Xerox D95 110 125 Copier Printer Xerox D110 125 Printer -Books Pdf

Xerox D95 110 125 Copier Printer Xerox D110 125 Printer
20 Feb 2020 | 20 views | 0 downloads | 53 Pages | 218.99 KB

Share Pdf : Xerox D95 110 125 Copier Printer Xerox D110 125 Printer

Download and Preview : Xerox D95 110 125 Copier Printer Xerox D110 125 Printer


Report CopyRight/DMCA Form For : Xerox D95 110 125 Copier Printer Xerox D110 125 Printer



Transcription

Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. 2012 by Fuji Xerox Co Ltd All Rights Reserved, Copyright protection claimed includes all forms and matters of copyrightable material and information. now allowed by statutory or judicial law or hereinafter granted including without limitation material. generated from the software programs which are displayed on the screen such as icons screen. displays looks etc, Changes are periodically made to this document Changes technical inaccuracies and typographic. errors will be corrected in subsequent editions, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. Table of Contents,Section 1 Introduction 1,1 1 Purpose 1. 1 2 Target Audience 1,1 3 Disclaimer 1,Section 2 Device Description 2.
2 1 Memory Devices of the Product 2,2 1 1 User Interface 2. 2 1 2 Marking Engine 3,2 1 3 Scanner 3,2 1 4 Controller Memory Devices 3. 2 1 5 Other Memory Devices 4,2 2 Operating Systems 4. 2 3 Program Downloading 4,Section 3 System Access 6. 3 1 Physical Access 6,3 1 1 User Interface 6, 3 1 2 10 100 1000 MB Ethernet RJ 45 Network Connector 6.
3 1 3 USB Port 6,3 1 4 Accessory Interface 7,3 2 Logical Access 7. 3 2 1 Network Protocols 7,3 2 2 Ports 7,3 3 Log in and Authentication Methods 15. 3 3 1 Administrator Authentication 15,3 3 2 Service Technicians Authentication 15. 3 3 3 General Users Authentication 15,3 3 4 Login to External Servers 18. 3 3 5 Single Sign On SSO 19,3 4 Device Authentication Method 20.
3 4 1 802 1X Authentication 20,3 5 FIPS140 21,Section 4 Data Flow 23. Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. 4 1 Print Service 23,4 1 1 Direct Print 23,4 1 2 EPC Print 23. 4 1 3 USB Memory Print 25,4 2 Copy Service 25,4 2 1 Direct Copy Job 25. 4 2 2 EPC Copy Job 1 26,4 2 3 EPC Copy Job 2 27,4 2 4 Copy Server 29. 4 3 Scan Service 30,4 3 1 Scan to PC Service 30,4 3 2 Scan to Mailbox 33.
4 3 3 Mailbox to PC 34,4 3 4 Scan to USB 35,4 4 Report Service 36. 4 4 1 Report Print 36,4 5 Paper Security Service 37. Section 5 Protection of Data on the Hard Disk 38,5 1 Image Overwrite Feature 38. 5 1 1 Algorithm 38,5 1 2 Special Behavior 38,5 2 Data Encryption Feature 38. 5 2 1 Algorithm 39,5 2 2 Special Behavior 39,Section 6 Security Audit Log 40.
Section 7 APPENDICES 41,7 1 Appendix A 1 Supported MIB Objects 41. 7 2 Appendix A 2 Supported SESAMi Service Management Interface 43. 7 3 Appendix B Networking Protocol RFC s and Standards 46. 7 4 Appendix C Connector Layouts 49, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. Section 1 Introduction,1 1 Purpose, The purpose of this document is to disclose information for the Xerox D95 110 125 Copier Printer and. Xerox D95 110 125 Printer products hereinafter called as the product with respect to device security. Device Security for this paper is defined as how image data is stored and transmitted how the product. behaves in a network environment and how the product may be accessed both locally and remotely. The purpose of this document is to inform Xerox customers of the design functions and features of the. product with respect to Information Assurance IA, This document does not provide tutorial level information about security connectivity PDL s or the. product s features and functions This information is readily available elsewhere We assume that the. reader has a working knowledge of these types of topics. 1 2 Target Audience, The target audience for this document is Xerox field personnel and customers concerned with IT.
1 3 Disclaimer, The information in this document is accurate to the best knowledge of the authors and is provided. without warranty of any kind In no event shall Fuji Xerox be liable for any damages whatsoever. resulting from user s use or disregard of the information provided in this document including direct. indirect incidental consequential loss of business profits or special damages even if Fuji Xerox has. been advised of the possibility of such damages,Version 1 11 March 2012 1. Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. Section 2 Device Description, The product provides the copy and network printer functions and features and consists of a controller. module marking engine and scanner, The following table lists the major elements of the product P is Printer and CP is Copier Printer. Configuration Marking Scanner Controller,X Included.
2 1 Memory Devices of the Product, This section describes details of the memory devices that are contained within the product. The memory devices are shown below,Controller,Page Memory SEEPROM. SDRAM Flash ROM NVRAM,User Interface,Marking Engine. Flash ROM SEEPROM,2 1 1 User Interface, User image data in the memory on Controller is accessible Preview Thumbnail feature. Version 1 11 March 2012 2, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper.
2 1 2 Marking Engine,Name Purpose Explanation, Flash ROM All operating system and application executable control code related to. Marking Engine resides here e g boot loader paper path and. xerographic, SRAM This is a Work RAM used to develop the program and parameters in the. Static RAM above mentioned Flash ROM No user data is stored in this memory. 2 1 3 Scanner, The scanner does not have its own control processor The scanner attribute information is written in the. SEEPROM and the control is performed by the controller Note that this feature is not available on. Name Purpose Explanation, SEEPROM This non volatile memory has no user data stored in it. This memory contains, Mode setting information on image processing and mechatronics control.
and data on the parts usage status associated with recycling. 2 1 4 Controller Memory Devices, The details of the memory devices in the Controller are. Name Purpose Explanation, SDRAM The executable software is loaded in this memory and is run This memory. is also used for temporary storage of user data such as data files and. images Such data is not backed up and is lost when the power to the. product is removed, Flash ROM This Flash memory contains the code necessary to boot the system all. executable code operating system PostScript interpreter network. protocols document scheduler etc and the installed fonts A power on. self test is performed and the bootstrap OS is loaded This memory never. contains any user data or document data, Operating system and application executable control code resides here All. codes except for the code of boot loader is compressed and is extracted into. DRAM to be executed No user image data is stored in this memory. NVRAM This non volatile memory has no image data stored in it User data such as. system setting information mailbox information job memory user. Version 1 11 March 2012 3, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper.
management information and various types of logs are recorded in it The. data is written in the memory after it is encrypted. Controller This device contains numerous types of data including user data. Hard disk 1 Data of the documents scanned in upon copying. 2 Data of spooled documents in PDL format from the network. 3 Data of the documents used in security print sample print and delayed. start print,4 Data of the scanned in documents,5 Job logs. 6 Downloaded fonts and forms, For the formatting of the hard disk the file system included in VxWorks is. used The format however is not accessible even when the hard disk is. connected to PC When a job is completed its reference in the directory. table is deleted but the image data remains on the disk until overwritten by a. subsequent job, Image Overwrite feature enables an overwrite of the used data with. meaningless data Also Data Encryption feature enables a data encryption. Page Memory This is a volatile memory used to store image data temporarily. SEEP ROM This memory contains the system s setting information. 2 1 5 Other Memory Devices, The product has other memory devices but such devices are used solely as accessory devices that. control I O of paper Examples of this distributed control are. Finisher DADF Duplex and Tray Module, No user data is stored in any of these memory devices.
