Xerox WORKCENTRE 5735 Скачать руководство пользователя страница 2

Secure Installation and Operation of Your WorkCentre™ 
5735/5740/5745/5755/5765/5775/5790 

 

Purpose and Audience 

This

 

document provides information on secure installation and operation. All customers, but particularly those concerned with 

secure installation and operation of these machines, should follow these guidelines. 

Overview 

This document lists some important customer information and guidelines that will ensure that your device is operated and 
maintained in a secure manner.   

Background 

These systems are Common Criteria certified. The information provided here is consistent with the security functional claims 
made in the Security Target. The Security Target will be available from the Common Criteria Certified Product website 
(

http://www.commoncriteriaportal.org/products.html

) list of evaluated products, from the Xerox security website 

(http://www.xerox.com/information-security/common-criteria-certified/enus.html ) or from your Xerox representative.

 

1.

 

Please follow the guidelines below for secure installation, setup and operation of the evaluated configuration: 

a).

 

The security functions in the evaluated configuration that should be set up by the System Administrator are: 

 

Immediate Image Overwrite 

 

On Demand Image Overwrite 

 

Disk Encryption 

 

FIPS 140-2 Encryption 

 

IP Filtering  

 

Audit Log 

 

SSL  

 

SNMPv3 

 

IPSec 

 

Local, Remote or Smart Card Authentication 

 

Local Authorization and Personalization 

 

802.1x Device Authentication 

 

Session Inactivity Timeout 

 

Hold All Jobs 

System Administrator login is required when accessing the security features via the Web User Interface (Web UI) or when 
implementing the guidelines and recommendations specified in this document. To log in to the Web UI as an authenticated 
System Administrator, follow the instructions under “Accessing Internet Services as System Administrator” located on page 
24 in the System Administration Guide (SAG)

1

.  

To log in to the Local User Interface (Local UI) as an authenticated System Administrator, follow the “Access Tools Pathway 
as a System Administrator” instructions located on page 18 in the SAG. 

Follow the instructions located in the SAG in Chapter 8, Security to set up these security functions except as noted in the 
items below. Note that whenever the SAG

 

requires that the System Administrator provide an IPv4 address, IPv6 address or 

port number the values should be those that pertain to the particular device being configured.

 

b).

 

The following services are also considered part of the evaluated configuration and should be enabled when needed by the 
System Administrator - Copy, Embedded Fax, Fax Forwarding on Receive (for Embedded Faxes), Scan to E-mail, Workflow 
Scanning, Scan to Mailbox, Internet Fax, and ID Card Copy. 

Secure acceptance, once device delivery and installation is completed, should be done by:  

 

Printing out a Configuration Report by following the instructions located in the 

SAG

 in the 

Print a Configuration 

Report

 section on page 18. 

 

Comparing the software/firmware versions listed on the Configuration Report with the Evaluated Software/Firmware 
versions listed in Table 2 of the Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Security Target, Version 
1.0 and make sure that they are the same in all cases.  

c).

 

Change the Administrator password as soon as possible. Reset the Tools password periodically.   

 (1) Set the Administrator password to a minimum length of eight alphanumeric characters, (2) change the Administrator 
password once a month and (3) ensure that all passwords are strong passwords (e.g.,  passwords use a combination of 
alphanumeric and non-alphanumeric characters; passwords don’t use common names or phrases, etc.).  

                     

TP

1

Xerox

®

®

 WorkCentre  5735/5740/5745/5755/5765/5775/5790 System Administrator Guide, Version 2.0, December 2010 

Содержание WORKCENTRE 5735

Страница 1: ...Version 1 3 Jan 27 2012 Secure Installation and Operation of Your WorkCentre 5735 5740 5745 5755 5765 5775 5790...

Страница 2: ...ssing Internet Services as System Administrator located on page 24 in the System Administration Guide SAG 1 To log in to the Local User Interface Local UI as an authenticated System Administrator foll...

Страница 3: ...his arrangement could create the opportunity for authentication bypass at the devices The device System Administrator should be diligent in monitoring the audit log for unauthorized configuration chan...

Страница 4: ...ash a system reboot or software reset should be initiated by the System Administrator from either the Local UI or the Web UI and be allowed to complete otherwise the Local UI may become unavailable If...

Страница 5: ...dard follow the FIPS 140 2 Encryption instructions on page 172 of the SAG r In viewing the Audit Log the System Administrator should note the following Deletion of a file from Reprint Saved Jobs folde...

Страница 6: ...commends that the minimum length of a password assigned to a private Scan to Mailbox folder be 8 alphanumeric characters aa In the evaluated configuration Embedded Fax Secure Receive option should be...

Страница 7: ...access the SNMP administrator account5 2 Although not part of the evaluated configuration Xerox recommends that if the use of SNMP v1 v2c is desired the System Administrator change the SNMP v1 v2c pub...

Страница 8: ...gement capability Reset Local UI to Factory Defaults Allows the System Administrator to reset the UI to its factory default values Is accessible by selecting the following from the Tools Pathway via s...

Страница 9: ...uch interface Touch UI 10 on the Authentication Authorization and Personalization page is set to Smart Cards 11 to manage domain controller certificates installed or to be installed on the device Is a...

Страница 10: ...arcodeSpaceToggle php Filename Extension Allows the authorized user to select all filename extensions to be created in either lower case or upper case Is accessible by typing http IP Address diagnosti...

Страница 11: ...ce no longer being in the evaluated configuration 18 The following pages are available from the Web User Interface with no user login and authentication required Site Map Provides the user with hyperl...

Отзывы: