manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. Xerox
  6. •
  7. All In One Printer
  8. •
  9. Xerox WORKCENTRE 5735 Owner's manual

Xerox WORKCENTRE 5735 Owner's manual

Version 1.3
Jan 27, 2012
Secure Installation and
Operation of Your
WorkCentre™
5735/5740/5745/5755/
5765/5775/5790
Secure Installation and Operation of Your WorkCentre™
5735/5740/5745/5755/5765/5775/5790
Purpose and Audience
This document provides information on secure installation and operation. All customers, but particularly those concerned with
secure installation and operation of these machines, should follow these guidelines.
Overview
This document lists some important customer information and guidelines that will ensure that your device is operated and
maintained in a secure manner.
Background
These systems are Common Criteria certified. The information provided here is consistent with the security functional claims
made in the Security Target. The Security Target will be available from the Common Criteria Certified Product website
(http://www.commoncriteriaportal.org/products.html) list of evaluated products, from the Xerox security website
(http://www.xerox.com/information-security/common-criteria-certified/enus.html ) or from your Xerox representative.
1. Please follow the guidelines below for secure installation, setup and operation of the evaluated configuration:
a). The security functions in the evaluated configuration that should be set up by the System Administrator are:
•Immediate Image Overwrite
•On Demand Image Overwrite
•Disk Encryption
•FIPS 140-2 Encryption
•IP Filtering
•Audit Log
•SSL
•SNMPv3
•IPSec
•Local, Remote or Smart Card Authentication
•Local Authorization and Personalization
•802.1x Device Authentication
•Session Inactivity Timeout
•Hold All Jobs
System Administrator login is required when accessing the security features via the Web User Interface (Web UI) or when
implementing the guidelines and recommendations specified in this document. To log in to the Web UI as an authenticated
System Administrator, follow the instructions under “Accessing Internet Services as System Administrator” located on page
24 in the System Administration Guide (SAG)1.
To log in to the Local User Interface (Local UI) as an authenticated System Administrator, follow the “Access Tools Pathway
as a System Administrator” instructions located on page 18 in the SAG.
Follow the instructions located in the SAG in Chapter 8, Security to set up these security functions except as noted in the
items below. Note that whenever the SAG requires that the System Administrator provide an IPv4 address, IPv6 address or
port number the values should be those that pertain to the particular device being configured.
b). The following services are also considered part of the evaluated configuration and should be enabled when needed by the
System Administrator - Copy, Embedded Fax, Fax Forwarding on Receive (for Embedded Faxes), Scan to E-mail, Workflow
Scanning, Scan to Mailbox, Internet Fax, and ID Card Copy.
Secure acceptance, once device delivery and installation is completed, should be done by:
•Printing out a Configuration Report by following the instructions located in the SAG in the Print a Configuration
Report section on page 18.
•Comparing the software/firmware versions listed on the Configuration Report with the Evaluated Software/Firmware
versions listed in Table 2 of the Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Security Target, Version
1.0 and make sure that they are the same in all cases.
c). Change the Administrator password as soon as possible. Reset the Tools password periodically.
(1) Set the Administrator password to a minimum length of eight alphanumeric characters, (2) change the Administrator
password once a month and (3) ensure that all passwords are strong passwords (e.g., passwords use a combination of
alphanumeric and non-alphanumeric characters; passwords don’t use common names or phrases, etc.).
TP
1Xerox® ®
WorkCentre 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide, Version 2.0, December 2010
2
For directions on how to change the Tools password, follow the “Changing the System Administrator Password” instructions
on page 24 in the SAG.
d). The System Administrator should establish or ensure that unique user accounts are established with appropriate privileges
for all users who require access to the device, that no ‘Guest’ users are allowed to access any services on the device and that
local usernames established on the device match domain names and both map to the same individual. Follow the “User
Information Database” instructions starting on page 173 in the SAG to set up local user accounts on the device.
The System Administrator should also ensure that authentication passwords for unique user accounts established for users
should be set to a minimum length of 8 (alphanumeric) characters unless applicable internal procedures require a minimum
password of a greater length. The ‘Maximum Length’ can be set to any value between 8 and 63 (alphanumeric) characters
consistent with the same internal procedures.
Follow the “Password Settings” instructions on page 175 in the SAG to set the minimum and maximum user authentication
password lengths.
e). Xerox recommends the following passcodes be changed on a regular basis, chosen to be as random as possible and set to
the indicated minimum lengths:
•Smart Card or CAC passcode – 8 characters (alphanumeric)
•Secure Print passcode – 6 digits
•Scan To Mailbox password – 8 characters (alphanumeric)
f). In the evaluated configuration the ability to delete a job should be set to ‘System Administrators Only’ if set from the Local
UI or ‘Administrators Only’ if set from the WebUI. Follow the instructions for “Job Operation Rights” starting on page 38 of
the SAG from the Local UI or for “Job Management” on page 38 of the SAG from the WebUI.
For establishing network (remote) authentication access to network accounts follow the Authentication Configuration
(Network Authentication) section starting on page 157 of the SAG. Follow the instructions located in the Configuring the
Smart Card section starting on page 20 and in the Using the Smart Card section on page 34 in the CAC Guide2to set up
user authentication via a Smart Card and to use the Smart Card, respectively.
The device System Administrator should be aware of situations in which a normal device user has admin privileges on the
network authentication server. While permissible in certain customer environments, this arrangement could create the