2 2 Operating Systems, The Marking Engines for the product contains the iTRON 4 0 operating system These systems have. no networking capability, The Controller uses the VxWorks realtime operating system Typical Unix functions such as Rsh telnet. and Finger do not operate under the OS, User must note that the VxWorks operating system is not accessible All logons to the product are to. application software and not to the VxWorks OS Hence the VxWorks OS is not accessible to the user. 2 3 Program Downloading, The programs stored in the Flash ROM listed below are downloadable from external sources. Controller,Version 1 11 March 2012 4, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper.
Marking Engine,Document Feeder, Finisher Option for processing printed paper No description on Finisher is provided in this. document because user s image data will not be stored in it. High capacity feeder No description on High capacity feeder is provided in this document. because user s image data will not be stored in it. High capacity stacker No description on high capacity stacker is provided in this document. because user s image data will not be stored in it. Interface Module No description on interface module is provided in this document because. user s image data will not be stored in it, This program downloading function can be disabled by a key operator from the local UI. The header part of file is checked using software to identify whether the download file is legitimate. Version 1 11 March 2012 5, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. Section 3 System Access,3 1 Physical Access, There are a variety of methods to physically access the system To compromise the system a person. must be local to the device Remote logical access is discussed in the next section. 3 1 1 User Interface, The User Interface is the control panel on the front of the device From the UI a user can.
access to setup menus of Common Copy Print Mail Network Mailbox etc. create his her own Mailbox and Address Book,access to setup menus of Auditron. change the setting on Key Operator Tools, An ID and password required to enter Key Operator Tools mode are stored in the Controller NVM. 3 1 2 10 100 1000 MB Ethernet RJ 45 Network Connector. This is the standard network connector and allows access to the connectivity stacks and open ports. described in the next section This connector conforms to IEEE Ethernet 802 3 standards However. 1000 MB Ethernet is optional,3 1 2 1 Network Scan feature 1. The product has a memory called Mailbox to store the scanned in data Password can be assigned to. Mailbox and Mailbox is accessible only by a person who assigned the password and a person who is. notified of the password he she can retrieve the image data in the Mailbox from the client PC via LAN. On the PC installed Scanner Driver decodes the retrieved data to image. 3 1 2 2 Network Scan feature 2, This is a feature to transfer the scanned in data directly to the server on the LAN The image data is. directly converted into the specified format and sent. Scanned in image is generated by the device firmware It is difficult to modify the firmware to add a. 3 1 3 USB Port,USB1 1 port for maintenance, The USB1 1 port is the USB target connector provided to perform maintenance This port is on the.
Version 1 11 March 2012 6, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. standard controller board the firmware is downloaded using this port The Fuji Xerox unique protocol. is used for maintenance From this port software can be downloaded and diagnostics can be. performed No image data and document data is accessible through this port. USB2 0 Port for printer, The USB2 0 port is the USB target connector used to print files via direct connection The received. data is processed by imaging software on the product. USB2 0 Port, The USB 2 0 port is used for USB Memory Print ScanToUSB with USB memory connected and for. connection with IC card reader,3 1 4 Accessory Interface. This port is used to connect optional equipment to control usage of the product A typical application is. a coin operated device where a user must deposit money to enable the product to perform copying. The information available via the Accessory Interface is limited to information on copied sheets. delivered to the finisher or output tray No image job or document data is accessible through this port. except for the counter data Note that this feature is not available on Printer. 3 2 Logical Access,3 2 1 Network Protocols, The network protocols supported by the product are IP IPv4 IPv6 BOOTP DHCP IPX Apple Talk.
