EasyManua.ls Logo

Xerox VersaLink User Manual

Xerox VersaLink
10 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Version 1.0
July 10, 2017
Secure Installation and
Operation
Xerox
®
VersaLink
®
Multifunction and Single
Function Printer
Question and Answer IconNeed help?

Do you have a question about the Xerox VersaLink and is the answer not in the manual?

Xerox VersaLink Specifications

General IconGeneral
Print TechnologyLaser
Print ResolutionUp to 1200 x 2400 dpi
Automatic DuplexingYes
Memory (Standard)2 GB
Control Panel5-inch color touch screen
Copy ResolutionUp to 600 x 600 dpi
Fax Speed33.6 Kbps
FunctionsPrint, Copy, Scan, Fax
Paper SizeA4, A5, B5, Legal, Letter
ConnectivityUSB, Ethernet, Wi-Fi
Mobile PrintingApple AirPrint, Google Cloud Print, Mopria

Summary

Secure Installation and Setup

Authentication Passwords

Configure minimum and maximum length for user and administrator authentication passwords.

Administrator Password Management

Change administrator password upon installation and periodically for enhanced security.

Authentication Methods

Establish local, network (LDAP/Kerberos), or smart card authentication for device access.

Authorization Settings

Configure device authorization by adding user roles and assigning permissions.

Personalization Settings

Enable personalization using LDAP user mappings for customized user experiences.

Immediate Image Overwrite

Enable disk overwrite for VersaLink Multifunction Printers with Hard Disk Drives.

Security Certificates

Install and select digital certificates for secure communication and SSL/TLS.

Transport Layer Security (TLS)

Configure TLS for secure communication, disabling SSLv3.0 and TLS 1.0.

FIPS 140-2 Mode

Enable FIPS 140-2 mode for encryption of transmitted and stored data.

Data Encryption

Disk encryption is automatically enabled on VersaLink devices.

IP Filtering Configuration

Enable and configure IP address filtering to control network access.

Audit Log Management

Enable, download, and review audit logs for security monitoring and event tracking.

IPsec Configuration

Enable and configure IPSec to secure printing jobs and other network traffic.

Session Inactivity Timeout

Configure session inactivity timers to automatically terminate inactive sessions.

Secure Print Setup

Configure secure print jobs by disabling other print types except 'Secure'.

802.1x Device Authentication

Enable and configure 802.1x device authentication for network access control.

USB Port Security

Enable or disable USB ports to control the use of external storage devices.

S/MIME Configuration

Enable and configure S/MIME for secure scan-to-email functionality.

TCP/IP Configuration

Enable and configure IPv4 and IPv6 settings for network connectivity.

Date and Time Settings

Ensure correct date, time, and time zone are set for accurate logging and operations.

Embedded Fax Configuration

Configure general settings, policies, and secure receive for Embedded Fax.

Scan to Email Security

Configure domain filtering and SMTP authentication for secure Scan to Email.

Scanning Security

Disable FTP and configure secure login methods for Scan to My Folder.

SNTP Configuration

Configure SNTP server for synchronizing the device's internal system time.

SNMPv3 Security

Enable SNMPv3 after SSL/HTTPS is enabled; change default community strings.

Wireless Network Security

Connect to wireless networks using WPA2; disable WEP for secure wireless access.

Secure Operation of Device Services and Functions

Passcode Management

Regularly change Smart Card/CAC and Secure Print passcodes with minimum lengths.

Local Usernames and Domain Mapping

Ensure local usernames match domain names for consistent user identification.

IIO and ODIO Operation

Manage Image Overwrite (IIO/ODIO) for secure data deletion before decommissioning.

Audit Log Notes

Review audit logs for extraneous entries and protect exported log records.

IP Filtering Precautions

Avoid blocking port 80 traffic; drop external user traffic to open ports.

User Permission Role Naming

Ensure user permission role names do not contain single or double quotes.

User Training

Provide users with training on secure device usage before assigning access.

Browser Troubleshooting

Advise users to switch browsers if experiencing login issues via the Web UI.

Installation Environment and Awareness

Install in standard environments and inform personnel about security and job pickup.

Administrator Function Disablement Caution

Caution that administrators can disable secure functions; review configurations periodically.

Email Security for Administrators

Administrators should avoid unknown emails/attachments unless scanned for viruses.

User Web UI Access Best Practices

Use dedicated browsers, log off promptly, and avoid saving credentials for Web UI access.

Related product manuals