opportunity for authentication bypass at the devices. The device System Administrator should be diligent in monitoring the
audit log for unauthorized configuration changes.
g). In the evaluated configuration the System Administrator should ensure that all pathways and services are ‘Locked’ so that
they can be accessed only by authenticated users. Follow the instructions in the ‘To set Authentication to control access to
individual services’ steps included in the discussion of each Authentication Configuration method starting on page 158 of
the SAG to lock all pathways and services.
h). All print, copy, workflow scan, scan to email, Internet Fax, LANFax and Embedded Fax jobs (both send and receive) are
temporarily stored on the hard disk drive. For customers concerned about these document files stored on the hard disk drive
the Immediate Image Overwrite and On Demand Image Overwrite security features, which comes installed on the device,
must be properly configured and enabled. Two forms of On Demand Image Overwrite are manually invoked – a Standard
On Demand Image Overwrite that will overwrite all image data except data stored by the Reprint Save Job feature, data
stored in Scan to Mailbox folders and data stored in Embedded Fax dial directories and mailboxes and a Full On Demand
Image Overwrite that will overwrite all image data including data stored by the Reprint Save Job feature, data stored in
Scan to Mailbox folders and data stored in Embedded Fax dial directories and mailboxes. Note that the Reprint Saved Jobs
feature and Embedded Fax mailboxes are not part of the evaluated configuration.
Please follow the “On Demand Overwrite” instructions starting on page 195 in the SAG for proper setup and initiation of a
Standard or Full On Demand Image Overwrite from either the Local UI or the Web UI. The System Administrator also has
the option of scheduling either a Standard or Full On Demand Image Overwrite from the Web UI. Follow the “To Schedule
On Demand Overwrite” instructions on page 197 in the SAG to schedule an On Demand Image Overwrite.
To enable Immediate Image Overwrite from the control panel, follow the instructions under ‘To Enable or Disable
Immediate Image Overwrite’ on page 200 of the SAG.
Notes:
•Immediate Image Overwrite of a delayed print job will not occur until after the machine has printed the job.
2Xerox®Smart Card Installation Guide Xerox®WorkCentre 5632/5638/ 5655/5665/5675/5687 Xerox®WorkCentre
5735/5740/5745/5755/5765/5775/5790 Xerox®WorkCentre 5135/5150 Xerox®WorkCentre 5030/5050 (software version 05.004.xx.xxx),
Version 6.0, 06/11
3
•If an Immediate Image Overwrite fails, an error message will appear at the top of the screen indicating that there is an
Immediate Image Overwrite error and that an On Demand Image Overwrite should be run. This error message will
persist until an On Demand Image overwrite is initiated by the System Administrator.
•If there is a power failure or system crash while a workflow scan job is being processed, an Immediate Overwrite of the
residual data will occur upon job recovery. However, the workflow scan job may not appear in the Completed Job Log.
•If there is a power failure or system crash of the network controller while processing a print job, residual data might still
reside on the Network Controller hard drive. The System Administrator should immediately invoke an On Demand
Image Overwrite once the machine has been restored.
•Once an On Demand Image Overwrite has been initiated by the System Administrator from either the Local UI or Web
UI it can not be aborted by the System Administrator.
•Before invoking an On Demand Image Overwrite verify that:
•There are no active or pending print or scan jobs.
•There are no new or unaccounted for Dynamic Loadable Modules (DLMs) or other software running on the
machine.
•There are no active processes that access the network controller hard disk.
•No user is logged into a session via telnet, network accounting, Xerox Standard Accounting, or the internal auditron,
or into a session accessing a directory on the network controller hard disk.
•After a power on of the machine all subsystems must be properly synced and, if printing of Configuration Reports is
enabled on the device, the Configuration Report must have printed.
•For any previously initiated On Demand Image Overwrite request the confirmation sheet must have printed.
•The Embedded Fax card must have the correct software version and must be properly configured.
•When invoked from the Web UI the status of the completed On Demand Image Overwrite will not appear on the Local
UI but can be ascertained from the On Demand Overwrite Confirmation Report that is printed after the Network
Controller reboots.
•If an On Demand Image Overwrite fails to complete because of an error or system crash, a system reboot or software
reset should be initiated by the System Administrator from either the Local UI or the Web UI and be allowed to
complete; otherwise, the Local UI may become unavailable. If the Local UI does become unavailable the machine will
have to be powered off and then powered on again to allow the system to properly resynchronize. Once the system
reboots or software reset has completed the System Administrator should immediately perform another On Demand
Image Overwrite.
•If there is a failure in the hard disk drive a message recommending that an On Demand Image Overwrite be run will
appear on the Local UI screen. The System Administrator should immediately perform the requested On Demand
Image Overwrite.
•The time shown on the On Demand Overwrite progress screen displayed on the Local UI may not reflect Daylight
Savings Time.
•If an On Demand Image Overwrite is successfully completed, the completion (finish) time shown on the printed On
Demand Overwrite Confirmation Report will be the time that the system shuts down.
•The System Administrator should perform an On Demand Image Overwrite immediately before the device is
decommissioned, returned, sold or disposed of.
i). These systems support the use of SSLv2.0, SSLv3.0, RC4 and MD5. However, customers are advised to set the crypto policy
of their clients to request either SSLv3.1 or TLSv1.0 and to disallow the use of RC4 and MD5. Security functions in the
evaluated configuration make use of cryptographic ciphers listed in Section 6.3.3 and its subsections of the Security Target.
The cryptographic module supports additional ciphers that may be called by other unevaluated functions.
