EasyManua.ls Logo

Xerox D Series User Manual

Xerox D Series
72 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Xerox® Application Security Guide and Information Assurance Disclosure
Xerox
®
Security Guide
Light Production Mono Class
Copier/Printers
Legacy
Printers
Legacy
Copier/Printers
D-Series®
Copier/Printers
4110, 4112/4127,
4590 Enterprise
Printing System
4110, 4112/4127,
4590 Copier/Printer
D95/D110/D125/D136
Copier/Printer
Question and Answer IconNeed help?

Do you have a question about the Xerox D Series and is the answer not in the manual?

Xerox D Series Specifications

General IconGeneral
Print ResolutionUp to 1200 x 1200 dpi
Print TechnologyLaser
Print SpeedUp to 55 ppm
ConnectivityUSB, Ethernet, Wireless
Supported Operating SystemsWindows (7, 8, 8.1, 10, 11), macOS (10.14 and later), Linux

Summary

Introduction

Purpose

Discloses information for Xerox Copier/Printer products regarding product security.

Target Audience

Xerox field personnel and customers concerned with IT security.

Disclaimer

Information provided without warranty; Xerox not liable for damages from use or disregard.

Physical Components Overview

Architecture

Describes the common architecture of Legacy and D-Series Copier/Printer products.

User Interface

Describes the interface for user interaction and configuration management.

Scanner

Explains how the scanner converts documents from hardcopy to electronic data.

Marking Engine

Details the components responsible for paper feeding, image marking, fusing, and finishing.

Controller

Manages document processing, network functions, and I/O communications.

Optional Equipment

Describes optional components like Fax, NFC Reader, Smart Card, Foreign Product Interface.

User Data Protection

User Data Protection Within Product

Details security controls protecting user data resident within the product.

Encryption

Explains AES-256 encryption for data processing and storage.

TPM Chip

States that Legacy and D-Series products do not contain a TPM chip.

Media Sanitization (Image Overwrite)

Describes secure erasure methods compliant with NIST SP 800-88 Rev1.

Immediate Image Overwrite

Explains the IIO feature for automatic overwriting of temporary files.

User Data in Transit

Focuses on protecting data submitted to or sent from the product.

Print Job Submission Security

Details secure transmission of print jobs using IPPS (TLS) and Xerox Print Stream Encryption.

Scanning to Network, Email, Fax

Covers secure scanning to external locations via HTTP, FTP, SMB, SMTP.

Scanning to USB Storage

Describes scan data transfer to USB, noting filesystem encryption is not supported.

Add-on Apps Security

Discusses Xerox App Gallery security, noting it's beyond document scope.

Network Security

TCP/IP Ports & Services

Overview of inbound/outbound communications and supported ports.

Network Encryption

Details encryption protocols like IPSec for secure packet-level communication.

IPSec Protocol Details

Specifies IPSec support for IPv4/IPv6, authentication methods, and transport modes.

Wireless Network Support (WPA)

States that products do not offer a wireless network connector option.

TLS Protocol Support

Confirms support for TLS 1.2 across various product interfaces.

Public Key Encryption (PKI)

Explains digital certificates, their data, and types used for identity verification.

Device Certificates

Details support for CA signed and self-signed certificates, including bit length and hashes.

Trusted Certificates

Describes importing public certificates for validation of external products.

Certificate Validation Checks

Covers configurable checks for OSCP, CRL, path, expiration, and trusted CA.

Email Signing and Encryption (S/MIME)

Details S/MIME for email authentication, integrity, non-repudiation, and encryption.

SNMPv3 Security Features

Explains SNMPv3 security features: message integrity, authentication, and encryption.

Network Access Control

802.1x Authentication

Describes 802.1X authentication for product connection to network authenticator.

Cisco Identity Services Engine (ISE)

Details Cisco ISE's role in security policy enforcement and Xerox product profiling.

Contextual Endpoint Management

Discusses managing endpoints contextually using Cisco TrustSec and SG-ACLs.

FIPS140-2 Compliance Validation

Explains product validation of cryptographic modules for FIPS 140-2 compliance.

Additional Network Security Controls

Indicates further network security controls are discussed in following sections.

