Home > Xerox > All in One Printer > Xerox WorkCentre 5755 Manual

Xerox WorkCentre 5755 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Xerox WorkCentre 5755 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 228 Xerox manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Email Encryption and Signing
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide171
    Email Encryption and Signing
    Email Encryption and Signing allow users to ensure that Emails sent from the device are signed and/or 
    encrypted.
    Signed e-mails can be sent to any address the user specifies and encrypted email can be sent to any 
    recipient with a valid security certificate. 
    To enable and configure Email encryption
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click the [Authentication] link and select [Setup] in the directory tree.
    Note:Smart Card authentication must be set as the primary authentication method before Email 
    encryption and signing are made available.
    3. In the table of associated services at the bottom of the screen, click the [Edit...] button next to E-
    mail Encryption and signing. 
    4. In the Email Encryption Enablement area, select one of the following settings:
    •Off - Email encryption is disabled and cannot be activated by a user at the device.
    •Always On: Not Editable By User - Email encryption is enabled and cannot be deactivated 
    by a user at the device.
    •Editable by User - Email encryption is enabled but can be activated or deactivated by a user 
    at the device. The default state can be set by selecting one of the following:
    •Off - Email encryption is deactivated by default but can be activated by the user.
    •On - Email encryption is activated by default but can be deactivated by the user.
    5. Select the required Encryption Algorithm to be used.
    6. In the Email Signing Enablement area, select one of the following settings:
    •Off - Email signing is disabled and cannot be activated by a user at the device.
    •Always On: Not Editable By User - Email signing is enabled and cannot be deactivated by a 
    user at the device.
    •On: Editable by User - Email signing is enabled but can be activated or deactivated by a user 
    at the device. The default state can be set by selecting one of the following:
    •Off - Email signing is deactivated by default but can be activated by the user.
    •On - Email signing is activated by default but can be deactivated by the user.
    7. Select the required Signing Hash Key to be used.
    8. Click the [Save] button. 
    						
    							FIPS 140-2 Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide 172
    FIPS 140-2 Encryption
    The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer 
    security standards that specify requirements for cryptography modules. Your device supports FIPS 140-
    2 Level 1 only.
    To Enable FIPS 140-2 Encryption
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click [Encryption] and select [FIPS 140-2] in the directory tree.
    3. Select the Enabled radio button and click the [Run Configuration Check & Apply] button.
    4. The system runs a configuration check to ensure that all services are FIPS 140-2 compliant. If all 
    services are compliant a confirmation page is displayed.
    5. Click [Reboot the Machine], the machine will restart with FIPS 140-2 enabled.
    To Disable FIPS 140-2 Encryption
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click [Encryption] and select [FIPS 140-2] in the directory tree.
    3. Select the Disable radio button and click the [Apply] button.
    4. The machine will automatically restart with FIPS 140-2 disabled. 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide173
    User Data Encryption
    User Data Encryption ensures all data or job-sensitive data on the device’s hard drive is protected.
    User Data Encryption is automatically enabled on the device and no further configuration is required 
    by the administrator.
    When enabled, the data on the hard drive will not be meaningful when the hard drive has been 
    separated from the device it was originally installed on.
    If the hard disk is removed from the device then the encrypted data remains protected because the 
    encryption key is not stored on the hard drive.
    To Disable User Data Encryption
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click on the [Encryption] link and then select [User Data Encryption] in the directory tree.
    3. In the [User Data Encryption Enablement] area, select [Disabled].
    4. Click on the [Apply] button.
    Note:Changing the User Data Encryption setting will reboot the Network Controller. This may 
    result in a loss of user data and will interrupt or delete current jobs on the device.
    User Information Database
    User Information Database is a local database that contains user data for access by Authentication 
    and basic Authorization.
    The User Information Database allows you to add new users to the database. User information can be 
    edited and deleted from the database.
    Password Settings allow you to change password rules.
    Note:If the Password rules are changed, old passwords are NOT AFFECTED by the new rules.
    If users are created locally on the device using the User Information Database, those users will 
    be authenticated only if the Authentication Configuration method is set to “Locally on the 
    Device”. If the authentication method is switched to “Remotely on the Network”, those users will 
    not be authenticated unless their credentials are also accessible remotely. For further information 
    on Authentication Configuration, refer to Authentication on page 155.
