Xerox WORKCENTRE 5775 Installation et fonctionnement sécurisés - Page 4

Parcourez en ligne ou téléchargez le pdf Installation et fonctionnement sécurisés pour {nom_de_la_catégorie} Xerox WORKCENTRE 5775. Xerox WORKCENTRE 5775 11 pages. Smart card
Également pour Xerox WORKCENTRE 5775 : Manuel d'information (50 pages), Manuel de l'évaluateur (24 pages), Fiche technique (18 pages), Fiche d'information (8 pages), Manuel de démarrage (32 pages), Instructions pour l'utilisateur (5 pages), Manuel de l'utilisateur (8 pages), Comment faire une copie (10 pages), Manuel d'installation (43 pages)

Xerox WORKCENTRE 5775 Installation et fonctionnement sécurisés
If an Immediate Image Overwrite fails, an error message will appear at the top of the screen indicating that there is an
Immediate Image Overwrite error and that an On Demand Image Overwrite should be run. This error message will
persist until an On Demand Image overwrite is initiated by the System Administrator.
If there is a power failure or system crash while a workflow scan job is being processed, an Immediate Overwrite of the
residual data will occur upon job recovery. However, the workflow scan job may not appear in the Completed Job Log.
If there is a power failure or system crash of the network controller while processing a print job, residual data might still
reside on the Network Controller hard drive. The System Administrator should immediately invoke an On Demand
Image Overwrite once the machine has been restored.
Once an On Demand Image Overwrite has been initiated by the System Administrator from either the Local UI or Web
UI it can not be aborted by the System Administrator.
Before invoking an On Demand Image Overwrite verify that:
There are no active or pending print or scan jobs.
There are no new or unaccounted for Dynamic Loadable Modules (DLMs) or other software running on the
machine.
There are no active processes that access the network controller hard disk.
No user is logged into a session via telnet, network accounting, Xerox Standard Accounting, or the internal auditron,
or into a session accessing a directory on the network controller hard disk.
After a power on of the machine all subsystems must be properly synced and, if printing of Configuration Reports is
enabled on the device, the Configuration Report must have printed.
For any previously initiated On Demand Image Overwrite request the confirmation sheet must have printed.
The Embedded Fax card must have the correct software version and must be properly configured.
When invoked from the Web UI the status of the completed On Demand Image Overwrite will not appear on the Local
UI but can be ascertained from the On Demand Overwrite Confirmation Report that is printed after the Network
Controller reboots.
If an On Demand Image Overwrite fails to complete because of an error or system crash, a system reboot or software
reset should be initiated by the System Administrator from either the Local UI or the Web UI and be allowed to
complete; otherwise, the Local UI may become unavailable. If the Local UI does become unavailable the machine will
have to be powered off and then powered on again to allow the system to properly resynchronize. Once the system
reboots or software reset has completed the System Administrator should immediately perform another On Demand
Image Overwrite.
If there is a failure in the hard disk drive a message recommending that an On Demand Image Overwrite be run will
appear on the Local UI screen. The System Administrator should immediately perform the requested On Demand
Image Overwrite.
The time shown on the On Demand Overwrite progress screen displayed on the Local UI may not reflect Daylight
Savings Time.
If an On Demand Image Overwrite is successfully completed, the completion (finish) time shown on the printed On
Demand Overwrite Confirmation Report will be the time that the system shuts down.
The System Administrator should perform an On Demand Image Overwrite immediately before the device is
decommissioned, returned, sold or disposed of.
i). These systems support the use of SSLv2.0, SSLv3.0, RC4 and MD5. However, customers are advised to set the crypto policy
of their clients to request either SSLv3.1 or TLSv1.0 and to disallow the use of RC4 and MD5. Security functions in the
evaluated configuration make use of cryptographic ciphers listed in Section 6.3.3 and its subsections of the Security Target.
The cryptographic module supports additional ciphers that may be called by other unevaluated functions.
j). For SSL to work properly the machine must be assigned a valid, fully qualified machine name and domain. To set the
machine host and domain names follow the instructions in the Configure IP Settings Using Internet Services section for
setting the host name and domain name for IPv4 on page 96 or for setting the domain name for IPv6 on page 97 of the
SAG, depending on which IP protocol is to be used.
k). When utilizing Secure Sockets Layer (SSL):
a). For the purposes of the evaluation, the maximum validity of digital certificates was set to 180 days.
b). If a self-signed certificate is to be used the generic Xerox root CA certificate should be downloaded from the device and
installed in the certificate store of the user's browser.
3