Home > Xerox > Printer > Xerox WorkCentre 5740 User Manual

Xerox WorkCentre 5740 User Manual

Here you can view all the pages of manual Xerox WorkCentre 5740 User Manual. The Xerox manuals for Printer are available online for free. You can easily download all the documents as PDF.

Page 181

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide181
• Ensure the system time configured on the device is accurate. This is used to set the start time for 
self signed certificates.
Enable Secure HTTP (SSL)
Security certificates cannot be configured until the secure HTTP Protocol (SSL) is enabled:
1. From the Properties tab, click on the [Connectivity] link.
2. Click on the [Protocols] link.
3. Select [HTTP] in the directory tree.
4. In the Configuration...

Page 182

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 182
4. To create a Certificate Signing Request:
a. Select the CA-Signed Device Certificate(s) tab.
b. Click the [Create Certificate Signing Request (CSR)] button.
c. Complete the Certificate Signing Request (CSR) form with details for:
•2 Letter Country Code
•State/Province Name
•Locality Name
•Organization Name
• Organization Unit
•Subject Alternative Name (if required)
•E-mail Address
Note:Common Name on the...

Page 183

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide183
c. Click [View/Save]. The certificate details are displayed.
IP Sec
IP Sec (IP Security) consists of the IP Authentication Header and IP Encapsulating Security Payload 
protocols, that secure IP communications at the network layer of the group of protocols, using both 
authentication and data encryption techniques. The ability to send IP Sec encrypted data to the 
printer is provided by the use of a public...

Page 184

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 184
An IPsec Policy is a set of conditions, configuration options and security settings which allows two 
systems to agree on how to secure traffic between them. Multiple policies can be simultaneously 
active, however the scope and policy list order may alter the overall policy behavior.
Note:Before creating Policies, configure Host Groups, Protocol Groups and Actions.
6. In the Define Policy area, there are...

Page 185

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide185
5. To add or edit a Host Group in the IP Host Group area, either click on the [Add New Host Group] 
button or highlight a Host Group and click on the [Edit] button.
Note:If you change the name of the Host Group that is being used in the Security policy, then 
the updated host group name will also be reflected in the security policy details.
6. In the IP Host Group Details area:
a. To define or modify a Host...

Page 186

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 186
d. From the [Device is] drop-down menu, select either [Server] or [Client].
Note:The Service Name, Protocol Type, Port Number and Device is fields for a Custom Protocol 
will be disabled when its associated checkbox is unchecked.
5. Click on the [Save] button to return to the IPSec page.
Actions
This option displays the list of actions associated with the IPsec security policies. You can view and 
manage IP...

Page 187

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide187
•Tunnel Mode - this mode encrypts the IP header and the payload. It provides protection on 
an entire IP packet by treating it as an AH (Authentication Header) or ESP (Encapsulating 
Secuirty Payload) payload. 
When this mode is selected, you have the option of specifying a host IP Address
2. In the Security Selections area select preferred option and enter the required information.
3. Click on the [Save]...

Page 188

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 188
f. Select the preferred option from the [Perfect Forward Secrecy] drop-down menu. Default is 
‘None’ 
g. Check the required checkboxes for [Hash] and [Encryption]. 
Hash refers to the authentication mode, which calculates an Integrity Check Value (ICV) over 
the packet's contents. This is built on top of a cryptographic hash (MD5 or SHA1).
Encryption uses a secret key to encrypt the data before...

Page 189

Security Certificates
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide189
Security Certificates
A Trusted Certificate Authority is a Certificate Authority (CA) that is trusted to authenticate digital 
certificates. This page allows trusted root certificates to be uploaded to a server so that the server will 
‘trust’ any certificates that have been signed by that CA.
Digital certificates and the enablement of SSL provides encryption for all workflows where the device is 
used as a...

Page 190

Security Certificates
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 190
2. Click on the [Delete] button.
3. Click on the [OK] button when the acknowledgement message appears.
To Request a Machine Root Certificate
If the device does not have a trusted root certificate, or if it is using a self-signed certificate, users may 
see an error message related to the certificate when attempting to connect to the device’s Internet 
Services server. To resolve this, install the generic...
Start reading Xerox WorkCentre 5740 User Manual

Related Manuals for Xerox WorkCentre 5740 User Manual

All Xerox manuals