j). For SSL to work properly the machine must be assigned a valid, fully qualified machine name and domain. To set the
machine host and domain names follow the instructions in the Configure IP Settings Using Internet Services section for
setting the host name and domain name for IPv4 on page 96 or for setting the domain name for IPv6 on page 97 of the
SAG, depending on which IP protocol is to be used.
k). When utilizing Secure Sockets Layer (SSL):
a). For the purposes of the evaluation, the maximum validity of digital certificates was set to 180 days.
b). If a self-signed certificate is to be used the generic Xerox root CA certificate should be downloaded from the device and
installed in the certificate store of the user's browser.
4
l). To enable HTTPS (SSL) follow the instructions for setting up Secure HTTP (SSL) in the Configure HTTP section on page 122
of the SAG. Before setting up Secure HTTP (SSL) follow the “Security Certificate Management” instructions starting on
page 179 of the SAG to install on the device either a self-signed digital certificate or a digital certificate signed by a
Certificate Authority (CA).
m). When utilizing Secure Sockets Layer (SSL) for secure scanning:
•SSL should be enabled and used for secure transmission of scan jobs.
•When storing scanned images to a remote repository using an https connection, a Trusted Certificate Authority
certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository.
•When an SSL certificate for a remote SSL repository fails its validation checks the associated scan job will be deleted
and not transferred to the remote SSL repository. The System Administrator should be aware that in this case the job
status reported in the Completed Job Log for this job will read: “Job could not be sent as a connection to the server
could not be established”.
n). To be consistent with the evaluated configuration, the HTTPS protocol should be used to send scan jobs to a remote IT
product.
o). To be consistent with the evaluated configuration, protocol choices for remote authentication should be limited to
[Kerberos (Solaris)], [Kerberos (Windows 2000/2003)] or [LDAP].The device supports other protocol options.Choose the
protocol option that best suits your needs.
In the case of LDAP/LDAPS the System Administrator should ensure that SSL is enabled as discussed in Step 6d under “To
Configure LDAP Server” on page 116 in the SAG.
p). To be consistent with the evaluated configuration, the device should be set for local authorization. Remote authorization
was not evaluated since that function is performed external to the system.Choose the authorization option that best suits
your needs.
q). As part of the evaluated configuration, encryption of transmitted and stored data by the device must meet the FIPS 140-2
Standard. To enable the use of encryption in “FIPS 140 mode” and check for compliance of certificates stored on the device
to the FIPS 140-2 Standard follow the “FIPS 140-2 Encryption” instructions on page 172 of the SAG.
r). In viewing the Audit Log the System Administrator should note the following:
•Deletion of a file from Reprint Saved Jobs folders or deletion of a Reprint Saved Job folder itself is recorded in the Audit
Log.
•Deletion of a print or scan job or deletion of a scan-to-mailbox job from its scan-to-mailbox folder may not be recorded
in the Audit Log.
•Extraneous process termination events (Event 50) may be recorded in the Audit Log when the device is rebooted or
upon a Power Down / Power Up.
s). The System Administrator should download and review the Audit Log on a daily basis. In downloading the Audit Log the
System Administrator should ensure that Audit Log records are protected after they have been exported to an external
trusted IT product and that the exported records are only accessible by authorized individuals.
t). Be careful not to create an IP Filtering rule that rejects incoming TCP traffic from all addresses with source port set to 80;
this will disable the Web UI.
IP Filtering is not available for the AppleTalk protocol or the Novell protocol with the ‘IPX’ filing transport. Also, IP Filtering
will not work if IPv6 is used instead of IPv4.
u). User data encryption is automatically enabled on the device when the device is delivered; no further configuration by the
System Administrator is required. The System Administrator should periodically check the Configuration Report (see
Comment #1b above) to ensure that User Data Encryption remains enabled.
v). The System Administrator should ensure that the Embedded Fax Card and fax software is properly installed in accordance
with the installation and setup instructions in the Embedded Fax chapter on pages 271-272 of the SAG. The System
Administrator can then set Embedded Fax parameters and options via the Local User Interface on the machine. Follow the
instructions in either the Deferred Fax Settings on pages 273 or the Setting Fax Defaults section starting on page 274 in
the SAG or in the Set Fax Defaults section on page 263 and the Fax Settings section starting on page 266 of the User
Guide3.
w). To enable and configure IPSec, follow the instructions starting on page 183 in the SAG. IPSec should be used to secure
printing jobs; HTTPS (SSL) should be used to secure scanning jobs.
3Xerox®WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 User Guide, Version 2,0, December 2010
5
Use the default values for IPSec parameters listed in the IPSec discussion starting on page 183 in the SAG whenever
possible for secure IPSec setup.
x). To enable the session inactivity timers (termination of an inactive session) from the Web UI follow the instructions on page
194 of the SAG.
y). There is a software verification test feature that checks the integrity of the executable code by comparing a calculated hash
value against a pre-stored value to ensure the value has not changed. To initiate this feature perform the following from the
Web UI:
•Select the Properties tab.
•Select the following entries from the Properties 'Content menu’: Security ÆSoftware Verification Test.
•Select the [Start] button to initiate the software verification test.
z). To enable the Scan to Mailbox feature from the Web UI:
•Select the Properties tab.
•Select the following entries from the Properties 'Content menu’: Services ÆScan to Mailbox ÆEnablement
•Select the [Enable Scan to Mailbox] button and then select the [On Scan tab, view Mailboxes by default] button.
•Select the [Apply] button. This will save the indicated settings.
