Xerox WorkCentre 5755 Manual
Here you can view all the pages of manual Xerox WorkCentre 5755 Manual. The Xerox manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 181
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide181 • Ensure the system time configured on the device is accurate. This is used to set the start time for self signed certificates. Enable Secure HTTP (SSL) Security certificates cannot be configured until the secure HTTP Protocol (SSL) is enabled: 1. From the Properties tab, click on the [Connectivity] link. 2. Click on the [Protocols] link. 3. Select [HTTP] in the directory tree. 4. In the Configuration...
Page 182
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 182 4. To create a Certificate Signing Request: a. Select the CA-Signed Device Certificate(s) tab. b. Click the [Create Certificate Signing Request (CSR)] button. c. Complete the Certificate Signing Request (CSR) form with details for: •2 Letter Country Code •State/Province Name •Locality Name •Organization Name • Organization Unit •Subject Alternative Name (if required) •E-mail Address Note:Common Name on the...
Page 183
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide183 c. Click [View/Save]. The certificate details are displayed. IP Sec IP Sec (IP Security) consists of the IP Authentication Header and IP Encapsulating Security Payload protocols, that secure IP communications at the network layer of the group of protocols, using both authentication and data encryption techniques. The ability to send IP Sec encrypted data to the printer is provided by the use of a public...
Page 184
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 184 An IPsec Policy is a set of conditions, configuration options and security settings which allows two systems to agree on how to secure traffic between them. Multiple policies can be simultaneously active, however the scope and policy list order may alter the overall policy behavior. Note:Before creating Policies, configure Host Groups, Protocol Groups and Actions. 6. In the Define Policy area, there are...
Page 185
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide185 5. To add or edit a Host Group in the IP Host Group area, either click on the [Add New Host Group] button or highlight a Host Group and click on the [Edit] button. Note:If you change the name of the Host Group that is being used in the Security policy, then the updated host group name will also be reflected in the security policy details. 6. In the IP Host Group Details area: a. To define or modify a Host...
Page 186
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 186 d. From the [Device is] drop-down menu, select either [Server] or [Client]. Note:The Service Name, Protocol Type, Port Number and Device is fields for a Custom Protocol will be disabled when its associated checkbox is unchecked. 5. Click on the [Save] button to return to the IPSec page. Actions This option displays the list of actions associated with the IPsec security policies. You can view and manage IP...
Page 187
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide187 •Tunnel Mode - this mode encrypts the IP header and the payload. It provides protection on an entire IP packet by treating it as an AH (Authentication Header) or ESP (Encapsulating Secuirty Payload) payload. When this mode is selected, you have the option of specifying a host IP Address 2. In the Security Selections area select preferred option and enter the required information. 3. Click on the [Save]...
Page 188
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 188 f. Select the preferred option from the [Perfect Forward Secrecy] drop-down menu. Default is ‘None’ g. Check the required checkboxes for [Hash] and [Encryption]. Hash refers to the authentication mode, which calculates an Integrity Check Value (ICV) over the packet's contents. This is built on top of a cryptographic hash (MD5 or SHA1). Encryption uses a secret key to encrypt the data before...
Page 189
Security Certificates WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide189 Security Certificates A Trusted Certificate Authority is a Certificate Authority (CA) that is trusted to authenticate digital certificates. This page allows trusted root certificates to be uploaded to a server so that the server will ‘trust’ any certificates that have been signed by that CA. Digital certificates and the enablement of SSL provides encryption for all workflows where the device is used as a...
Page 190
Security Certificates WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 190 2. Click on the [Delete] button. 3. Click on the [OK] button when the acknowledgement message appears. To Request a Machine Root Certificate If the device does not have a trusted root certificate, or if it is using a self-signed certificate, users may see an error message related to the certificate when attempting to connect to the device’s Internet Services server. To resolve this, install the generic...