background image

XEROX WorkCentre 7755/7765/7775 Information Assurance Disclosure Paper

 

 

 23 

Ver. 1.01, April 2010 

        

Page 

 23 of 40 

3.4.2.

 

Alternate Boot via Network Controller Serial Port 

Alternate Boot (Alt-boot) is a means for the Portable Service Workstation (PSW) to directly connect to the 
Network Controller.  The primary purpose of Alternate Boot is to provide the capability to boot the Network 
Controller in case of hard disk failure, to perform system diagnostics, and load Network Controller software, 
independent of other sub-systems. 

To enter this mode a user must strike any key on the PSW within 10 seconds of power on.  If the 10 seconds 
times out, then the normal boot sequence occurs and the serial port acts as a typical tty (see next section).  
However, if this mode is entered, a Xerox unique serial protocol is used to communicate to the alt-boot 
code.  All commands are DOS-type menu driven (i.e. type in a number to start a command). If a PSW is 
connected, the application on the PSW cannot be accessed without logging on with a password (see next 
section). 

If the PSW is used and is successfully logged on, then the Ethernet port is used to download executable 
files.  The serial port is used for commands and status.  Again, please refer to the PSW section for details. 

3.4.3.

 

tty Mode 

When the Network Controller has completed booting a login line will be displayed.  This mode is a typical 
tty window, and is password protected.  This password changes with each major software release.  The 
password is stored on the Network Controller hard disk in an encrypted format similarly to how UNIX 
encrypts and stores passwords.  Through this port a user can gain information and access to any files or 
information stored in the Network Controller DRAM or Network Controller hard disk.  However, this mode is 
only used by a CSE if directed by a Field Engineer when all other diagnostics fail to solve a problem.  The 
written repair procedures that direct the CSE never employ this mode. 

3.4.4.

 

Diagnostics via Portable Service Workstation (PSW) Port 

When connected to the PSW Port, the PSW provides an extensive suite of diagnostic functions for use by 
the Xerox Customer Service Engineer (CSE).  The over-the-wire protocol is Xerox proprietary.  This port 
cannot process any other protocol except this proprietary protocol used for machine diagnosis.  Also, the 
PSW must have an application loaded to connect to and communicate with the device.   

Customer documents or files cannot be accessed during a diagnostic session, nor are network servers 
accessible through this port. 

3.4.4.1.

 

Access 

The Xerox Service Technician must be authenticated twice: 

1.

 

The first password, called the 

PSW Lock Facility, 

is obtained by calling a Xerox service location 

and providing the CSE employee number and the serial number of the PSW.  The password is 
then given to the Xerox Service Technician, and is valid for 90 days.  When the password 
expires, the Xerox Service Technician must call in again. This password is unique to the client 
application running on that particular PSW, and is required to log onto the PSW prior to 
initiating communications with the machine. 

2.

 

Once the application is running, the PSW supplies the second password (different from the 
first) to authenticate the session to the device. This embedded password is automatically 
passed from the application to the machine, and is never seen by anyone.  It is hardcoded in 
the software of the Marking Engine and the PSW application, and is common to all products. It 
is not encrypted.  Many of the diagnostic routines will require this password in order to 
function.  

3.4.4.2.

 

Communication Protocol 

Содержание WORKCENTRE 7755

Страница 1: ...Information Assurance Disclosure Paper Xerox WorkCentre 7755 7765 7775 Multifunction Systems Information Assurance Disclosure Paper Version 1 0 Prepared by Larry Kovnat Xerox Corporation 1350 Jefferso...

Страница 2: ...1 01 April 2010 Page 2 of 40 2010 Xerox Corporation All rights reserved Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and or other counties Othe...

Страница 3: ...of this document is to inform Xerox customers of the design functions and features of the WorkCentre products relative to Information Assurance IA This document does NOT provide tutorial level inform...

Страница 4: ...y to connect the copier to a LAN CopyCentre models of these products are available which provide copy only features and do not include a Network Controller Figure 2 1 WorkCentre Multifunction System 2...

Страница 5: ...rget Port Foreign Device Interface Scanner Interface UI Physical external Interfaces Power Button Button and TOE internal wiring proprietary Physical external Interface Figure 2 2 TOE System Partition...

Страница 6: ...nctions the CC works with the EPC DRAM to enable electronic pre collation sometimes referred to as scan once print many When producing multiple copies of a document the scanned image is processed and...

Страница 7: ...e spooling space is dynamically allocated to each job at the job completion this space is de allocated to be available for new images All residual customer data in de allocated space can be overwritte...

Страница 8: ...odem T 30 protocol only Foreign Device Interface FDI Allows connection of optional access control hardware accessory not present in evaluated TOE Scanner Proprietary connection between the Scan Module...

Страница 9: ...mory and fax modem It connects to the CC via PCI bus The Fax Card is responsible for implementing the T 30 fax protocol and for managing all of the fax specific features of the product The fax telepho...

Страница 10: ...ne is comprised of paper supply trays and feeders paper transport laser scanner xerographics and paper output and finishing 2 6 3 Control and Data Interfaces Images and control signals are transmitted...

Страница 11: ...pril 2010 Page 11 of 40 IP Filtering is also provided by the kernel Figure 2 7 Network Controller Operating System layer components 2 7 3 Network Protocols Figure 2 3 is an interface diagram depicting...

Страница 12: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 12 Ver 1 01 April 2010 Page 12 of 40 Figure 2 3 IPv4 Network Protocol Stack...

