Xerox WorkCentre 6400 Информационный справочник - Страница 4

Просмотреть онлайн или скачать pdf Информационный справочник для Сканер Xerox WorkCentre 6400. Xerox WorkCentre 6400 44 страницы. Color multifunction printer
Также для Xerox WorkCentre 6400: Характеристики (1 страниц), Технические характеристики (1 страниц), Руководство по быстрому использованию (17 страниц), Руководство для оценщиков (25 страниц), Руководство по установке (2 страниц), Руководство по конфигурации (12 страниц), Руководство для оценщиков (24 страниц), Руководство по быстрому использованию (17 страниц), Руководство по быстрому использованию (16 страниц), Руководство по быстрому использованию (16 страниц), Руководство (32 страниц)

Xerox WorkCentre 6400 Информационный справочник
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1. System Administrator Login [All product configurations] ...........................................................................................25
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1. Printing [Multifunction models only]....................................................................................................................................27
3.3.2. Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1. Service [All product configurations]......................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
Appendix B - Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44