SNMP v1 v2c v3 NETBEUI NETBIOS SMTP SSDP SNTP HTTP Kerberos LDAP SLP v1 IPP. LPR and so on These protocol specifications are implemented based on standard specifications such. as RFC issued by IETF,3 2 2 Ports, A number of TCP IP and UDP IP ports exist The following table summarizes all ports that can be. opened and subsequent sections discuss each port in detail for when the product uses them. Port Type Service name,20 TCP FTP data Active Client. 20 TCP FTP data FreeFlow,21 TCP FTP Client,21 TCP FTP FreeFlow. 25 TCP SMTP,53 TCP UDP DNS Client,67 UDP BOOTP DHCP Client. Version 1 11 March 2012 7, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper.
80 TCP HTTP CWIS,80 TCP HTTP UPnP Discovery,80 TCP HTTP WSD. 80 TCP HTTP WebDAV,80 TCP HTTP IPP added port,88 UDP Kerberos Client. 110 TCP POP3 Client,123 UDP SNTP Client,137 UDP NETBIOS Name Service. 138 UDP NETBIOS Datagram Service,139 TCP NETBIOS,161 UDP SNMP. 162 UDP SNMP trap,389 TCP LDAP Client,427 TCP UDP SLP.
443 TCP HTTPS CWIS,443 TCP HTTPS IPP,443 TCP HTTPS WebDAV. 443 TCP HTTPS Authentication Agent,445 TCP Direct Hosting. 465 TCP SMTPS Client,500 UDP ISAKMP,515 TCP LPR,524 TCP NetWare NCP Client. 547 UDP DHCPv6 Client,631 TCP IPP FreeFlow,636 TCP LDAPS Client. 1824 TCP HTTPS OffBox Validation Client,1824 TCP Xerox Secure Access Client.
1900 UDP SSDP,3702 UDP WSD Discovery,5353 UDP mDNS. 9100 TCP raw IP, 15000 TCP Loopback port for the control of SMTP server. 20001 TCP Loopback port for HTTP Server,1024 TCP NetWare SLP. Client The port number is not for the port on the controller side but for the port of the connecting. destination Unless the port number for the controller side is specified the port number for the. Version 1 11 March 2012 8, Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. controller side is unknown Also the port is not open on the controller all of the time but will open only. at time of accessing the remote server,3 2 2 1 Ports 20 21 FTP.
There are cases where this port is used as an FTP client feature or as an FTP server feature. When it is used as an FTP client feature this port is not open all of the time This port is open only. when sending image data to the FTP server to perform ScanToFTP and MailboxToFTP functions or. when accessing the FTP server to search for Scan Job Flow Sheets i e Scan job Flow Sheets In. other cases no ports are connected to the FTP server. FTP server feature is activated only when FreeFlow feature is enabled Port 21 is open at all times and. Port 20 opens only when receiving image data from the FTP client A service engineer can configure. these port numbers A key operator can disable these ports and service turn FTP ports OFF ON from. CentreWare Internet Services,3 2 2 2 Port 25 SMTP, This port enables E mail Print feature and is open all of the time when the receive protocol is set to. SMTP Also this port is open when sending image or message to SMTP server in Scan to E mail or. Email Alert feature When SMTP Authentication is set authentication to the server is performed In. such case a password is sent in plain text or as encrypted according to the information notified by the. server A key operator can change the port number from CentreWare Internet Services. 3 2 2 3 Port 53 DNS, This port is used for DNS This port is used for name queries to the DNS server when the product. accesses the device designated by the device name This port is also used to register device names in. DNS server authoritative server to update the DNS dynamically A key operator can disable only DNS. dynamic update service from CentreWare Internet Services. 3 2 2 4 Port 67 DHCP, This port is used only when performing DHCP and is not open all of the time To permanently close this. port DHCP must be explicitly disabled This is done via the Local User Interface or CentreWare. Internet Services by a key operator,3 2 2 5 Port 80 HTTP CWIS. This port is used to access embedded web pages through browser The port number can be changed. from CentreWare Internet Services by a key operator. The embedded web pages are used for the following purposes. to give information on device status to users,Version 1 11 March 2012 9.
Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. to enable confirmation of the job logs and job queue in the device and operation of the jobs. to allow users to download print ready files and program Scan Job Flow Sheets. to enable management of Mailboxes and operation on the documents in Mailboxes. to enable import export of Address Book and import of device certificate. to allow remote administration of the device User may view the properties but not change. them without logging into the product with key operator privileges When authentication of the. key operator fails for the specified number of times consecutively rebooting of the entire. product is required, A read write of partial system setting information is possible through the unique protocols on the HTTP. The HTTP server can only host the web pages in the device but cannot substitute for the proxy server. Through HTTP the file system of the product cannot be accessed directly. The embedded HTTP server is a product of Fuji Xerox. A key operator can disable this service and the port via Local User Interface or from CentreWare. Internet Services,3 2 2 6 Port 80 HTTP UPnP Discovery. This port provides the discovery feature using SSDP The port number is configurable and a key. operator can disable this service and the port via local UI or from CentreWare Internet Services. 3 2 2 7 Port 80 HTTP SESAMi Manager, The port number is configurable and a key operator can change the port number via local UI. CentreWare Internet Services or SSMI Also a key operator can disable this service via local UI. CentreWare Internet Services or SSMI, Port 80 operates as a HTTP server for SSMI Port 443 operates as a secure channel for SSMI and. supports SSLv3 and TLSv1 When SSL is enabled HTTP connections to SSMI are redirected to. HTTPS Since communication through port 443 is encrypted interception on the network can be. 3 2 2 8 Port 80 HTTP WSD, This port supports WSD Web Services on Devices Print feature.
The port number is configurable and a key operator can disable this port and service from the local UI. or CentreWare Internet Services,Version 1 11 March 2012 10. Xerox D95 110 125 Copier Printer Xerox D110 125 Printer Information Assurance Disclosure Paper. 3 2 2 9 Port 80 HTTP WebDAV, This port is a WebDAV server port that supports features to access Mailbox The port number is. configurable and a key operator can disable this service and the port via local UI or from CentreWare. Internet Services,3 2 2 10 Port 88 Kerberos, The product employs Kerberos client function that is used to access this product from Local UI. The product supports Kerberos V5 and uses CBC Cipher Block Changing of DES Data Encryption. Standard The Kerberos code is not used for document encryption. The authentication data of the user permitted by the product is set in the Kerberos server and address. information and realm information of the Kerberos server used by the product is set in the Controller. The following show the difference from the standard Kerberos packaging. 1 Ticket cache, In the product tickets are stored only in a memory and are deleted automatically by a user log off or. an automatic log off due to time out When power is turned off during log on the tickets will be. 2 Validity of the ticket, In the product only the initial ticket is obtained authentication is considered as successful when the.
initial ticket is obtained Thus invalidation of the initial ticket is not judged. 3 2 2 11 Port 110 POP3, This port enables E mail Print feature and is open at the specified intervals set when receive protocol is. set to POP3 Also when POP Before SMTP is set POP access is always performed before sending. data such as image to the SMTP server Usually the POP User ID and the password are sent in plain. text but the password is encrypted to be sent when APOP authentication is selected. A key operator can change the port number from CentreWare Internet Services. 3 2 2 12 Port 123 SNTP, This port is used to access the server at the specified intervals when time synchronization with the. external time is set on the Local User Interface The setting can be changed by a key operator. 3 2 2 13 Ports 137 138 139 445 NETBIOS, Port 137 is the standard NetBIOS Name Service port and mainly used by WINS Port 138 supports the. CIFS browsing protocol Port 139 is the standard NetBIOS Session port and is open all of the time for. printing Port 445 is a standard direct host port and is used for communication using SMB protocol that.


