Xerox Versant 2100 Press Sicherheitshandbuch - Seite 6
Blättern Sie online oder laden Sie pdf Sicherheitshandbuch für Drucker Xerox Versant 2100 Press herunter. Xerox Versant 2100 Press 45 Seiten. Entry production color presses
Auch für Xerox Versant 2100 Press: Kundenerwartung & Installationshandbuch (49 seiten)
Xerox® Security Guide for Entry Production Color Class Products
6.
Main Left Front Door.
7.
Main Middle Front Door.
Architecture
Versant® and ColorPress® products share a common architecture which is depicted below. The
following sections describe components in detail.
Interface
Device
Storage
User Interface TRUE FOR VERSANT BUT NOT FOR COLOR PRESS NOTE
(There is no Scanner on Color Press or Versant 2100/3100)
The user interface detects soft and hard button actuations and provides text and graphical prompts to the
user. The user interface is sometimes referred to as the Graphical User Interface (GUI) or Local UI (LUI)
to distinguish it from the remote web server interface (WebUI).
The user interface allows users to access product services and functions. Users with administrative
privileges can manage the product configuration settings. User permissions are configurable through
Role Based Access Control (RBAC) policies, described in section
Authorization
Scanner
The scanner converts documents from hardcopy to electronic data. A document handler moves originals
into a position to be scanned. The scanner provides enough image processing for signal conditioning and
formatting. The scanner does not store scanned images.
Marking Engine
The Marking Engine performs copy/print paper feeding and transport, image marking, fusing, and
document finishing. The marking engine is comprised of paper supply trays and feeders, paper transport,
LED scanner, xerographics, and paper output and finishing. The marking engine is only accessible to the
Controller via inter-chip communication with no other access and does not store user data.
March 2019
User
Scanner
Controller
Marking
Engine
External
Interfaces
Optional
Interfaces
6
Identification, Authentication, and
Page 1-4