For the purposes of the evaluation, the Scan to Mailbox feature was set to store scanned documents only in private folders.
To set the scan policies for the Scan to Mailbox feature, select the following entries from the Properties 'Content menu’:
Services ÆScan to Mailbox ÆScan Policies. Public folders are not allowed in the evaluated configuration. The scan
policies should therefore be set as follows:
•Deselect [Allow Scanning to Default Public Folder].
•Deselect [Require per Job password to public folders].
•Select [Allow additional folders to be created]
•Select [Require password when creating additional folders].
•Select [Prompt for password when scanning to private folder].
•Deselect [Allow access to job log data].
Passcodes for Scan-to-Mailbox mailboxes should be selected to be as random as possible and should be changed on a
regular basis, consistent with applicable internal policies and procedures. Xerox recommends that the minimum length of a
password assigned to a private Scan to Mailbox folder be 8 alphanumeric characters.
aa). In the evaluated configuration Embedded Fax Secure Receive option should be enabled,4fax forwarding on receive feature
should be enabled, and both the Local Polling option and embedded fax mailboxes should not used.
After normal business hours Fax Forwarding on Receive should be enabled and secure receive should be disabled.
•To enable/disable Secure Receive from the Local UI follow the instructions under “Secure Receive” on page 279 of the
SAG. The System Administrator should ensure that the secure receive passcode, which is fixed at 4-digits, is changed
every three days.
•To enable Fax Forwarding on Receive and establish up to five fax forward rules from the WebUI follow the instructions
for “Fax Forward” starting on page 284 of the SAG.
The Mailbox and Polling Policy should be set to delete received faxes when they are printed. To set the Mailbox and Polling
Policy follow the instructions under “File Management – Retained Document Policy” on page 282 of the SAG. Makes sure
the ‘Delete on Print’ option is selected.
bb). For best security print jobs submitted to the device from a client or from the Web UI should be submitted as a secure print
job. Once a secure print job has been submitted the authenticated user can release the job for printing at the Local UI
following the directions for releasing a job on page 244 of the User Guide.
cc). In the evaluated configuration the Secure Print security function should be set to require the user ID for identification
purposes to release a secure print job. Follow the instructions on page 31 of the SAG to access and configure the Secure
Print security function.
dd). Before upgrading software on the device via the Manual/Automatic Customer Software Upgrade, please check for the latest
certified software versions. Otherwise, the machine may not remain in its evaluated configuration.
ee). In the evaluated configuration, customer software upgrades via the network should be disabled.
4This will apply to any received fax, including faxes that are remotely polled to the device from another remote fax machine or remote device.
6
ff). In the evaluated configuration the domain filtering option for E-mail was set to limit the domains to which Scan to E-mail
jobs can be sent. To enable the domain filtering option perform the following from the WebUI:
•Select the Properties tab.
•Select the following entries from the Properties 'Content menu’:
•Services ÆEmail ÆSetup. Select the Security tab
•Select the [Edit] button under “Network Policies”.
•The Security:Distribution Restriction Web UI page will be displayed. Select one of the two desired options under
“Domain Filter Settings” other than ‘Off’ to enable the Email domain filtering feature. Add the desired domains to filter
Email and Internet Fax jobs to and set the other settings on this page as desired.
•Select the [Save] button. This will ensure Email domain filtering is enabled.
gg). In the evaluated configuration the Hold All Jobs function should be configured so that Enablement is set to ‘Hold All Jobs in
a Private Queue’ and the Unidentified Jobs Policies is set to ‘Hold Jobs; Only Administrators can Manage Jobs’. Follow the
instructions on page 32 of the SAG to access and configure the Hold All Jobs function.
hh). The following features and protocols are not included in the evaluation:
•Reprint from Saved Job
•SMart eSolutions
•Custom Services (Extensible Interface Platform or EIP)
•Network Accounting and Auxiliary Access
•NTP
•Use of Embedded Fax mailboxes.
•Direct USB Printing
•Web Services
ii). To enable and configure SNMPv3 follow the instructions in the “To Configure SNMP v3” section starting on page 103 of
the SAG. SNMPv3 cannot be enabled until SSL (Secure Sockets Layer) and HTTPS (SSL) are enabled on the machine. Once
SNMPv3 is enabled, however, SSL can be disabled and SNMPv3 will still function properly.
The System Administrator should be aware that in configuring SNMPv3 there is the option of resetting both the Privacy and
Authentication passwords back to their default values. This option should only be used if necessary since if the default
passwords are not known no one will be able to access the SNMP administrator account5.
2. Although not part of the evaluated configuration, Xerox recommends that if the use of SNMP v1/v2c is desired the System
Administrator change the SNMP v1/v2c public/private community strings from their default string names to random string
names.
3. Customers should sign up for the RSS6subscription service available via the Xerox Security Web Site (Security@Xerox) at
www.xerox.com/security that permits customers to view the latest Xerox Product Security Information and receive timely
reporting of security information about Xerox products, including the latest security patches.
4. The device should be installed in a standard office environment. Office personnel should be made aware of authorized service
calls (for example through appropriate signage) in order to discourage unauthorized physical attacks such as attempts to
remove the internal hard disk. The System Administrator should also ensure that office personnel are made aware to pick up the
outputs of print and copy jobs in a timely manner.
5. Customers who encounter or suspect software problems should immediately contact the Xerox Customer Support Center to
report the suspected problem and initiate the SPAR (Software Problem Action Request)7process for addressing problems found
