Workcentre 58Xxi-58XX Connectkey

Workcentre 58Xxi-58XX Connectkey

ConnectKey 2.0 WorkCentre 5865i/5875i/5890i 5845/5855/5865/5875/5890 Information Assurance Disclosure Version 1.0 ©2016 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and/or other counties. Other company trademarks are also acknowledged. Document Version: 1.0 (April 2016) ConnectKey 2.0 WorkCentre 58XXi/58XX Information Assurance Disclosure 1. INTRODUCTION ..................................................................................................... 4 1.1. Purpose ........................................................................................................................................................ 4 1.2. Target Audience ......................................................................................................................................... 4 1.3. Disclaimer .................................................................................................................................................... 4 2. DEVICE DESCRIPTION .......................................................................................... 5 2.1. Security-relevant Subsystems ............................................................................................................... 6 2.1.1. Physical Partitioning .................................................................................................................................... 6 2.1.2. Security Functions allocated to Subsystems ........................................................................................... 7 2.2. Controller ..................................................................................................................................................... 7 2.2.1. Purpose ......................................................................................................................................................... 7 2.2.2. Memory Components .................................................................................................................................. 8 2.2.3. External Connections ................................................................................................................................ 10 2.2.4. USB Ports .................................................................................................................................................... 11 2.3. Fax Module ................................................................................................................................................ 12 2.3.1. Purpose ....................................................................................................................................................... 12 2.3.2. Hardware ..................................................................................................................................................... 12 2.4. Scanner ...................................................................................................................................................... 13 2.4.1. Purpose ....................................................................................................................................................... 13 2.4.2. Hardware ..................................................................................................................................................... 13 2.5. Graphical User Interface (GUI) ............................................................................................................. 13 2.5.1. Purpose ....................................................................................................................................................... 13 2.6. Marking Engine (Image Output Terminal or IOT) ............................................................................. 13 2.6.1. Purpose ....................................................................................................................................................... 13 2.6.2. Hardware ..................................................................................................................................................... 13 2.7. System Software Structure ................................................................................................................... 14 2.7.1. Open-source components ........................................................................................................................ 14 2.7.2. Operating System Layer in the Controller .............................................................................................. 15 2.7.3. Network Protocols ...................................................................................................................................... 16 2.8. Logical Access ......................................................................................................................................... 17 2.8.1. Network Security ........................................................................................................................................ 17 2.8.2. Ports ............................................................................................................................................................. 18 3. SYSTEM ACCESS ................................................................................................ 25 3.1. Authentication Model .............................................................................................................................. 25 3.2. Login and Authentication Methods ..................................................................................................... 27 3.2.1. System Administrator Login [All product configurations] ...................................................................... 27 3.2.2. User authentication .................................................................................................................................... 27 3.3. System Accounts ..................................................................................................................................... 32 Ver. 1.0, April 2016 Page 2 of 62 ConnectKey 2.0 WorkCentre 58XXi/58XX Information Assurance Disclosure 3.3.1. Printing ......................................................................................................................................................... 32 3.3.2. Network Scanning ...................................................................................................................................... 32 4. SECURITY ASPECTS OF SELECTED FEATURES ............................................ 34 4.1. McAfee Enhanced Security / Integrity Control ................................................................................. 34 4.1.1 Enhanced Security ..................................................................................................................................... 34 4.1.2 Integrity Control (Optional Feature) ......................................................................................................... 34 4.1.3 ePolicy Orchestrator .................................................................................................................................. 35 4.2. Audit Log .................................................................................................................................................... 36 4.2.1 Device Audit Log ........................................................................................................................................... 36 4.2.2 Device Protocol Log ....................................................................................................................................... 36 4.2.3 Audit Log file format ...................................................................................................................................... 36 4.3. Xerox Standard Accounting .................................................................................................................. 47 4.4. User Permissions Role Based Access Control (RBAC) ................................................................ 49 4.5. SMart eSolutions ...................................................................................................................................... 50 4.6. Encrypted Partitions ............................................................................................................................... 50 4.7. Image Overwrite ....................................................................................................................................... 51 4.7.1. Algorithm ..................................................................................................................................................... 51 4.7.2. User Behavior ............................................................................................................................................. 51 4.7.3. Overwrite Timing ........................................................................................................................................ 52 4.7.4. Overwrite Completion Reporting .............................................................................................................. 52 4.8. FIPS ............................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    62 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us