Xerox 3550 All in One Printer User Manual


 
XEROX WorkCentre
3550
Information Assurance Disclosure Paper
4
Ver. 1.3, March 2011 Page 4 of 32
3.2.
Login and Authentication Methods ........................................................................................................................... 21
3.2.1.
System Administrator Login [All product configurations] ........................................................................................... 21
3.2.2.
User authentication ..................................................................................................................................................................... 21
3.3.
System Accounts ............................................................................................................................................................... 24
3.3.1.
Printing [Multifunction models only] .................................................................................................................................... 24
3.3.2.
Network Scanning [Multifunction models only] .............................................................................................................. 24
3.4.
Diagnostics .......................................................................................................................................................................... 24
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 25
4.1.
SMart eSolutions ............................................................................................................................................................... 25
4.2.1
Meter Assistant .............................................................................................................................................................................. 25
4.2.2
Supplies Assistant ......................................................................................................................................................................... 25
4.2.3
Summary .......................................................................................................................................................................................... 25
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 26
5.1.
Security @ Xerox (www.xerox.com/security) .......................................................................................................... 26
6.
APPENDICES ....................................................................................................................................... 27
6.1.
Appendix A – Abbreviations ......................................................................................................................................... 27
6.2.
Appendix B – Supported MIB Objects ....................................................................................................................... 29
6.3.
Appendix C –Standards .................................................................................................................................................. 31
6.4.
Appendix E – References ................................................................................................................................................ 32