by Xerox customers.
5The SNMP administrator account is strictly for the purposes of accessing and modifying the MIB objects via SNMP; it is separate from the System
Administrator “admin” user account or user accounts given SA privileges by the System Administrator “admin” user. The administrator account can
not perform any System Administrator functions.
6RDF Site Summary, or Rich Site Summary, or Really Simple Syndication – A lightweight XML format for distributing news headlines and other
content on the Web. Details for signing up for this RSS Service are provided in the Security@Xerox RSS Subscription Service guide posted on the
Security@Xerox site at
http://www.xerox.com/go/xrx/template/009.jsp?view=Feature&ed_name=RSS_Security_at_Xerox&Xcntry=USA&Xlang=en_US.
7A SPAR is the software problem report form used internally within Xerox to document customer-reported software problems found in products in
the field.
7
6. Caution: These systems allow an authenticated System Administrator to disable functions like On Demand Overwrite that are
necessary for secure operation. System Administrators are advised to periodically review the configuration of all installed
machines in their environment to verify that the proper secure configuration is maintained.
7. Depending upon the configuration of the device two IPv4 addresses, a primary IPv4 address and a secondary IPv4 address, may
be utilized. The System Administrator assigns the primary IPv4 address either statically or dynamically via DHCP from the IP
(Internet Protocol) page on the Web UI8.The second IPv4 address is assigned via APIPA when the System Administrator
enables the ‘Self Assigned Address’ option from the IP (Internet Protocol) page on the Web UI. If the ‘Self Assigned Address’
option is enabled (which is the default case), this secondary IPv4 address will not be visible to the SA9.Xerox recommends that
the ‘Self Assigned Address’ option from the Web UI IP (Internet Protocol) page be disabled unless either APIPA is used or
Apple Rendezvous/Bonjour support is required.
8. If a system interruption such as power loss occurs a job in process may not be fully written to the network controller hard disk.
In that case any temporary data created will be overwritten during job recovery but a corresponding record for the job may not
be recorded in the completed job log or audit log.
9. If IPv6 is disabled and then a software upgrade is performed by a Xerox Service Technician using an AltBoot, IPv6 will be
disabled even though both the Local UI and Web UI show that IPv6 is enabled. IPv6 can be enabled again via the Web UI by
first disabling and then re-enabling it.
10. A unique Scan-to-Mailbox mailbox should be established for each authenticated user.
11. Remote Polling should only be used by the System Administrator.
12. Printing of Embedded Fax confirmation reports is not included in the evaluation. The Embedded Fax cover sheets should not be
printed with an Embedded Fax job.
13. Users should be aware that correct remote repository document pathnames for the receipt of workflow scanning jobs should
start with one ‘\’ and not two ‘\’s.
14. Users should be provided with appropriate training on how to use these systems in a secure manner before being assigned user
accounts to access the device.
15. The following security-relevant window is available from the Local User Interface with System Administrator login and
authentication. This window provides standard system configuration or job management capability:
•Reset Local UI to Factory Defaults – Allows the System Administrator to reset the UI to its factory default values. Is
accessible by selecting the following from the Tools Pathway (via selecting the [Machine Status] hard button): [Device
Settings] button Æ[Reset UI to Factory Settings…] button.
16. The following windows are available to any authenticated and authorized user from the Local User Interface. These windows
provide standard machine services or job management capability:
•Changing the Kerberos Server via the Local UI – Allows a user, in the case where more than one Kerberos Server has been
set up by the System Administrator for network authentication, to switch between Kerberos servers for the purpose of user
authentication at the Local UI. Is accessible by selecting the [DNS…] button in the upper right corner of the Authentication
Required screen on the Local UI when the user is attempting to be authenticated.
•Workflow Scanning Authentication Required – Allows a user to enter the proper user credentials for a workflow scanning
job being sent to a network destination that requires user login. Is accessible by selecting the following screens/buttons in
order: [Services Home] hard button Æ[Workflow Scanning] button Æ[Start] hard button when a user is submitting a
workflow scanning job to a network destination that requires user login Æ[OK] button.
•Overwrite Security Failure – Automatically provides an error message to the user is case an Immediate Image Overwrite of
a copy, print, workflow scanning, scan to email, Internet Fax or Embedded Fax job fails. The error message informs the user
to notify the System Administrator that an On Demand Overwrite should be run and persists on the Local UI screen until
either a manual or a scheduled On Demand Overwrite is initiated.
•Internet Fax Build Job – Allows a user to program, scan and store individual Build Job segments for an Internet Fax job. Is
accessible by selecting the following: [Services Home] hard button ÆInternet Fax button ÆJob Assembly tab Æ[Build
Job] button.
•Pausing an active job being processed by the device – Allows the user to pause an active copy, print, workflow scanning,
scan to email, Internet Fax or Embedded Fax job while it is being processed. Is accessible by selecting the [Stop] machine
hard button while a job is being processed by the device. Depending on the type of jobs being processed by the device when
the [Stop] button is selected, one of the following Pause windows will be displayed as appropriate to allow the user to
8The primary IPv4 address can also be assigned dynamically via DHCP from the Dynamic Addressing screen on the Local UI.
9The primary IPv4 address will always be displayed on the Configuration Report that can be printed for the device.
8
determine whether to delete or continue processing of the job: Scanning Pause window, Printing Pause window, Copy Only
(Scanning and Printing) Pause window, Scanning/Printing (Simultaneous Jobs) Pause window, Scanning Build Job
