Xerox WorkCentre 6400 Информационный справочник - Страница 3

Просмотреть онлайн или скачать pdf Информационный справочник для Сканер Xerox WorkCentre 6400. Xerox WorkCentre 6400 44 страницы. Color multifunction printer
Также для Xerox WorkCentre 6400: Характеристики (1 страниц), Технические характеристики (1 страниц), Руководство по быстрому использованию (17 страниц), Руководство для оценщиков (25 страниц), Руководство по установке (2 страниц), Руководство по конфигурации (12 страниц), Руководство для оценщиков (24 страниц), Руководство по быстрому использованию (17 страниц), Руководство по быстрому использованию (16 страниц), Руководство по быстрому использованию (16 страниц), Руководство (32 страниц)

Xerox WorkCentre 6400 Информационный справочник
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
1.
INTRODUCTION ..................................................................................................................................5
1.1.
Purpose ............................................................................................................................................................................... 5
1.2.
Target Audience .............................................................................................................................................................. 5
1.3.
Disclaimer .......................................................................................................................................................................... 5
2.
DEVICE DESCRIPTION.......................................................................................................................6
2.1.
Security-relevant Subsystems ..................................................................................................................................... 6
2.1.1. Physical Partitioning.......................................................................................................................................................................6
2.1.2. Security Functions allocated to Subsystems ........................................................................................................................7
2.2.
Controller ........................................................................................................................................................................... 8
2.2.1. Purpose ................................................................................................................................................................................................8
2.2.2. Memory Components ....................................................................................................................................................................8
2.2.3. External Connections ..................................................................................................................................................................10
2.2.4. USB Host Port.................................................................................................................................................................................11
2.2.
Fax Module......................................................................................................................................................................11
2.3.1. Purpose .............................................................................................................................................................................................11
2.3.2. Hardware..........................................................................................................................................................................................11
2.4.
Scanner.............................................................................................................................................................................12
2.4.1. Purpose .............................................................................................................................................................................................12
2.4.2. Hardware..........................................................................................................................................................................................12
2.5.
Graphical User Interface (GUI) ................................................................................................................................12
2.5.1. Purpose .............................................................................................................................................................................................12
2.5.2. Hardware..........................................................................................................................................................................................12
2.6.
Marking Engine (also known as the Image Output Terminal or IOT) .........................................................13
2.6.1. Purpose .............................................................................................................................................................................................13
2.6.2. Hardware..........................................................................................................................................................................................13
2.7.
System Software Structure ........................................................................................................................................14
2.7.1. Open-source components .........................................................................................................................................................14
2.7.2. OS Layer in the Controller .........................................................................................................................................................14
2.7.3. Network Protocols ........................................................................................................................................................................15
2.8.
Logical Access.................................................................................................................................................................17
2.8.1. Network Protocols ........................................................................................................................................................................17
2.8.2. Ports ...................................................................................................................................................................................................18
2.8.3. IP Filtering .......................................................................................................................................................................................22
3.
SYSTEM ACCESS................................................................................................................................ 23
3.1.
Authentication Model..................................................................................................................................................23
3