Endpoint Firewall Options

IP Whitelisting

Describes IP Whitelisting support for IPv4/IPv6, allowing specific addresses.

Stateful Firewall (Not Supported)

States that stateful packet inspection is not supported.

Device Security: BIOS, Firmware, OS, Runtime, Operational Controls

Pre-Boot BIOS Protection

Details BIOS inaccessibility, secure modification via signed firmware, and fail-secure design.

Embedded Encryption

Explains AES encryption of configuration settings and user data with unique keys.

Boot Process Integrity

Covers firmware integrity verification using digital signatures and whitelists.

Event Monitoring & Logging

Highlights the Audit Log feature for recording security-related events.

Operational Security

Covers firmware delivery methods (USB, Network, Remote Services) and access controls.

Service Technician Access Restriction

Allows creation of an independent password for service technicians.

Additional Service Details

Explains service procedures, isolation from networks, and secure connections.

Backup & Restore (Cloning)

Describes capturing system settings in 'clone' files for deployment to similar systems.

EIP Applications Security

Discusses Xerox Extensible Interface Platform (EIP) and preventing unauthorized app installation.

Configuration & Security Policy Management

Identification, Authentication, Authorization

Authentication Modes

Covers single and multi-factor authentication modes supported by products.

Local Authentication

Details using the local user database for credential validation and feature authorization.

Password Policy Configuration

Defines configurable password attributes like minimum length and complexity.

Network Authentication Providers

Explains validation of user credentials by remote servers for network authentication.

802.1X Authentication

Describes 802.1X authentication process for product connection to the LAN port.

Smart Card Authentication

Details two-factor security using Smart Cards, reader hardware, and plugins.

Convenience Authentication

Covers third-party solutions for authentication via identification cards or key fobs.

Simple Authentication (Non-Secure)

Describes simple authentication for environments where it's not required, for customization only.

Authorization (Role Based Access Controls)

Explains granular control of user permissions via RBAC and ACLs.

Remote Access Security

Discusses viewing basic info remotely and restricting access to device website pages.

Local Access Security

Covers viewing basic info locally and restricting access to device settings.

SMB Authentication Methods

Details SMB authentication methods like NTLMv2, NTLMv1, LM, and PLAIN.

LDAP Authentication Modes

Explains LDAP authentication modes (Direct Login, Search & Login) and risks.

Secure Access Authentication

Details authentication via secure channel using Secure Access Authentication server and TLS.

Additional Information & Resources

Security @ Xerox® Website

Provides a link to Xerox's evergreen public web page for the latest security information.

Responses to Vulnerabilities

Details the Xerox Vulnerability Management and Disclosure Policy.

Security Resources List

Lists various security resources like FAQs, certified products, and update bulletins.

Appendix A: Product Security Profiles

Legacy Printers (EPS Models)

Provides physical overview and security details for Legacy EPS printer models.

Security Related Interfaces (Printers)

Details interfaces and their security implications for printers.

Encryption and Overwrite (Printers)

Covers AES-256 encryption and Media Sanitization for printers.

Legacy Copier/Printers

Provides physical overview and security details for Legacy Copier/Printer models.

Security Related Interfaces (Copier/Printers)

Details interfaces and their security implications for copier/printers.

Encryption and Overwrite (Copier/Printers)

Covers AES-256 encryption and Media Sanitization for copier/printers.

D-Series Copier/Printers

Provides physical overview and security details for D-Series models.

Security Related Interfaces (D-Series)

Details interfaces and their security implications for D-Series.

Encryption and Overwrite (D-Series)

Covers AES-256 encryption and Media Sanitization for D-Series.

Controller Non-Volatile Storage (D-Series)

Details storage types for user data and configuration on D-Series controllers.

Controller Hard Disk Table (D-Series)

Lists D-Series controller HDD partitions, size, and clearing process.

Controller Volatile Memory (D-Series)

Lists D-Series controller volatile memory types and their clearing/volatility.

Appendix B: Security Events

Xerox Legacy Security Events

Lists security events for Xerox Legacy products, including ID, Event, and Description.

D-Series Security Events

Lists security events for D-Series products, including ID, Event, and Description.

Related product manuals