EasyManuals Logo
Home>Xerox>Copier>D136

Xerox D136 Security Guide

Xerox D136
72 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #3 background imageLoading...
Page #3 background image
Xerox® Security Guide for Light Production Mono Class Products
Table of Contents
1 INTRODUCTION ................................................................................................................................... 3
PURPOSE .................................................................................................................................................... 3
TARGET AUDIENCE ...................................................................................................................................... 3
DISCLAIMER ................................................................................................................................................. 3
PHYSICAL COMPONENTS .............................................................................................................................. 4
ARCHITECTURE ............................................................................................................................................ 4
USER INTERFACE ......................................................................................................................................... 5
SCANNER .................................................................................................................................................... 5
MARKING ENGINE ........................................................................................................................................ 6
CONTROLLER .............................................................................................................................................. 6
OPTIONAL EQUIPMENT ................................................................................................................................. 8
2 USER DATA PROTECTION ................................................................................................................. 9
USER DATA PROTECTION WHILE WITHIN PRODUCT ......................................................................................... 9
USER DATA IN TRANSIT .............................................................................................................................. 10
3 NETWORK SECURITY ....................................................................................................................... 12
TCP/IP PORTS & SERVICES ....................................................................................................................... 12
NETWORK ENCRYPTION ............................................................................................................................. 19
NETWORK ACCESS CONTROL ..................................................................................................................... 24
CONTEXTUAL ENDPOINT CONNECTION MANAGEMENT .................................................................................. 25
FIPS140-2 COMPLIANCE VALIDATION......................................................................................................... 25
ADDITIONAL NETWORK SECURITY CONTROLS ............................................................................................. 25
4 DEVICE SECURITY: BIOS, FIRMWARE, OS, RUNTIME, AND OPERATIONAL SECURITY
CONTROLS ................................................................................................................................................ 27
FAIL SECURE VS FAIL SAFE........................................................................................................................ 27
PRE-BOOT SECURITY................................................................................................................................. 28
BOOT PROCESS SECURITY ......................................................................................................................... 28
RUNTIME SECURITY ................................................................................................................................... 28
EVENT MONITORING & LOGGING ................................................................................................................ 29
OPERATIONAL SECURITY ............................................................................................................................ 29
BACKUP & RESTORE (CLONING) ................................................................................................................. 30
EIP APPLICATIONS ..................................................................................................................................... 30
5 CONFIGURATION & SECURITY POLICY MANAGEMENT SOLUTIONS ........................................ 31
6 IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION ..................................................... 32
AUTHENTICATION ....................................................................................................................................... 32
AUTHORIZATION (ROLE BASED ACCESS CONTROLS) ................................................................................... 35
7 ADDITIONAL INFORMATION & RESOURCES ................................................................................. 38
SECURITY @ XEROX® ............................................................................................................................... 38
RESPONSES TO KNOWN VULNERABILITIES .................................................................................................. 38
ADDITIONAL RESOURCES ........................................................................................................................... 38
APPENDIX A: PRODUCT SECURITY PROFILES ................................................................................... 39
LEGACY® 4110, 4112/4127, 4590 EPS PRINTERS.................................................................................... 40
LEGACY® 4110, 4112/4127, 4590 COPIER/PRINTERS ................................................................................ 43
D-SERIES® D95A/D110/D125/D136 COPIER/PRINTERS ............................................................................ 46

Other manuals for Xerox D136

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Xerox D136 and is the answer not in the manual?

Xerox D136 Specifications

General IconGeneral
BrandXerox
ModelD136
CategoryCopier
LanguageEnglish

Related product manuals