Related Books

Kitchen Lab Guidelines.Handout*

Kitchen Lab Guidelines Handout

Kitchen Lab Planning and Evaluating eek. Kitchen Lab Procedures and Safety Concerns 1. Dress appropriately in clean clothes and preferably closed toe shoes, you must also pull long hair back. 2. You must wear an apron anytime you are in the kitchen units. 3. Leave books or bookbags/ purses and iPads in your locker or place on unused tables in the classroom. 4. Bathroom brakes will be very ...

OMV Technical Information Versions - Danfoss

OMV Technical Information Versions Danfoss

OMV Technical Information Versions Mounting ? ange Shaft Port size European version US version Drain connection Check valve Main type designation Features available (options) : Speed sensor Motor with tacho connection Viton shaft seal Painted Ultra short Cyl. 50 mm G1 Yes Yes OMV Cyl. 2.25 in 1 5/16-12 UN Yes Yes OMV Splined 2.125 in

Distribution Restriction Statement

Distribution Restriction Statement

ER 1130-2-406 31 Oct 90 1. EM 385-1-1, "Safety and Health Requirements Manual." 4. Policy. a. It is the policy of the Chief of Engineers to protect and manage shorelines of all Civil Works water resource development projects under Corps jurisdiction in a manner which will promote the safe and healthful use of these shorelines by the public while maintaining environmental safeguards to ensure a ...

RESPONSE OF RL AND RLC CIRCUITS

RESPONSE OF RL AND RLC CIRCUITS

ELG-2130 Circuit Theory 3-1 LABORATORY 3 RESPONSE OF RL AND RLC CIRCUITS Overdamped response Underdamped response RL circuit RLC circuit 3.1 Objectives

THE HUNTER COLLEGE ART GALLERIES

THE HUNTER COLLEGE ART GALLERIES

artists employing American imagery and techniques, including Larry Rivers, Jasper Johns, Roy Lichtenstein, Claes Oldenburg, and Phillip Hefferton. Pop art, seen by later theorists as American only insofar as the United States represented the leading edge of capitalism, was at its first appearance often

Cyber Security Resource Pack - Digital Thumbprint

Cyber Security Resource Pack Digital Thumbprint

Resource Pack. 1 Cyber Security Lesson Plan 1 Section Interaction Description Intro Lead-in to set the context 3 min T-S Start the class by asking the following two questions, trying to get as much information and interaction from the students as possible: 1. What information do you need to start a Social Media account?* [Name, mobile number or email, date of birth, captcha code, password] 2 ...

AMERICAN SPECIALTIES, INC. Hand Dryer

AMERICAN SPECIALTIES INC Hand Dryer

Installation Installation Kit Included (find in carton) 2 www.americanspecialties.com 1. Make sure power supply breaker is switched off. Installation must be carried ...

ASI FrontDesk 6 - Anand Systems

ASI FrontDesk 6 Anand Systems

ASI FrontDesk 6.0 Configuration and Help File Website: www.AnandSystems.com Go to Index Page Welcome to ASI FrontDesk, ASI FrontDesk is a comprehensive, affordable ...

KEARIFAN LOKAL MASYARAKAT KADAZANDUSUN DALAM PERTANIAN ...

KEARIFAN LOKAL MASYARAKAT KADAZANDUSUN DALAM PERTANIAN

adat. Menurut Hornby (Alidri, 2016), kearifan itu dibangunkan dan berkembang secara spontan dalam masyarakat atau zaman tertentu. Kearifan itu diguna untuk membangunkan norma dan peraturan yang dipandu oleh penggunaan dan pengurusan sumber. Dalam konteks artikel ini, kearifan lokal dikonseptualkan sebagai suatu bentuk

PEMBENTUKAN NILAI-NILAI MURNI MASYARAKAT SEMAI MELALUI ...

PEMBENTUKAN NILAI NILAI MURNI MASYARAKAT SEMAI MELALUI

Masyarakat Orang Asli memang kaya dengan adat resam dan budaya kerana lingkungan hidup mereka yang masih berkait rapat dengan alam semulajadi walaupun sudah, memasuki dunia moden. Adat dan kepercayaan mereka mempunyai hubungan yang rapat dengan makhluk-makhluk ghaib di alam semesta ini.