Страница 13: ...and are well behaved protocols There are no Xerox unique additions to these protocols 2 8 1 1 IPSec The device supports IPSec tunnel mode The print channel can be secured by establishing an IPSec asso...

Страница 14: ...UDP NETBIOS Name Service 138 UDP NETBIOS Datagram Service SMB filing and Scan template retrieval 139 TCP NETBIOS SMB filing and Scan template retrieval 161 UDP SNMP 162 UDP SNMP trap 389 UDP LDAP 396...

Страница 15: ...a proxy server Features that can make use of a proxy server include the Automatic Meter Read feature scanning to a remote repository or retrieving scan templates from a remote template pool 2 8 2 5 P...

Страница 16: ...t supporting states Cuba Iran Libya North Korea Sudan and Syria their nationals and other sanctioned entities such as persons listed on the Denied Parties List Xerox provides this information for the...

Страница 17: ...figurable port and may be explicitly enabled or disabled in User Tools via the Local User Interface or in the Properties tab of the device s web pages 2 8 2 14 Port 631 IPP This port supports the Inte...

Страница 18: ...nts database When the device is set for network authentication the user s network credentials will be used to authenticate the user at the network domain controller User s can be entered into groups c...

Страница 19: ...XEROX WorkCentre 7755 7765 7775 Information Assurance Disclosure Paper 19 Ver 1 01 April 2010 Page 19 of 40 Figure 3 1 Authentication and Authorization schematic...

Страница 20: ...E mail and Scan to Fax Server The authentication steps are 1 A User enters a user name and password at the device in the Local UI The device sends an authentication request to the Kerberos Server 2 T...

Страница 21: ...rver returns the IP Address of the Domain Controller 3 The device sends an authentication request directly to the Domain Controller through the router using the IP address of the Domain Controller 4 T...

Страница 22: ...normal user with read only privileges User credentials are not used for this authentication step and are never transmitted over the network Scan to Fax Server The device logs in to the Fax Server as s...

Страница 23: ...Network Controller DRAM or Network Controller hard disk However this mode is only used by a CSE if directed by a Field Engineer when all other diagnostics fail to solve a problem The written repair pr...

Страница 24: ...the PSW must send the expected synchronization message to the machine 2 The Marking Engine will respond with an acknowledge message containing its serial number 3 The PSW will send a request for Diagn...

Страница 25: ...Interface where host discovered Ethernet Token Ring etc Device subnet mask Device IP address Device Media Access Control MAC address The Novell test will NOT collect Print Queue Name Attached to File...

Страница 26: ...parated file format The log does not clear when it is disabled and will persist through power cycles The following table lists the events that are recorded in the log Tagged index Event ID Event descr...

Страница 27: ...ob Job name User Name Completion Status IIO status Accounting User ID Accounting Account ID Total fax recipient phone numbers fax recipient phone numbers 16 16 ODIO Full started Device name Device ser...

Страница 28: ...Status Configured enabled disabled 34 40 SNMPv3 UserName Device name Device serial number Completion Status Configured enabled disabled 35 41 IP Filtering Rules UserName Device name Device serial num...

Страница 29: ...he print driver or on the Web UI before a print job is submitted an XSA ID must also be entered The ID is sent to the Network controller for validation If the submitted ID is valid the job will print...

Страница 30: ...s common to all WorkCentre models The algorithm for the Image Overwrite feature is Step 1 Pattern 1 is written to the sectors containing temporary files IIO or to the entire spooling area of the disks...

Страница 31: ...he user should insure that all scan jobs have been completed before invoking ODIO Please refer to the customer documentation for a description on how failures are logged 4 5 3 Overwrite Timing The ODI...

Страница 32: ...r 32 Ver 1 01 April 2010 Page 32 of 40 5 Responses to Known Vulnerabilities 5 1 Security Xerox www xerox com security Xerox maintains an evergreen public web page that contains the latest security inf...

Страница 33: ...NS Dynamic Domain Name Server Maps host names to dynamic static IP addresses DRAM Dynamic Random Access Memory EGP Exterior Gateway Protocol EPC Electronic PreCollation GB Gigabyte HP Hewlett Packard...

Страница 34: ...re Board Assembly PSW Portable Service Workstation PWS alternative acronym for Portable Service Workstation RFC Required Functional Capability ROM Read Only Memory ROS Raster Output Scanner SA System...

Страница 35: ...nce can only support 0 or 3 for more than 1 sheet for prtInputCurrentLevel will be considered a caveat denoted as C 6 The Printer MIB requires a few groups from RFC 1213 and RFC 1514 to be supported T...

Страница 36: ...y Buffer group 2 objects supported w caveats limited local UI messaging captured within table C local UI button selection messages are not captured within table Console Display Light group 5 objects s...

Страница 37: ...View etc shareware program supported New type 2 enumerations from next generation Host Resources MIB supported optional not support because Host Resources MIBv2 has NOT entered the standards track New...

Страница 38: ...works 894 Standard for the transmission of IP datagrams over IEEE802 networks 1042 ICMP ICMP Echo ICMP Time ICMP Echo Reply and ICMP Destination Unreachable message 792 Reverse Address Resolution Prot...

Страница 39: ...of 40 Function RFC Standard Document Printing Application DPA 10175 Appletalk Inside Appletalk Second Edition Printing Description Languages Postscript Language Reference Third Edition PCL6 PCL5E 5SI...

Страница 40: ...Information Assurance Disclosure Paper 40 Ver 1 01 April 2010 Page 40 of 40 6 4 Appendix E References Kerberos FAQ http www nrl navy mil CCS people kenh kerber os faq html IP port numbers http www ia...

Отзывы: