background image

XEROX WorkCentre 7755/7765/7775 Information Assurance Disclosure Paper

 

 

 20 

Ver. 1.01, April 2010 

        

Page 

 20 of 40 

 

3.2.

 

Login and Authentication Methods 

There are a number of methods for different types of users to be authenticated.  In addition, the connected 
versions of the product also log into remote servers.  A description of these behaviors follows. 

3.2.1.

 

System Administrator Login [All product configurations] 

Users must authenticate themselves to the device.  To access the User Tools via the Local UI, a numerical 
PIN is required.  The customer can set the PIN to anywhere from 3 to 12 digits in length.  This PIN is stored 
in the Copy Controller NVM and is inaccessible to the user.  Xerox strongly recommends that this PIN be 
changed from its default value immediately upon product installation.  The PIN should be set to a 
minimum of 8 characters in length and changed at least once per month.  Longer PINs can be changed less 
frequently; a 9-digit PIN would be good for a year.  The same PIN is used to access the Administration 
screens in the Web UI. 

3.2.2.

 

User authentication 

Users may authenticate to the device using Kerberos, LDAP, SMB Domain, or NDS authentication protocols.  
Once the user is authenticated to the device, the user may proceed to use the Network Scanning features 
listed above. 
The WebUI allows an SA to set up a default authentication domain and as many as 10 additional alternate 
authentication domains.  The device will attempt to authenticate the user at each domain server in turn 
until authentication is successful, or the list is exhausted. 

3.2.2.1.

 

Kerberos Authentication (Solaris or Windows 2000/Windows 2003) 

This is an option that must be enabled on the device, and is used in conjunction with all Network Scanning 
features (Scan to File, Scan to E-mail and Scan to Fax Server).  The authentication steps are: 

1)  A User enters a user name and password at the device in the Local UI.  The device sends an 

authentication request to the Kerberos Server. 

2)  The Kerberos Server responds with the encrypted credentials of the user attempting to sign on. 
3)  The device attempts to decrypt the credentials using the entered password.  The user is 

authenticated if the credentials can be decrypted. 

4)  The device then logs onto and queries the LDAP server trying to match an email address 

against the user’s Login Name 

5)  If the LDAP Query is successful, the user’s email address is placed in the From: field.  Otherwise, 

the user’s login name along with the system domain is used in the From: field. 

6)  The user may then add recipient addresses by accessing the Address Book on the LDAP server.  

Please see the User Manual for details.  Each addition is a separate session to the LDAP server. 

3.2.2.2.

 

SMB Authentication (Windows NT 4 or Windows 2000/Windows 2003) 

This is also an option that may be enabled on the device, and is used in conjunction with all Network Scanning 
features (Scan to File, Scan to E-mail and Scan to Fax Server).  The authentication steps vary somewhat, 
depending on the network configuration.  Listed below are 3 network configurations and the authentication 
steps. 
Basic Network Configuration: Device and Domain Controller are on the same Subnet 

Authentication Steps: 
1)

 

The device broadcasts an authentication request that is answered by the Domain Controller. 

2)

 

The Domain Controller responds back to the device whether or not the user was successfully 
authenticated. 

If (2) is successful, steps 3 – 5 proceed as described in steps 4 – 6 of the Kerberos section. 
 

Device and Domain Controller are on different Subnets, SA defines IP Address of Domain Controller 
 

Authentication Steps: 

1)

 

The device sends an authentication request directly to the Domain Controller through the 
router using the IP address of the Domain Controller. 

Summary of Contents for WORKCENTRE 7755

Page 1: ...Information Assurance Disclosure Paper Xerox WorkCentre 7755 7765 7775 Multifunction Systems Information Assurance Disclosure Paper Version 1 0 Prepared by Larry Kovnat Xerox Corporation 1350 Jefferso...

Page 2: ...1 01 April 2010 Page 2 of 40 2010 Xerox Corporation All rights reserved Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and or other counties Othe...

Page 3: ...of this document is to inform Xerox customers of the design functions and features of the WorkCentre products relative to Information Assurance IA This document does NOT provide tutorial level inform...

Page 4: ...y to connect the copier to a LAN CopyCentre models of these products are available which provide copy only features and do not include a Network Controller Figure 2 1 WorkCentre Multifunction System 2...

Page 5: ...rget Port Foreign Device Interface Scanner Interface UI Physical external Interfaces Power Button Button and TOE internal wiring proprietary Physical external Interface Figure 2 2 TOE System Partition...

Page 6: ...nctions the CC works with the EPC DRAM to enable electronic pre collation sometimes referred to as scan once print many When producing multiple copies of a document the scanned image is processed and...

Page 7: ...e spooling space is dynamically allocated to each job at the job completion this space is de allocated to be available for new images All residual customer data in de allocated space can be overwritte...

Page 8: ...odem T 30 protocol only Foreign Device Interface FDI Allows connection of optional access control hardware accessory not present in evaluated TOE Scanner Proprietary connection between the Scan Module...

Page 9: ...mory and fax modem It connects to the CC via PCI bus The Fax Card is responsible for implementing the T 30 fax protocol and for managing all of the fax specific features of the product The fax telepho...

Page 10: ...ne is comprised of paper supply trays and feeders paper transport laser scanner xerographics and paper output and finishing 2 6 3 Control and Data Interfaces Images and control signals are transmitted...

Page 11: ...pril 2010 Page 11 of 40 IP Filtering is also provided by the kernel Figure 2 7 Network Controller Operating System layer components 2 7 3 Network Protocols Figure 2 3 is an interface diagram depicting...

Page 12: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 12 Ver 1 01 April 2010 Page 12 of 40 Figure 2 3 IPv4 Network Protocol Stack...

Page 13: ...and are well behaved protocols There are no Xerox unique additions to these protocols 2 8 1 1 IPSec The device supports IPSec tunnel mode The print channel can be secured by establishing an IPSec asso...

Page 14: ...UDP NETBIOS Name Service 138 UDP NETBIOS Datagram Service SMB filing and Scan template retrieval 139 TCP NETBIOS SMB filing and Scan template retrieval 161 UDP SNMP 162 UDP SNMP trap 389 UDP LDAP 396...

Page 15: ...a proxy server Features that can make use of a proxy server include the Automatic Meter Read feature scanning to a remote repository or retrieving scan templates from a remote template pool 2 8 2 5 P...

Page 16: ...t supporting states Cuba Iran Libya North Korea Sudan and Syria their nationals and other sanctioned entities such as persons listed on the Denied Parties List Xerox provides this information for the...

Page 17: ...figurable port and may be explicitly enabled or disabled in User Tools via the Local User Interface or in the Properties tab of the device s web pages 2 8 2 14 Port 631 IPP This port supports the Inte...

Page 18: ...nts database When the device is set for network authentication the user s network credentials will be used to authenticate the user at the network domain controller User s can be entered into groups c...

Page 19: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 19 Ver 1 01 April 2010 Page 19 of 40 Figure 3 1 Authentication and Authorization schematic...

Page 20: ...E mail and Scan to Fax Server The authentication steps are 1 A User enters a user name and password at the device in the Local UI The device sends an authentication request to the Kerberos Server 2 T...

Page 21: ...rver returns the IP Address of the Domain Controller 3 The device sends an authentication request directly to the Domain Controller through the router using the IP address of the Domain Controller 4 T...

Page 22: ...normal user with read only privileges User credentials are not used for this authentication step and are never transmitted over the network Scan to Fax Server The device logs in to the Fax Server as s...

Page 23: ...Network Controller DRAM or Network Controller hard disk However this mode is only used by a CSE if directed by a Field Engineer when all other diagnostics fail to solve a problem The written repair pr...

Page 24: ...the PSW must send the expected synchronization message to the machine 2 The Marking Engine will respond with an acknowledge message containing its serial number 3 The PSW will send a request for Diagn...

Page 25: ...Interface where host discovered Ethernet Token Ring etc Device subnet mask Device IP address Device Media Access Control MAC address The Novell test will NOT collect Print Queue Name Attached to File...

Page 26: ...parated file format The log does not clear when it is disabled and will persist through power cycles The following table lists the events that are recorded in the log Tagged index Event ID Event descr...

Page 27: ...ob Job name User Name Completion Status IIO status Accounting User ID Accounting Account ID Total fax recipient phone numbers fax recipient phone numbers 16 16 ODIO Full started Device name Device ser...

Page 28: ...Status Configured enabled disabled 34 40 SNMPv3 UserName Device name Device serial number Completion Status Configured enabled disabled 35 41 IP Filtering Rules UserName Device name Device serial num...

Page 29: ...he print driver or on the Web UI before a print job is submitted an XSA ID must also be entered The ID is sent to the Network controller for validation If the submitted ID is valid the job will print...

Page 30: ...s common to all WorkCentre models The algorithm for the Image Overwrite feature is Step 1 Pattern 1 is written to the sectors containing temporary files IIO or to the entire spooling area of the disks...

Page 31: ...he user should insure that all scan jobs have been completed before invoking ODIO Please refer to the customer documentation for a description on how failures are logged 4 5 3 Overwrite Timing The ODI...

Page 32: ...r 32 Ver 1 01 April 2010 Page 32 of 40 5 Responses to Known Vulnerabilities 5 1 Security Xerox www xerox com security Xerox maintains an evergreen public web page that contains the latest security inf...

Page 33: ...NS Dynamic Domain Name Server Maps host names to dynamic static IP addresses DRAM Dynamic Random Access Memory EGP Exterior Gateway Protocol EPC Electronic PreCollation GB Gigabyte HP Hewlett Packard...

Page 34: ...re Board Assembly PSW Portable Service Workstation PWS alternative acronym for Portable Service Workstation RFC Required Functional Capability ROM Read Only Memory ROS Raster Output Scanner SA System...

Page 35: ...nce can only support 0 or 3 for more than 1 sheet for prtInputCurrentLevel will be considered a caveat denoted as C 6 The Printer MIB requires a few groups from RFC 1213 and RFC 1514 to be supported T...

Page 36: ...y Buffer group 2 objects supported w caveats limited local UI messaging captured within table C local UI button selection messages are not captured within table Console Display Light group 5 objects s...

Page 37: ...View etc shareware program supported New type 2 enumerations from next generation Host Resources MIB supported optional not support because Host Resources MIBv2 has NOT entered the standards track New...

Page 38: ...works 894 Standard for the transmission of IP datagrams over IEEE802 networks 1042 ICMP ICMP Echo ICMP Time ICMP Echo Reply and ICMP Destination Unreachable message 792 Reverse Address Resolution Prot...

Page 39: ...of 40 Function RFC Standard Document Printing Application DPA 10175 Appletalk Inside Appletalk Second Edition Printing Description Languages Postscript Language Reference Third Edition PCL6 PCL5E 5SI...

Page 40: ...Information Assurance Disclosure Paper 40 Ver 1 01 April 2010 Page 40 of 40 6 4 Appendix E References Kerberos FAQ http www nrl navy mil CCS people kenh kerber os faq html IP port numbers http www ia...

Reviews: