™ 5135/5150 Multifunction 

System. All customers, but particularly those concerned with secure installation and operation of these machines, should follow 
these guidelines. 

Overview 

This document lists some important customer information and guidelines that will ensure that your WorkCentre™ 5135/5150 
Multifunction System is operated and maintained in a secure manner.   

Background 

The WorkCentre™ 5135/5150 Multifunction System is currently undergoing Common Criteria evaluation.  The information 
provided here is consistent with the security functional claims made in the Security Target.  Upon completion of the evaluation, 
the Security Target will be available from the Common Criteria Certified Product website 
(

http://www.commoncriteriaportal.org/products.html

) list of evaluated products or from your Xerox representative. 

Secure Evaluated Configuration Installation, Setup and Operation 

Please follow the guidelines below for secure installation, setup and operation of the evaluated configuration for a 
WorkCentre™ 5135/5150 Multifunction System: 

1.

 

The security functions in the evaluated configuration of the WorkCentre™ 5135/5150 that should be set up by the System 
Administrator are: 

 

Immediate Image Overwrite 

 

On Demand Image Overwrite 

 

Disk Encryption 

 

IP Filtering  

 

Audit Log 

 

SSL (for protection of management data) 

 

Trusted Certificate Authorities 

 

Authentication and Authorization 

Follow the instructions located on the SA CD

1

 in the 

Reference

 

Æ

 

Security

 tabs/buttons to set up these security functions 

except as noted in the items below.  

2.

 

The following services of the WorkCentre™ 5135/5150 are also considered part of the evaluated configuration and should be 
enabled when needed by the System Administrator - Copy, Embedded Fax, Scan to E-mail, Network Scanning, Saved Jobs for 
Reprint, Reprint Saved Jobs, and ID Card Copy. 

3.

 

Secure acceptance of the WorkCentre™ 5135/5150, once device delivery and installation is completed, should be done by:  

 

Printing out a Configuration Report by following the instructions located on the SA CD

1

 in the 

Reference

 

Æ

 

Reports

 

Æ

 

Configuration

 tabs. 

 

Comparing the software/firmware versions listed on the Configuration Report  with the Evaluated Software/Firmware 
versions listed in Table 2 of the Xerox WorkCentre™ 5135/5150 Multifunction Systems Security Target, Version 1.0 and 
make sure that they are the same in all cases.  

4.

 

Follow the instructions located on the SA CD

1

 in the 

Reference

 

Æ

 

Security

 

Æ

 

Authentication and Authorization 

Æ

 

Authentication Configuration

 tabs/buttons to set up an Authentication Server. Follow the instructions located on the SA CD

1

 in 

the 

Reference

 

Æ

 

Security

 

Æ

 

Authentication and Authorization 

Æ

 

Xerox Common Access Card

 tabs/buttons to set up user 

authentication via a Common Access Card.   

5.

 

For customers concerned about document files on the network controller hard disk drive or Embedded Fax card memory, the 
Image Overwrite Security (IOS) option containing the Immediate Image Overwrite and On Demand Image Overwrite security 
features, which comes installed on the WorkCentre™ 5135/5150 Multifunction System, must be properly configured and 
enabled. Please follow the applicable instructions in the

 Reference

 

Æ

 

Security

 

Æ

 

Image Overwrite Security 

tabs/buttons in the 

System Administration (SA) CD

for proper enablement of Immediate Image Overwrite and On Demand Image Overwrite.  

                     

1

 (WorkCentre™ 5135/5150) System Administration CD1, 538E11432 

Содержание WORKCENTRE 5135

Страница 1: ...Version 1 1 Mar 24 2010 Secure Installation and Operation of Your WorkCentre 5135 5150...

Страница 2: ...except as noted in the items below 2 The following services of the WorkCentre 5135 5150 are also considered part of the evaluated configuration and should be enabled when needed by the System Administ...

Страница 3: ...verwrite from the WebUI Follow the instructions in the Reference Security Image Overwrite Security On Demand Image Overwrite Auto Schedule an Overwrite tabs buttons in the SA CD1 to schedule an On Dem...

Страница 4: ...esired HTTPS port number in the Port Number text box Select the Apply button This will save the indicated settings After saving the changes the HTTP page will be redisplayed 10 In viewing the Audit Lo...

Страница 5: ...by following these instructions SNMPv3 cannot be enabled until SSL Secure Sockets Layer and HTTPS SSL are enabled on the machine At the WebUI select the Properties tab Select the following entries fr...

Страница 6: ...ult case this secondary IPv4 address will not be visible to the SA6 Xerox recommends that the Self Assigned Address option from the Web UI IP Internet Protocol page be disabled unless either APIPA is...

Страница 7: ...eprint Information Pop Up Screen Provides error information and or required actions to the user after the user has exercised selected screens and buttons e g creation and deletion of a folder or job o...

Страница 8: ...s E mail addresses or file repositories Is accessible by selecting the Properties tab and then selecting Services Embedded Fax Fax Forward from the Properties tab content menu From the Fax Forward on...

Страница 9: ...diagnostics dhcpv6Options php View Service Registry Contents Allows the System Administrator to view the contents of the device s Service Registry Is accessible by typing http IP Address 9 diagnostics...

Страница 10: ...address of the Proxy Server which the device can use Proxy Server setup is accessible by selecting the Properties tab and then selecting Connectivity Protocols Proxy Server from the Properties tab con...

Страница 11: ...f merchantability and fitness for a particular purpose In no event shall Xerox Corporation be liable for any damages whatsoever resulting from user s use or disregard of the information provided in th...

Отзывы: