Contents
6 Xerox
®
WorkCentre
®
5945/5945i/5955/5955i Multifunction Printer
System Administrator Guide
Enabling FIPS 140 Mode and Checking for Compliance ....................................................................... 93
Stored Data Encryption .............................................................................................................................................. 94
Enabling Encryption of Stored Data .............................................................................................................. 94
IP Filtering ....................................................................................................................................................................... 95
Creating or Editing an IP Filter Rule ............................................................................................................... 95
Editing an IP Filter Rule ...................................................................................................................................... 95
Arranging the Execution Order of IP Filter Rules ...................................................................................... 96
Audit Log .......................................................................................................................................................................... 97
Enabling Audit Log ............................................................................................................................................... 97
Enabling Automatic Log Transfer ................................................................................................................... 97
Enabling Protocol Logs ........................................................................................................................................ 98
Saving an Audit Log ............................................................................................................................................. 98
Saving an Audit Log to a USB Flash Drive ................................................................................................... 98
Interpreting the Audit Log................................................................................................................................. 99
Installation Policies .................................................................................................................................................... 100
McAfee Embedded Control ..................................................................................................................................... 101
Setting the Security Level ................................................................................................................................ 102
Setting the Alert Options ................................................................................................................................. 103
IPsec ................................................................................................................................................................................. 104
Enabling IPsec ...................................................................................................................................................... 104
Managing Actions ............................................................................................................................................... 104
Managing Protocol Groups ............................................................................................................................. 105
Creating a New Action ...................................................................................................................................... 105
Editing or Deleting an Action ......................................................................................................................... 107
Managing Host Groups ..................................................................................................................................... 108
Managing Security Policies ............................................................................................................................. 108
Security Certificates ................................................................................................................................................... 109
Installing Certificates ........................................................................................................................................ 109
Creating and Installing a Xerox
®
Device Certificate ............................................................................. 110
Installing the Generic Xerox
®
Trusted CA Certificate ........................................................................... 110
Creating a Certificate Signing Request ...................................................................................................... 111
Installing Root Certificates .............................................................................................................................. 112
Installing Domain Controller Certificates .................................................................................................. 113
Viewing, Saving, or Deleting a Certificate ................................................................................................. 113
Specifying the Minimum Certificate Key Length .................................................................................... 114
802.1X ............................................................................................................................................................................. 115
Enabling and Configuring 802.1X in Xerox
®
CentreWare
®
Internet Services ............................. 115
System Timeout .......................................................................................................................................................... 117
Setting System Timeout Values .................................................................................................................... 117
Overwriting Image Data .......................................................................................................................................... 118
Manually Deleting Image Data ..................................................................................................................... 119
Scheduling Routine Deletion of Image Data ........................................................................................... 120
Immediate Job Overwrite ................................................................................................................................ 121
PostScript Passwords ................................................................................................................................................. 122
Enabling or Creating PostScript Passwords ............................................................................................... 122
USB Port Security ........................................................................................................................................................ 123