Contents
6 Xerox
®
WorkCentre
®
6655/6655i Color Multifunction Printer
System Administrator Guide
Arranging the Execution Order of IP Filter Rules ........................................................................................ 98
Audit Log .............................................................................................................................................................................. 99
Enabling Audit Log ................................................................................................................................................... 99
Enabling Automatic Log Transfer ...................................................................................................................... 99
Enabling Protocol Logs ......................................................................................................................................... 100
Saving an Audit Log............................................................................................................................................... 100
Saving an Audit Log to a USB Flash Drive ................................................................................................... 100
Interpreting the Audit Log .................................................................................................................................. 101
Installation Policies ........................................................................................................................................................ 102
McAfee Embedded Control ........................................................................................................................................ 103
Setting the Security Level .................................................................................................................................... 104
Setting the Alert Options ..................................................................................................................................... 105
IPsec ..................................................................................................................................................................................... 106
Enabling IPsec .......................................................................................................................................................... 106
Managing Actions .................................................................................................................................................. 106
Managing Protocol Groups ................................................................................................................................. 107
Creating a New Action ......................................................................................................................................... 107
Editing or Deleting an Action ............................................................................................................................ 109
Managing Host Groups ........................................................................................................................................ 110
Managing Security Policies ................................................................................................................................. 110
Security Certificates ....................................................................................................................................................... 111
Installing Certificates ............................................................................................................................................ 111
Creating and Installing a Xerox
®
Device Certificate ............................................................................... 112
Installing the Generic Xerox
®
Trusted CA Certificate ............................................................................. 113
Creating a Certificate Signing Request ......................................................................................................... 113
Installing Root Certificates ................................................................................................................................. 114
Installing Domain Controller Certificates .................................................................................................... 115
Viewing, Saving, or Deleting a Certificate .................................................................................................... 115
Specifying the Minimum Certificate Key Length ...................................................................................... 116
802.1X ................................................................................................................................................................................. 117
Enabling and Configuring 802.1X in Xerox
®
CentreWare
®
Internet Services .............................. 118
System Timeout .............................................................................................................................................................. 120
Setting System Timeout Values ....................................................................................................................... 120
Overwriting Image Data .............................................................................................................................................. 121
Manually Deleting Image Data........................................................................................................................ 122
Scheduling Routine Deletion of Image Data ............................................................................................. 123
Immediate Job Overwrite ................................................................................................................................... 124
PostScript Passwords ..................................................................................................................................................... 125
Enabling or Creating PostScript Passwords ................................................................................................. 125
USB Port Security ............................................................................................................................................................ 126
Enabling or Disabling USB Ports ....................................................................................................................... 126
Displaying or Hiding Network Settings .................................................................................................................. 127
Hiding User Names on the Control Panel ............................................................................................................. 128
Verifying the Software ................................................................................................................................................. 129
Restricting Print File Software Updates ................................................................................................................ 130
Specifying Email and Internet Fax Recipient Restrictions ............................................................................ 131