    To Add a New User to the Database
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click on the [User Information Database] link. 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide 174
    3. Select [Setup] in the directory tree.
    4. On the User Information Database page, click on the [Add New User] button. 
    5. On the Add New User page, in the User Identification area:
    a. Enter a login name that the user will enter to gain access to the device or the Internet 
    Services in the [User Name] field.
    Note:The login name is case-sensitive.
    b. Enter a name that will be associated with the login name in the [Friendly Name] field.
    c. Enter a password in the [Password] field, and retype the password in the [Retype Password] 
    field to confirm that it is correct.
    6. In the User Role area, select one of the following roles for the new user:
    •System Administrator: This will appear in the Role column as “SA”. This role has access to all 
    pathways, services and features on the device.
    •Accounting Administrator: This will appear in the Role column as “AA”. The accounting 
    administrator can access all pathways, services, and features on the device, as well as 
    accounting tools and any non-secured tools features. The accounting administrator can 
    neither edit nor create any new users for the device.
    •User: This will appear in the Role column as “USER”.
    7. Click on the [Add New User] button to save the new user settings.
    To Edit a User on the Database 
    As a System Administrator
    Note:Accounting Administrator cannot access this page.
    Note:Any user on the database can log into the Internet Services and edit their own password.
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click on the [User Information Database] link.
    3. Select [Setup] in the directory tree.
    4. On the User Information Database page, click on the [Edit] link next to the user you want to edit.
    5. On the Edit User page:
    a. In the User Identification area, edit any relevant field.
    Note:The [User Name] field is not editable.
    b. In the [User Role] area, select the type of role for the user.
    6. Click on the [Edit User] button to save the changes.
    As an Individual User
    Note:To configure this feature or these settings, you will have to access the Properties tab. This 
    will require you to log in using your individual User ID and Password.
    1. At your Workstation, open the web browser, enter the IP Address of the device in the Address bar.
    2. Press . 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide175
    3. Click on the [Properties] tab.
    4. If prompted, enter details in the [User ID] and [Password] fields.
    5. Click on the [Login] button.
    6. From the Properties tab, click on the [User Information Database] link.
    7. Select [Setup] in the directory tree.
    8. On the Edit User page:
    a. In the User Identification area, edit any relevant field.
    Note:The [User Name] field is not editable.
    b. In the [User Role] area, select to change the role of the user.
    9. Click on the [Edit User] button to save the changes.
    To Delete a User
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click on the [User Information Database] link.
    3. Select [Setup] in the directory tree.
    4. On the User Information Database page, under the User Name column, check the user checkbox 
    you want to delete and click on the [Delete] button to delete the user.
    5. A pop-up window will state “All associated data will be lost. Delete Selected User Account?”. 
    Click on the [OK] button to confirm selection.
    Password Settings
    Use this page to set or change the password rules. This page is only available to users who are System 
    Administrators
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Click on the [User Information Database] link.
    3. Select [Password Settings] in the directory tree.
    4. On the Password Settings page, in the Password Rules area:
    a. Enter the minimum number of characters that will be accepted as a password in the 
    [Minimum Length] and [Maximum Length] field.
    b. Optionally, you can also check to select either or all options:
    • Cannot contain “Friendly Name”.
    • Cannot contain “User Name”.
    •Must contain “at least 1 number”.
    5. Click on the [Apply] button to save your changes and return to the User Information Database 
    page. 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide 176
    IP Filtering
    The IP Filtering security feature provides the ability to prevent unauthorized network access based on 
    IP Address and/or port number filtering rules set by the System Administrator using Internet Services.
    Authorized users will be able to create IP Address filtering rules.
    Authorized users can enter a list of addresses that are allowed access to the device, and/or a list of 
    addresses that are not allowed access to the device.
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Select [IP Filtering] in the directory tree.
    In the IP Filter Rule List area, the following information is displayed:
    •Rule Number - Display the rule order. Rule ordering is important in IP Filtering, because rules 
    can negate each other if placed in an incorrect order.
    •Action - displays how IP Filtering handles incoming packets.
    •Source IP/Mask - displays which IP or IP range and network mask the rule has been created 
    to handle.
    •Source Port - displays the originating port (if applicable) that the rule has been created to 
    handle. If the incoming packet did not originate from this source port, the rule is not applied.
    •Destination Port - displays the port to which the packet was sent. If the incoming packet was 
    not sent to this port, the rule is not applied.
