
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3
Ver. 1.00, May 2010 Page 3 of 44
1. INTRODUCTION ..................................................................................................................................5
1.1. Purpose ............................................................................................................................................................................... 5
1.2. Target Audience .............................................................................................................................................................. 5
1.3. Disclaimer .......................................................................................................................................................................... 5
2. DEVICE DESCRIPTION.......................................................................................................................6
2.1. Security-relevant Subsystems..................................................................................................................................... 6
2.1.1. Physical Partitioning.......................................................................................................................................................................6
2.1.2. Security Functions allocated to Subsystems ........................................................................................................................7
2.2. Controller ........................................................................................................................................................................... 8
2.2.1. Purpose ................................................................................................................................................................................................8
2.2.2. Memory Components ....................................................................................................................................................................8
2.2.3. External Connections ..................................................................................................................................................................10
2.2.4. USB Host Port.................................................................................................................................................................................11
2.2. Fax Module......................................................................................................................................................................11
2.3.1. Purpose .............................................................................................................................................................................................11
2.3.2. Hardware..........................................................................................................................................................................................11
2.4. Scanner.............................................................................................................................................................................12
2.4.1. Purpose .............................................................................................................................................................................................12
2.4.2. Hardware..........................................................................................................................................................................................12
2.5. Graphical User Interface (GUI) ................................................................................................................................12
2.5.1. Purpose .............................................................................................................................................................................................12
2.5.2. Hardware..........................................................................................................................................................................................12
2.6. Marking Engine (also known as the Image Output Terminal or IOT).........................................................13
2.6.1. Purpose .............................................................................................................................................................................................13
2.6.2. Hardware..........................................................................................................................................................................................13
2.7. System Software Structure........................................................................................................................................14
2.7.1. Open-source components .........................................................................................................................................................14
2.7.2. OS Layer in the Controller .........................................................................................................................................................14
2.7.3. Network Protocols ........................................................................................................................................................................15
2.8. Logical Access.................................................................................................................................................................17
2.8.1. Network Protocols ........................................................................................................................................................................17
2.8.2. Ports ...................................................................................................................................................................................................18
2.8.3. IP Filtering .......................................................................................................................................................................................22
3. SYSTEM ACCESS................................................................................................................................ 23
3.1. Authentication Model..................................................................................................................................................23