Xerox® Security Guide for Light Production Mono Class Products
A read/write of partial system setting information is possible through the unique protocols on the
HTTP port.
The HTTP server can only host the web pages in the device, but cannot substitute for the proxy
server. Through HTTP, the file system of the product cannot be accessed directly.
The embedded HTTP server is a unique implementation.
A system administrator can disable this service (and the port) via Local User Interface or from
CentreWare Internet Services.
Port 80: HTTP (UPnP Discovery)
This port provides the discovery feature using SSDP. The port number is configurable, and a
system administrator can disable this service (and the port) via local UI or from CentreWare
Internet Services.
Port 80: HTTP (SESAMi Manager)
The port number is configurable, and a system administrator can change the port number via local
UI, CentreWare Internet Services, or SSMI. Also, a system administrator can disable this service
via local UI, CentreWare Internet Services, or SSMI.
Port 80 operates as a HTTP server for SSMI. Port 443 operates as a secure channel for SSMI,
and supports TLSv1.1 and TLSv1.2. When SSL/TLS is enabled, HTTP connections to SSMI are
redirected to HTTPS. Since communication through port 443 is encrypted, interception on the
network can be avoided.
Port 80: HTTP (WSD)
This port supports WSD (Web Services on Devices) Print feature.
The port number is configurable and a system administrator can disable this port and service from
the local UI or CentreWare Internet Services.
Port 80: HTTP (WebDAV)
This port is a WebDAV server port that supports features to access Mailbox. The port number is
configurable, and a system administrator can disable this service (and the port) via local UI or
from CentreWare Internet Services.
Port 88: Kerberos
The product employs Kerberos client function that is used to access this product from Local UI.
The product supports Kerberos V5 and uses CBC (Cipher Block Changing) of DES (Data
Encryption Standard). The Kerberos code is not used for document encryption.
The authentication data of the user permitted by the product is set in the Kerberos server, and
address information and realm information of the Kerberos server used by the product is set in the
Controller NVRAM.
The following show the difference from the standard Kerberos packaging.
1.
Ticket cache