    •ICMP Message - displays the ICMP Message the rule was created to handle. ICMP Messages 
    are only shown when the protocol is set to ICMP.
    •Protocol - displays which protocols the rule handles.
    To Add IP Filter Rule
    1. On the IP Filtering page, click on the [Add] button to display the Add IP Filter Rule page.
    2. In the Define IP Filter Rule area:
    a. From the [Protocol] drop-down list, select the protocol (All, TCP, UDP or ICMP) that the rule 
    will apply to.
    b. From the [Action] drop-down list, select how you wish IP Filtering to handle the incoming 
    packets the options are Accept, Drop, or Reject.
    c. From the [Move This Rule To] drop-down list, select either End of List or Beginning of List 
    for the location of this rule. The order of the rules should be determined by the expected 
    traffic to the device. Note that rule order is important in IP Filtering because rules can negate 
    each other if placed in an incorrect order. For example, specific rules should be added to the 
    top of the list, whereas blanket policies should be added to the bottom of the list
    d. Enter the [Source IP Address] to which this rule will apply. 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide177
    e. Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of 
    0 to 32 corresponds to the 32 bit binary number comprising IP Addresses. A number of 8, for 
    example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a 
    Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask 
    of 255, 255, 255, 0).
    3. Click on the [Apply] button to accept the changes or on the [Cancel] button to exit the window 
    without saving changes.
    Audit Log
    Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based 
    processes running on the server, exposure to access attacks, eavesdropping, file tampering, service 
    disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by 
    the System Administrator, often with the aid of third party analyzing tools, helps to assess attempted 
    server security breaches, identify actual breaches, and prevent future breaches. Access to the log’s data 
    is protected by enabling SSL (Secure Sockets Layer) protocols. The Audit Log, and its associated data 
    protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria, 
    set by the United States Department of Defense. To enable this feature, perform the following steps.
    IMPORTANT: Audit Log cannot be enabled until SSL (Secure Sockets Layer) is enabled on the device. 
    To enable SSL on a device, the device needs a Server Certificate. For instructions on how to set up a 
    Server Certificate, refer to Security Certificate Management on page 179.
    Note:To configure this feature or these settings access the Properties tab as a System 
    Administrator. For details, refer to Access Internet Services as System Administrator on page 24.
    1. From the Properties tab, click on the [Security] link.
    2. Select [Audit Log] in the directory tree. 
    Note:You must enable SSL before enabling Audit Log.
    3. In the Enabling Audit Log on machine area, check the [Enabled] checkbox for Audit Log.
    4. Click on the [Apply] button, then click on the [OK] button when you see the message “Properties 
    have been successfully modified”.
    5. Click on the [Save] button to save the Audit Log as a text file.
    6. In the Audit Log Download Form page:
    a. Right-click on the [Download Log] link and select [Save Target As] to download file.
    b. Specify the location for the Audit Log to be saved in. The Audit Log is saved as 
    [Auditfile.txt.gz]. This is a text file compressed as a GZIP file. Click on [Save].
    c. Open the [Auditfile.txt.gz] compressed file. 
    d. The Auditfile.text is a raw text file. To view the Audit Log as tab-delimited text, open the 
    Auditfile.txt document in an application that can import text as a tab-delimited document, 
    such as Microsoft
    ® Excel. 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide 178
    To  V i e w  t h e  A u d i t  L o g
    Note:Copy jobs and Embedded Fax jobs are not recorded in the Audit Log. The completion status 
    of both types of jobs can be checked by viewing the applicable Completed Job Log entries.
    Note:For a LAN Fax job, the event in the Audit Log will be recorded under the title of “print/driver 
    fa x ” .
    Note:To record the user’s name in the Audit Log, Network Authentication must be configured and 
    enabled.
    If “Guest Access” is enabled, job entries in the Audit Log will be associated with the generic 
    identity “Local User”. Therefore ‘Guest Access’ is not recommended for secure configurations.
    Note:There may not be an entry made in the Audit Log for a scan-to-mailbox job, although the 
    job completion status will be reported in the Completed Job Log. If a scan-to-mailbox job is 
    deleted from its scan-to-mailbox folder, there will be no entry created in either the Completed Jobs 
    Log or the Audit Log for the job deletion.
    Event ID
    A unique value that identifies the entry. The following list shows the ID number allocated to each type 
    of activity displayed in the Audit Log:
    Event Description
    The Audit Log contains a maximum list of the last 15,000 activities on the device. The activities that 
    are displayed include:
    • System start-up and shutdowns.