Segment (No Printing) Pause window, Printing Build Job Segment (No Scanning) Pause window or Scanning Build Job
Segment/Printing Another Job Pause window.
•User Interface Diagnostics - Allows the user to run diagnostics on the User Interface software. Is accessible by pressing the
machine hard buttons ‘Dial Pause’ + ‘*’ + ‘#’ in that order.
•Encryption/Decryption in Progress Pop-Up Screen – Informs the user that the systems is performing an encryption or
decryption of data stored on the Network Controller hard disk. The Data Encryption/Decryption in progress pop-up screen
will appear automatically whenever a machine that is in an operational mode receives a request that requires data stored
on the Controller hard disk to be either encrypted or decrypted.
17. The Web UI provides a set of on-line help pages that provide guidance on most of the Web UI pages. These on-line help pages
can be accessed from the Web UI by selecting the [Help] button on the upper right hand corner of every Web UI page; the on-
line help page corresponding to the Web UI page being viewed will be displayed. There is also a ‘TOC’ contents list of all Web UI
help pages to the left of each help page; scrolling through the content list and selecting the desired page will also cause the
applicable on-line help page to be displayed.
The following pages are available from the Web UI with System Administrator login and authentication but are not
documented in the SAG, User’s Guides or the on-line help:
•Certificate Key Length - Allows the System Administrator to define the minimum encryption key length. Is accessible by
selecting the Properties tab and then selecting the following entries from the Properties 'Content menu’: Security Æ
Security Certificates ÆCertificate Key Length.
•SMB Filing - Allows the System Administrator to set whether information set to/from the device using SMB will be
encrypted. Is accessible by selecting the Properties tab and then selecting the following entries from the Properties
'Content menu’: Connectivity ÆProtocols ÆSMB Filing.
•Security Certificates, Domain Controller Certificates - Allows the System Administrator, when the ‘Authentication method
on the machine’s touch interface (Touch UI)’10 on the Authentication, Authorization and Personalization page is set to
“Smart Cards”,11 to manage domain controller certificates installed or to be installed on the device. Is accessible by selecting
the Properties tab and then selecting the following entries from the Properties 'Content menu’: Security Certificates Æ
Domain Controller Certificate(s) tab .
•Install Domain Controller Certificates - Allows the System Administrator, when the ‘Authentication method on the
machine’s touch interface (Touch UI)’ on the Authentication, Authorization and Personalization page is set to “Smart
Cards”, to install a domain controller certificate on the device. Is accessible by selecting the Properties tab and then
selecting the following entries from the Properties 'Content menu’: Security Certificates ÆDomain Controller
Certificate(s) tab ÆInstall Domain Controller Certificate button.
•Application Domain/Content Query - Allows the configuration of the system to perform an LDAP query for the logged-in
user’s authentication domain prior to authenticating the server. Is accessible by typing http://{IP
Address}12/diagnostics/index.dhtml and then selecting ‘Authentication Domain/Context Query’ from the Diagnostics
Content Menu.
•Scanning Lock Files - Allows bypassing the filename locking feature. Is accessible by typing http://{IP
Address}/diagnostics/index.dhtml and then selecting ‘Scanning Lock Files’ from the Diagnostics Content Menu or by
typing http://{IP Address}/diagnostics/lockFiles.dhtml.
•Gray Other Queue Button - Allows the System Administrator to grey out the ‘Other Queue’ button on the Local UI. Is
accessible by typing http://{IP Address}/diagnostics/index.dhtml and then selecting ‘Grey Other Queues Button’ from the
Diagnostics Content Menu or by typing http://{IP Address}/diagnostics/hideotherqueuesbutton.php.
•Secure Print Alphanumeric PIN - Allows the System Administrator to set the secure print PIN to be alphanumeric
characters instead of just digits. Is accessible by typing either http://{IP Address}/diagnostics/index.dhtml and then
selecting ‘Secure Alphanumeric PIN’ from the Diagnostics Content Menu or by typing http://{IP
Address}/diagnostics/secureprintalphanumericpin.php.
•Secure Attribute Editor - Allows the user to change some system attributes related to PDLs (e.g., memory usage, copies per
page, etc.). Is accessible by typing http://{IP Address}/diagnostics/secureattr.dhtml.
10 ‘Touch UI’ is another term for the Local UI.
11 See the Authentication Configuration section starting on page 156 of the SAG on how to set this parameter.
12 {IP Address} is the IPv4 address of the machine
9
•Suppress Job Name - Allows the System Administrator to suppress displaying the job name on the Banner Page when
submitting a print job. Is accessible by typing http://{IP Address}/diagnostics/jobNameSuppress.dhtml.
•Job Log File Format - Allows the System Administrator to set the XML job log file format. Is accessible by typing http://{IP
Address}/diagnostics/jobLog.dhtml.
•File Extension Case - Allows the System Administrator to select all file extensions to be created in either lower or upper
case. Is accessible by typing http://{IP Address}/diagnostics/fileExtensionCase.dhtml.
•Email Security - Allows the System Administrator to secure the device’s email service. Is accessible by typing http://{IP
Address}/diagnostics/emailSecurity.php.
•Binary Printing Support - Allows the device to accept printing jobs that are identified as binary files. Is accessible by typing
http://{IP Address}/diagnostics/binaryAllow.php.
•XSA Reports with User IDs - Allows the device to generate Xerox Standard Accounting reports with User IDs. Is accessible
by typing http://{IP Address}/diagnostics/enableUserID.php.
•Postscript Filter PDL Guessing Policy - Allows the System Administrator to select whether the Postscript Filter guess
algorithm will use a strict or loose interpretation. Is accessible by typing http://{IP
Address}/diagnostics/postScriptTokens.php.
•Web Services IP Lockout Reset - Allows the System Administrator to clear the Web Services IP Address Lockout cache. Is
accessible by typing http://{IP Address}/diagnostics/ipLockout.php.
•Service Registry Reset - Allows the System Administrator to reset the device’s Service Registry to its default values. Is
