Audit Log - Xerox ColorQube 9201 System Administrator Manual

Xerox printers system administrator guide
Hide thumbs Also See for ColorQube 9201:
Table of Contents

Advertisement

Security
c.
From the [Move This Rule To] drop-down list, select either End of List or Beginning of List
for the location of this rule. The order of the rules should be determined by the expected
traffic to the device. Note that rule order is important in IP Filtering because rules can negate
each other if placed in an incorrect order. For example, specific rules should be added to the
top of the list, whereas blanket policies should be added to the bottom of the list
d.
Enter the [Source IP Address] to which this rule will apply.
e.
Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of
0 to 32 corresponds to the 32 bit binary number comprising IP addresses. A number of 8, for
example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a
Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask
of 255, 255, 255, 0).
[Source Port]: This selection is only available when the Protocol has been set to TCP. Enter
f.
the originating port (if applicable) that the rule has been created to handle. If the incoming
packet did not originate from this source port, the rule will not be applied.
g.
[Destination Port]: This selection is only available when the protocol is set to TCP or UDP.
Enter the destination port that the rule has been created to handle. If the incoming packet
was not sent to this port, the rule will not be applied.
h.
[ICMP Message]: This selection is only available when the protocol is set to ICMP. Select
which ICMP Message the rule is meant to handle.
3.
Click on the [Apply] button to accept the changes or on the [Cancel] button to exit the window
without saving changes.

Audit Log

Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based
processes running on the server, exposure to access attacks, eavesdropping, file tampering, service
disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by
the System Administrator, often with the aid of third party analyzing tools, helps to assess attempted
server security breaches, identify actual breaches, and prevent future breaches. Access to the log's data
is protected by enabling SSL (Secure Sockets Layer) protocols. The Audit Log, and its associated data
protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria,
set by the United States Department of Defense. To enable this feature, perform the following steps.
IMPORTANT: Audit Log cannot be enabled until SSL (Secure Sockets Layer) is enabled on the device.
To enable SSL on a device, the device needs a Server Certificate. For instructions on how to set up a
Server Certificate, see
1.
At your Workstation, open the web browser and enter the IP address of the device in the Address
bar, and press [Enter].
2.
Click the [Properties] tab.
3.
If prompted, enter the Administrator User ID and Password. The default is [admin] and [1111].
4.
Click on the [Login] button.
5.
Click on the [Security] link.
6.
Select [Audit Log] in the directory tree.
Note:
You must enable SSL before enabling Audit Log.
In the Enabling Audit Log on machine area, check the [Enabled] checkbox for the Audit Log.
7.
148
Xerox ColorQube™ 9201/9202/9203
System Administrator Guide
Machine Digital Certificate Management
on page 151.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Colorqube 9202Colorqube 9203

Table of Contents