|
XEROX WorkCentre 6400 Information Assurance Disclosure Paper3Ver. 1.00, May 2010 Page 3 of 441. INTRODUCTION ..................................................................................................................................51.1. Purpose ............................................................................................................................................................................... 51.2. Target Audience .............................................................................................................................................................. 51.3. Disclaimer .......................................................................................................................................................................... 52. DEVICE DESCRIPTION.......................................................................................................................62.1. Security-relevant Subsystems ..................................................................................................................................... 62.1.1. Physical Partitioning.......................................................................................................................................................................62.1.2. Security Functions allocated to Subsystems ........................................................................................................................72.2. Controller ........................................................................................................................................................................... 82.2.1. Purpose ................................................................................................................................................................................................82.2.2. Memory Components ....................................................................................................................................................................82.2.3. External Connections ..................................................................................................................................................................102.2.4. USB Host Port.................................................................................................................................................................................112.2. Fax Module......................................................................................................................................................................112.3.1. Purpose .............................................................................................................................................................................................112.3.2. Hardware..........................................................................................................................................................................................112.4. Scanner.............................................................................................................................................................................122.4.1. Purpose .............................................................................................................................................................................................122.4.2. Hardware..........................................................................................................................................................................................122.5. Graphical User Interface (GUI) ................................................................................................................................122.5.1. Purpose .............................................................................................................................................................................................122.5.2. Hardware..........................................................................................................................................................................................122.6. Marking Engine (also known as the Image Output Terminal or IOT) .........................................................132.6.1. Purpose .............................................................................................................................................................................................132.6.2. Hardware..........................................................................................................................................................................................132.7. System Software Structure ........................................................................................................................................142.7.1. Open-source components .........................................................................................................................................................142.7.2. OS Layer in the Controller .........................................................................................................................................................142.7.3. Network Protocols ........................................................................................................................................................................152.8. Logical Access.................................................................................................................................................................172.8.1. Network Protocols ........................................................................................................................................................................172.8.2. Ports ...................................................................................................................................................................................................182.8.3. IP Filtering .......................................................................................................................................................................................223. SYSTEM ACCESS................................................................................................................................233.1. Authentication Model..................................................................................................................................................23
PreviousNext |