Contents
6 Xerox
®
WorkCentre
®
5800/5800i Series Multifunction Printer
System Administrator Guide
Enabling FIPS 140 Mode and Checking for Compliance ....................................................................... 93
Stored Data Encryption .............................................................................................................................................. 94
Enabling Encryption of Stored Data .............................................................................................................. 94
IP Filtering ....................................................................................................................................................................... 95
Creating or Editing an IP Filter Rule ............................................................................................................... 95
Editing an IP Filter Rule ...................................................................................................................................... 95
Arranging the Execution Order of IP Filter Rules ...................................................................................... 96
Audit Log .......................................................................................................................................................................... 97
Enabling Audit Log ............................................................................................................................................... 97
Enabling Automatic Log Transfer ................................................................................................................... 97
Enabling Protocol Logs ........................................................................................................................................ 98
Saving an Audit Log ............................................................................................................................................. 98
Saving an Audit Log to a USB Flash Drive ................................................................................................... 98
Interpreting the Audit Log................................................................................................................................. 99
Installation Policies .................................................................................................................................................... 100
McAfee Embedded Control ..................................................................................................................................... 101
Setting the Security Level ................................................................................................................................ 101
Setting the Alert Options ................................................................................................................................. 102
IPsec ................................................................................................................................................................................. 103
Enabling IPsec ...................................................................................................................................................... 103
Managing Actions ............................................................................................................................................... 103
Managing Protocol Groups ............................................................................................................................. 103
Creating a New Action ...................................................................................................................................... 104
Editing or Deleting an Action ......................................................................................................................... 106
Managing Host Groups .....................................................................................................................................
106
Managing Security Policies ............................................................................................................................. 107
Security Certificates ................................................................................................................................................... 108
Installing Certificates ........................................................................................................................................ 108
Creating and Installing a Xerox
®
Device Certificate ............................................................................. 109
Installing the Generic Xerox
®
Trusted CA Certificate ........................................................................... 109
Creating a Certificate Signing Request ...................................................................................................... 110
Installing Root Certificates .............................................................................................................................. 111
Installing Domain Controller Certificates .................................................................................................. 112
Viewing, Saving, or Deleting a Certificate ................................................................................................. 112
Specifying the Minimum Certificate Key Length .................................................................................... 113
802.1X ............................................................................................................................................................................. 114
Enabling and Configuring 802.1X in Xerox
®
CentreWare
®
Internet Services ............................. 114
System Timeout .......................................................................................................................................................... 116
Setting System Timeout Values .................................................................................................................... 116
Overwriting Image Data .......................................................................................................................................... 117
Manually Deleting Image Data ..................................................................................................................... 118
Scheduling Routine Deletion of Image Data ........................................................................................... 119
Immediate Job Overwrite ................................................................................................................................ 120
PostScript Passwords ................................................................................................................................................. 121
Enabling or Creating PostScript Passwords ............................................................................................... 121
USB Port Security ........................................................................................................................................................ 122