accessible by typing http://{IP Address}/diagnostics/registryReset.php.
•Job Queue Limit - Allows the System Administrator to set the maximum number of jobs that can be listed in the device’s
job queues. Is accessible by typing http://{IP Address}/diagnostics/jobLimit.php.
•Barcode Space Character Interpretation - Allows the System Administrator to choose how the device renders space
characters within barcode fonts. Is accessible by typing http://{IP Address}/diagnostics/barcodeSpaceToggle.php.
•Filename Extension - Allows the authorized user to select all filename extensions to be created in either lower case or upper
case. Is accessible by typing http://{IP Address}/diagnostics/fileExtensionCase.php.
•DHCP v6 - Allows the System Administrator to choose which compliance option will be followed when DHCP v6 is used. Is
accessible by typing http://{IP Address}/diagnostics/dhcpv6Options.php.
•View Service Registry Contents - Allows the System Administrator to view the contents of the device’s Service Registry. Is
accessible by typing http://{IP Address}/diagnostics/viewRegistry.php.
•Diagnostics Tree - Allows the System Administrator to view the selectable list of diagnostics Special Purpose Pages. Is
accessible by typing http://{IP Address}/diagnostics/tree.php.
•Color Copy Control Test Result - Allows the System Administrator to view the Color Copy Control test results. Is accessible
by typing http://{IP Address}/diagnostics/testResult.php.
•PCL Advanced Configuration - Allows the System Administrator to enter the desired PCL advanced configuration paper size
code. Is accessible by typing http://{IP Address}/diagnostics/pclSetup.php.
•Control Kerberos Settings – Allows the System Administrator to control how the device performs Kerberos authentication
with a domain controller, LDAP server and other kerberized services as they are developed. Is accessible by typing http://{IP
Address}/diagnostics/kerberosSettings.php.
•Download DLM PCL Forms - Allows the System Administrator to download the DLM PCL forms into the device. Is accessible
by typing http://{IP Address}/diagnostics/dl_pcl.php.
•Multiple Pages per JBIG2 Dictionary - Allows the System Administrator to enable the multiple pages per JBIG2 dictionary
feature (for PDF and PDF/A only). Is accessible by typing http://{IP Address}/diagnostics/disableMultiplePages.php.
•Show WebUI Configuration Page - Allows the System Administrator to enable users who are not authenticated
administrators to view the WebUI Configuration Page. Is accessible by typing http://{IP
Address}/diagnostics/ShowConfigSheet.php.
•NTLM v2 Response - Allows the System Administrator to enable the device to send only the NT Lan Manager (NTLM)
Version 2 protocol (and refuse the LM & NTLM versions). Is accessible by typing http://{IP
Address}/diagnostics/NTLMSecurity.php.
10
•Custom Size Allowed - Allows the System Administrator to allow custom size paper to be used for print jobs. Is accessible by
typing http://{IP Address}/diagnostics/customSizeAllowed.php.
•Display CAC/PIV Feature - Allows the System Administrator to enable the display of the CAC/PIV feature. Is accessible by
typing http://{IP Address}/diagnostics/enableCAC.php.
•HTTP SSL Cipher Encryption Strength - Allows the System Administrator to control the set of supported ciphers when using
SSL (e.g., to enforce 128 bit or higher encryption keys). Is accessible by typing http://{IP
Address}/diagnostics/SSLCiphers.php.
•Port 9100 Print Stream Filtering - Allows the System Administrator to enable/disable the filtering of the RAW IP print
stream for the occurrence of the PostScript control-T character. Is accessible by typing http://{IP
Address}/diagnostics/Port9100PrintStreamFiltering.php.
•CRU Low/Reorder Message Suppression - Allows the System Administrator to set whether the CRU Low/Reorder messages
are enabled/disabled. Is accessible by typing http://{IP Address}/diagnostics/CRULowReorderMessageSuppression.php.
•Cost Control Enablement and Receipt Printing Setup - Allows the System Administrator to enable the Cost Control feature
when Secure Access and network accounting is enabled. Is accessible by typing http://{IP
Address}/diagnostics/CostControl.php.
•Install Software (View Scan Templates Created by WIA Driver) - Allows the System Administrator to install the
#00022121 Network Controller version to view templates created by the Microsoft Windows Image Acquisition (WIA)
driver. Is accessible by typing http://{IP Address}/diagnostics/00022121.dhtml. The System Administrator should be aware
that installing this Network Controller version will result in the device no longer being in the evaluated configuration.
18. The following pages are available from the Web User Interface with no user login and authentication required:
•Site Map - Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab. Is
accessible by selecting the [Site Map] button in the upper right hand corner of every Web User Interface page.
•Exit from Sleep Mode – Automatically informs the user, when the Network Controller on the device is in ‘Sleep Mode’ at
the time the user attempts to make a change to current settings on a Web User Interface web page, that the Network
Controller needs to be taken out of ‘Sleep Mode’ before the requested changes can be made.
19. Customers who required specialized changes to support unique workflows in their environment may request specific changes to
normal behavior. Xerox will supply these SPAR releases to the specific customers requesting the change. Please note that in
general enabling a specialized customer-specific feature will take the system out of certified configuration.
Contact
For additional information or clarification on any of the product information given here, contact Xerox support.
Disclaimer
The information provided in this Xerox Product Response is provided "as is" without warranty of any kind. Xerox Corporation
disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular
purpose. In no event shall Xerox Corporation be liable for any damages whatsoever resulting from user's use or disregard of
the information provided in this Xerox Product Response including direct, indirect, incidental, consequential, loss of business
profits or special damages, even if Xerox Corporation has been advised of the possibility of such damages. Some states do no
allow the exclusion or limitation of liability for consequential damages so the foregoing limitation may not apply.

