Xerox DocuTech 6100 Production Publisher Leaflet

Page of 140
Security and Network Setup
3-12
System Guide
Roles and responsibilities
Xerox will make every effort to assist the administrator in 
ensuring that the customer environment is secure.
Xerox responsibilities
Xerox is committed to providing a level of security which will 
allow the DocuSP controller to be a good network citizen in 
response to current security intrusions. Additional security 
beyond this remains the responsibility of the customer.Xerox 
is constantly evaluating the security of the DocuSP controller 
and the Sun Solaris operating system. Xerox is committed to 
providing the latest Solaris security patches provided by Sun 
Microsystems in each major DocuSP release. The DocuSP 
development team will also add Solaris security patches in 
between major release cycles. All OS security patches for 
applications that are added during a DocuSP install will be 
included, even if the application code is not normally used by 
DocuSP users. Security patches for applications that are not 
loaded by a DocuSP install will not be evaluated or included. 
Only the version of a patch impacting security will be 
included. If a security patch has a newer version that is not 
security related, then this patch will not be updated to the 
newer version. Any security patch that is determined to have 
a negative impact to DocuSP operation will not be added.
Customer responsibilities
The administrator has the primary responsibility for 
maintaining the security of the network within the customers 
site. It is important that network security is continuously 
monitored and maintained, and that appropriate security 
policies are established and followed.
The procedures outlined in this document assume a basic 
knowledge of UNIX, the vi editor, and general computing 
concepts. It is expected that the network administrator or 
system administrator responsible for network security 
understands the base commands (cd, chmod, cp, grep, kill, 
ln, ls, man, more, ps, etc.), and the UNIX directory path and 
filename structures shown in this document.
There is information within the text and in the appendix 
sections for reference to those who may not use UNIX   often.