Download Print this page

Xerox VersaLink Secure Installation And Operation page 5

Multifunction and single function printer

Advertisement

setup Custom Permissions for Device Website Permissions to Restrict access to Home, Address Books and all
Jobs.
iii. If network authorization using LDAP is desired, follow the "Configuring LDAP Permission Groups" instructions
under "Configuring Authentication Settings" in Section 4 of the SAG. Make sure to only follow the instructions
pertaining to setting up an LDAP Server.
5. Personalization: Enable personalization by following the instructions for ""Configuring LDAP User Mappings" under
"LDAP" in Section 3 of the SAG.
6. Immediate Image Overwrite (Only for VersaLink Multifunction Printers that have a Hard Disk Drive): Follow the
instructions under 'To enable Disk Overwrite' under 'Managing Disk Overwrite" under "Managing Disk Drives" in
Section 4 of the SAG to enable Immediate Image Overwrite from the Web UI.
7. Security Certificates: Install a digital certificate on the device before enabling SSL/TLS by following the appropriate
instructions under "Security Certificates" in in Section 4 of the SAG for installing any one of the three types of digital
certificates – Device Certificates, CA Certificates and Trusted Certificates - the device supports. Note that the default
certificate comes already installed on the device when it comes out of manufacturing, so the System Administrator
has the option of using the default certificate already installed on the device or create a new certificate.
Follow the instructions for "Selecting a Certificate" to select a certificate already uploaded onto the device for use.
To import a certificate follow the instructions for "Importing a Certificate". Note that to import a certificate HTTPS
must be enabled (see I.b.8).
To create a self-signed certificate to use on the device follow the instructions for "Creating a Certificate".
If no Device Certificate is available, the device can automatically create a self-signed certificate by following the
instructions for "Enabling Automatic Self-Signed Certificates".
If a CA certificate is desired a Certificate Signing Request (CSR) will have to be sent to a Certificate Authority to obtain
the CA Certificate before it can be installed on the device; follow the instructions for "Creating a Certificate Signing
Request" under "Security Certificates" in Section 4 of the SAG to create the CSR.
If desired, certificate path validation can be performed by following the instructions for "Enabling Certificate Path
Validation".
Finally, set the options for certificate revocation by following the instructions for "Configuring Settings for Certificate
Revocation".
8. Transport Layer Security (TLS)/Secure Sockets Layer (SSL):
Note that on VersaLink devices SSL has been removed so only TLS is supported.
i. Follow the instructions under 'Configuring DNS Settings" (under "Configuring IP Settings in the Embedded Web
Server" under "IP") in Section 3 of the SAG for entering the host and domain names, to assign the machine a
valid, fully qualified machine name and domain from the Web UI (required for SSL to work properly).
ii. Enable HTTPS from the Control Panel or Web UI, respectively, by following the instructions for "Enabling HTTPS
at the Control Panel" or "Enabling HTTPS in the Embedded Web Server" under "Managing Settings for SSL/TLS"
in Section 4 of the SAG.
iii. Configure SSL/TLS by following the instructions for "Configuring Settings for SSL/TLS" under "Managing Settings
for SSL/TLS" in Section 4 of the SAG. For the most secure operation make sure that the 'HTTP – SSL/TLS
Communication', 'LDAP – SSL/TLS Communication' and 'SMTP – SSL/TLS Communication' options are all toggled
to be enabled and that SSLv3.0 is disabled in favor of TLS v1.x to avoid vulnerabilities associated with
downgrading from TLS to SSLv3.0. The device has the ability to only use either TLS 1.0, TLS 1.1 and TLS 1.2 or a
combination of the three. For secure operation disable TLS 1.0 by performing the following:
Access the WebUI by typing https://{IP Address of the device}.
Authenticate as a System Administrator (see I.a).
Select System > Security > SSL/TLS Settings.
Make sure the 'TLS 1.0' checkbox is not selected.
Click OK.
9. FIPS 140-2 Mode: Encryption of transmitted and stored data by the device must meet the FIPS 140-2 Standard.
Enable the use of encryption in "FIPS 140 mode" and check for compliance of certificates stored on the device to the
FIPS 140-2 Standard by following the instructions for "FIPS 140-2" under "Managing Network Security Settings" in
Section 4 of the SAG.
3

Advertisement

loading