Other manuals for WORKCENTRE 5735

8

This manual suits for next models

6

Other Xerox All In One Printer manuals

Xerox WorkCentre 5020 Operating and maintenance manual

Xerox

Xerox WorkCentre 5020 Operating and maintenance manual

Xerox Phaser 6115 MFP User manual

Xerox

Xerox Phaser 6115 MFP User manual

Xerox 3210 - workcentre b/w laser User manual

Xerox

Xerox 3210 - workcentre b/w laser User manual

Xerox WorkCentre 6400 Operating manual

Xerox

Xerox WorkCentre 6400 Operating manual

Xerox WORKCENTRE 7775 User manual

Xerox

Xerox WORKCENTRE 7775 User manual

Xerox PHASER 6121MFP Operating manual

Xerox

Xerox PHASER 6121MFP Operating manual

Xerox Document Centre 425 User manual

Xerox

Xerox Document Centre 425 User manual

Xerox WorkCentre M24 Color User manual

Xerox

Xerox WorkCentre M24 Color User manual

Xerox Phaser6121MFP Operating manual

Xerox

Xerox Phaser6121MFP Operating manual

Xerox Wide Format 6204 How to use

Xerox

Xerox Wide Format 6204 How to use

Xerox WorkCentre 7500 Series Operating manual

Xerox

Xerox WorkCentre 7500 Series Operating manual

Xerox WorkCentre 7232 User manual

Xerox

Xerox WorkCentre 7232 User manual

Xerox Phaser 6128 MFP User manual

Xerox

Xerox Phaser 6128 MFP User manual

Xerox WorkCentre 7228 User manual

Xerox

Xerox WorkCentre 7228 User manual

Xerox WORKCENTRE 7120 Operating manual

Xerox

Xerox WORKCENTRE 7120 Operating manual

Xerox Document Centre 432 User manual

Xerox

Xerox Document Centre 432 User manual

Xerox WorkCentre 6027 Operating manual

Xerox

Xerox WorkCentre 6027 Operating manual

Xerox WorkCentre 5019 Installation and operating instructions

Xerox

Xerox WorkCentre 5019 Installation and operating instructions

Xerox WorkCentre 7132 User manual

Xerox

Xerox WorkCentre 7132 User manual

Xerox 4250 - WorkCentre - Copier User manual

Xerox

Xerox 4250 - WorkCentre - Copier User manual

Xerox WorkCentre 5632 User manual

Xerox

Xerox WorkCentre 5632 User manual

Xerox WorkCentre 5687 User manual

Xerox

Xerox WorkCentre 5687 User manual

Xerox WorkCentre 5225 User manual

Xerox

Xerox WorkCentre 5225 User manual

Xerox Phaser 3010 User manual

Xerox

Xerox Phaser 3010 User manual

Popular All In One Printer manuals by other brands

Canon Color imageRUNNER C5180 Series Brochure & specs

Canon

Canon Color imageRUNNER C5180 Series Brochure & specs

Fuji Xerox DocuCentre S2110 user guide

Fuji Xerox

Fuji Xerox DocuCentre S2110 user guide

imagistics DL260 operating manual

imagistics

imagistics DL260 operating manual

Brother MFC MFC-465CN Quick setup guide

Brother

Brother MFC MFC-465CN Quick setup guide

Kyocera ECOSYS M2030dn Operation guide

Kyocera

Kyocera ECOSYS M2030dn Operation guide

Canon LASER CLASS 730i user guide

Canon

Canon LASER CLASS 730i user guide

Lexmark C782n Setup guide

Lexmark

Lexmark C782n Setup guide

Sharp MX-B355W user manual

Sharp

Sharp MX-B355W user manual

Brother MFC-6890CDW - Color Inkjet - All-in-One user guide

Brother

Brother MFC-6890CDW - Color Inkjet - All-in-One user guide

Oce fx2080 user guide

Oce

Oce fx2080 user guide

Ricoh MP 171L operating instructions

Ricoh

Ricoh MP 171L operating instructions

Brother MFC-8440 Disassembly and Reassembly

Brother

Brother MFC-8440 Disassembly and Reassembly

Kyocera ECOSYS M6535cidn Operation guide

Kyocera

Kyocera ECOSYS M6535cidn Operation guide

Canon ImageRunner C2550 Brochure & specs

Canon

Canon ImageRunner C2550 Brochure & specs

Samsung M337 user guide

Samsung

Samsung M337 user guide

Ricoh Aficio MP C7501SP manual

Ricoh

Ricoh Aficio MP C7501SP manual

Ricoh B064 SERIES Service manual

Ricoh

Ricoh B064 SERIES Service manual

Ricoh BP20 - Aficio B/W Laser Printer Service training

Ricoh

Ricoh BP20 - Aficio B/W Laser Printer Service training

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.