6Xerox®AltaLink®Series Multifunction Printer System Administrator Guide
Personalization ...........................................................................................................................138
Enabling Personalization........................................................................................................138
Viewing and Deleting Personalization Profiles .. .. .. ... .. .. .. . .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. ... .. .. ... .. .. ... .. .. ..... .. 139
Imaging Security.........................................................................................................................140
Infrared Security...................................................................................................................140
Jobs Detected......................................................................................................................143
HTTPS (TLS)...............................................................................................................................145
Using TLS for all HTTP Communication (HTTPS)... .. . .. .. .. . .. .. . .. .. .. ... .. .. ... .. .. ..... .. ..... .. .. ... .. .. ... .. .. ... .. 145
FIPS 140....................................................................................................................................146
FIPS 140 Mode....................................................................................................................146
FIPS 140 Mode with Common Criteria Compliance.. .. ..... .. ... .. .. ... .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. 146
FIPS 140 Enablement Workflow and Configuration Checks. ... .. .. ... .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. 146
Enabling FIPS 140 Mode and Checking for Compliance .. .. .. . .. .. .. . .. .. .. . .. .. .. ... .. ..... .. ..... .. .. ..... .. ... .. .. . 147
FIPS 140 Configuration Check.................................................................................................147
FIPS 140 Status....................................................................................................................148
TLS...........................................................................................................................................149
Stored Data Encryption ................................................................................................................151
Enabling Encryption of Stored Data .........................................................................................151
IP Filtering .................................................................................................................................152
Creating or Editing an IP Filter Rule..........................................................................................152
Editing an IP Filter Rule..........................................................................................................152
Arranging the Execution Order of IP Filter Rules .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. ... .. .. ..... .. ..... .. .. ... .. .. . 153
Logs..........................................................................................................................................154
Audit Log............................................................................................................................154
Authentication Log ...............................................................................................................156
Network Troubleshooting.......................................................................................................156
SIEM..................................................................................................................................158
Support Logs........................................................................................................................160
Trellix®Embedded Control ............................................................................................................162
Setting the Security Level.......................................................................................................162
Setting the Alert Options........................................................................................................163
Downloading the Audit Log....................................................................................................163
Testing Your Alert Configuration ..............................................................................................164
Feedback Method Test Results.................................................................................................164
IPsec.........................................................................................................................................165
IPsec Configuration Components.............................................................................................165
Managing Security Policies.....................................................................................................165
Managing Host Groups..........................................................................................................166
Managing Protocol Groups.....................................................................................................166
Managing Actions ................................................................................................................167
Enabling IPsec .....................................................................................................................171
Security Certificates.....................................................................................................................172
Installing Certificates.............................................................................................................172
Creating and Installing a Xerox®Device Certificate.....................................................................173
Installing the Device Root Certificate Authority . .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. ... .. ..... .. .. ..... .. ..... .. ... .. .. . 173
Creating a Certificate Signing Request. .. .. ... .. .. ... .. .. ..... .. ..... .. ..... .. .. ... .. .. ... .. .. .. . .. .. .. . .. .. .. . .. .. .. . .. .. .. 175
Installing Root Certificates......................................................................................................176
Contents