    • On demand image overwrites completed.
    •Jobs completed.
    IDActivityIDActivity
    1
    System start-up12Print/Fax driver LAN Fax job
    2System shut down13Data Encryption
    3On Demand Image Overwrite started14Scheduled ODIOD Standard started
    4On Demand Image Overwrite complete15Scheduled ODIO Standard complete
    5Print job16Scheduled ODIO Full started
    6Network Scan Job17Scheduled ODIO Full complete
    7Server Fax job18Scan to Mailbox job
    8IFAX19Delete File/Dir (CPSR)
    9E-mail job20USB
    10Audit Log Disabled21Scan to Home
    11Audit Log Enabled23System Configuration Data Changes 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide179
    •Embedded Fax jobs.
    •Store Files jobs.
    • Accounting information.
    • Workflow Scanning jobs - one scan to file audit log entry is recorded for each network destination 
    within the scan job. 
    • Server Fax jobs - one audit log entry is recorded for each job. 
    • E-mail jobs - one audit log entry is recorded for each SMTP recipient within the job.
    Completion Status
    The Completion Status column shows the status of jobs and has the following values:
    • comp-normal - the job completed correctly.
    • comp-deleted - the job was deleted.
    • comp-terminated - the job was cancelled.
    Identify the PC or User
    To record the user's name in the Audit Log, Network Authentication must be configured on the Xerox 
    device.
    IIO Status
    If IIO (Immediate Image Overwrite) is enabled, this column will show the status of overwrites 
    completed on each job.
    Entry Data
    This column contains any additional data that is recorded for an Audit Log entry, for example:
    • Machine name
    •Job name
    •Username
    • Accounting Account ID (when Network Accounting is enabled)
    Security Certificate Management
    A Machine Digital Certificate provides keys for encryption/decryption of data. It ensures the data is not 
    tampered with and validates the source of data.
    A Digital Certificate is like an ‘Electronic Driver’s License’. It contains the following:
    •Name of whom the Certificate is issued to
    •Serial Number
    •Expiration Date
    •Name of the Certificate Authority that issued the Certificate
    •A Public Key
    •A Digital Signature of the Key from a Certificate Authority
    •Country Code 
    						
    							User Data Encryption
    WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
    System Administrator Guide 180
    Other information it contains:
    •State/Province Name
    •Locality Name
    •Organization Name
    •Organization Unit
    •E-mail Address
    The device can be configured for secure access with the SSL (Secure Socket Layer) protocol via Digital 
    Certificates. The enablement of SSL provides encryption for all workflows where the device is used as a 
    HTTPS server. 
    Workflows include:
    •Administration of the device via Internet Services
    •Printing via Internet Services
    •Printing via IPP
    •Scan Template Management
    •Workflow Scanning via HTTPS
    •Administration of Network Accounting
    The device exports the signed certificate to the client to establish an SSL/HTTPS connection.
    There are two options available to obtain a server certificate for the device:
    • Have the device create a Self Signed Certificate.
    • Create a request to have a Certificate Authority sign a certificate that can be uploaded to the 
    device.
    A self-signed certificate means that the device signs its own certificate as trusted and creates the 
    public key for the certificate to be used in SSL encryption.
    A certificate from a Certificate Authority or a server functioning as a Certificate Authority, for example 
    Windows 2000 running Certificate Services, can be uploaded to the device.
    Note:A separate request is required for each Xerox device.
    With SSL enabled (from the Connectivity/Protocols/HTTP selections of the Properties tab of Internet 
    Services), and a digital certificate installed, remote users accessing the system over an HTTP-based 
    interface are assured of having their network communications protected against eavesdropping and 
    tampering, using strong encryption. The only action required by the workstation user is to type https:// 
    followed by the IP Address (or fully qualified domain name) of the system into the Address or URL box 
    of the web browser. The subsequent acceptance of a Digital Certificate completes the exchange of the 
    Public Key enabling the encryption process to proceed.
    Information Checklist
    Before starting the procedure, ensure the following items are available or tasks have been performed:
    • An IP Address or Host Name must be configured on the device.
    • DNS must be enabled and configured on the device.
    • HTTP must be enabled so that Internet Services can be accessed. 
    						
    All Xerox manuals Comments (0)

    Related Manuals for Xerox WorkCentre 5755 Manual