XEROX WorkCentre 6400 Information Assurance Disclosure Paper
1.
INTRODUCTION ..................................................................................................................................5
1.1.
Purpose ............................................................................................................................................................................... 5
1.2.
Target Audience .............................................................................................................................................................. 5
1.3.
Disclaimer .......................................................................................................................................................................... 5
2.
DEVICE DESCRIPTION.......................................................................................................................6
2.1.
Security-relevant Subsystems ..................................................................................................................................... 6
2.1.1. Physical Partitioning.......................................................................................................................................................................6
2.2.
Controller ........................................................................................................................................................................... 8
2.2.1. Purpose ................................................................................................................................................................................................8
2.2.2. Memory Components ....................................................................................................................................................................8
2.2.3. External Connections ..................................................................................................................................................................10
2.2.4. USB Host Port.................................................................................................................................................................................11
2.2.
Fax Module......................................................................................................................................................................11
2.3.1. Purpose .............................................................................................................................................................................................11
2.3.2. Hardware..........................................................................................................................................................................................11
2.4.
Scanner.............................................................................................................................................................................12
2.4.1. Purpose .............................................................................................................................................................................................12
2.4.2. Hardware..........................................................................................................................................................................................12
2.5.
Graphical User Interface (GUI) ................................................................................................................................12
2.5.1. Purpose .............................................................................................................................................................................................12
2.5.2. Hardware..........................................................................................................................................................................................12
2.6.
2.6.1. Purpose .............................................................................................................................................................................................13
2.6.2. Hardware..........................................................................................................................................................................................13
2.7.
System Software Structure ........................................................................................................................................14
2.7.1. Open-source components .........................................................................................................................................................14
2.7.2. OS Layer in the Controller .........................................................................................................................................................14
2.7.3. Network Protocols ........................................................................................................................................................................15
2.8.
Logical Access.................................................................................................................................................................17
2.8.1. Network Protocols ........................................................................................................................................................................17
2.8.2. Ports ...................................................................................................................................................................................................18
2.8.3. IP Filtering .......................................................................................................................................................................................22
3.
SYSTEM ACCESS................................................................................................................................ 23
3.1.
Authentication Model..................................................................................................................................................23
3