Xerox Versant 2100 Press Beveiligingshandleiding - Pagina 6
Blader online of download pdf Beveiligingshandleiding voor {categorie_naam} Xerox Versant 2100 Press. Xerox Versant 2100 Press 45 pagina's. Entry production color presses
Ook voor Xerox Versant 2100 Press: Klantverwachting en installatiehandleiding (49 pagina's)
Xerox® Security Guide for Entry Production Color Class Products
6.
Main Left Front Door.
7.
Main Middle Front Door.
Architecture
Versant® and ColorPress® products share a common architecture which is depicted below. The
following sections describe components in detail.
Interface
Device
Storage
User Interface TRUE FOR VERSANT BUT NOT FOR COLOR PRESS NOTE
(There is no Scanner on Color Press or Versant 2100/3100)
The user interface detects soft and hard button actuations and provides text and graphical prompts to the
user. The user interface is sometimes referred to as the Graphical User Interface (GUI) or Local UI (LUI)
to distinguish it from the remote web server interface (WebUI).
The user interface allows users to access product services and functions. Users with administrative
privileges can manage the product configuration settings. User permissions are configurable through
Role Based Access Control (RBAC) policies, described in section
Authorization
Scanner
The scanner converts documents from hardcopy to electronic data. A document handler moves originals
into a position to be scanned. The scanner provides enough image processing for signal conditioning and
formatting. The scanner does not store scanned images.
Marking Engine
The Marking Engine performs copy/print paper feeding and transport, image marking, fusing, and
document finishing. The marking engine is comprised of paper supply trays and feeders, paper transport,
LED scanner, xerographics, and paper output and finishing. The marking engine is only accessible to the
Controller via inter-chip communication with no other access and does not store user data.
March 2019
User
Scanner
Controller
Marking
Engine
External
Interfaces
Optional
Interfaces
6
Identification, Authentication, and
Page 1-4