XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3
Ver. 1.00, May 2010
Page
3 of 44
1.
INTRODUCTION ..................................................................................................................................5
1.1.
Purpose ............................................................................................................................................................................... 5
1.2.
Target Audience .............................................................................................................................................................. 5
1.3.
Disclaimer .......................................................................................................................................................................... 5
2.
DEVICE DESCRIPTION.......................................................................................................................6
2.1.
Security-relevant Subsystems ..................................................................................................................................... 6
2.1.1.
Physical Partitioning.......................................................................................................................................................................6
2.1.2.
Security Functions allocated to Subsystems ........................................................................................................................7
2.2.
Controller ........................................................................................................................................................................... 8
2.2.1.
Purpose ................................................................................................................................................................................................8
2.2.2.
Memory Components ....................................................................................................................................................................8
2.2.3.
External Connections ..................................................................................................................................................................10
2.2.4.
USB Host Port.................................................................................................................................................................................11
2.2.
Fax Module......................................................................................................................................................................11
2.3.1.
Purpose .............................................................................................................................................................................................11
2.3.2.
Hardware..........................................................................................................................................................................................11
2.4.
Scanner .............................................................................................................................................................................12
2.4.1.
Purpose .............................................................................................................................................................................................12
2.4.2.
Hardware..........................................................................................................................................................................................12
2.5.
Graphical User Interface (GUI) ................................................................................................................................12
2.5.1.
Purpose .............................................................................................................................................................................................12
2.5.2.
Hardware..........................................................................................................................................................................................12
2.6.
Marking Engine (also known as the Image Output Terminal or IOT) .........................................................13
2.6.1.
Purpose .............................................................................................................................................................................................13
2.6.2.
Hardware..........................................................................................................................................................................................13
2.7.
System Software Structure ........................................................................................................................................14
2.7.1.
Open-source components .........................................................................................................................................................14
2.7.2.
OS Layer in the Controller .........................................................................................................................................................14
2.7.3.
Network Protocols ........................................................................................................................................................................15
2.8.
Logical Access.................................................................................................................................................................17
2.8.1.
Network Protocols ........................................................................................................................................................................17
2.8.2.
Ports ...................................................................................................................................................................................................18
2.8.3.
IP Filtering .......................................................................................................................................................................................22
3.
SYSTEM ACCESS................................................................................................................................ 23
3.1.
Authentication Model..................................................................................................................................................23