Kyocera TASKalfa 3051ci Printing System (11),(12),(13),(14) Configuration and - Page 20

Additional security features, Controlling E-mail access to the E100, Restricting IP addresses, ports

Page 20 highlights

PREPARING FOR E100 SETUP 20 Additional security features In addition to the traditional security features such as passwords, you can use these features to keep the E100 secure: • E-mail access • IP addresses, ports, and MAC addresses • Secure Printing • LDAP authentication • Secure Erase Controlling E-mail access to the E100 Because you can allow users to print file attachments in e-mail messages sent to the E100, the E100 accepts only valid attachments (for example, PostScript or PDF files). Typically, viruses transmitted via e-mail require execution by the receiver. Attachments that are not valid files are discarded by the E100. Because file types such as .BAT, .VBS, and .EXE could launch harmful virus activity, the E100 does not process these file types. The E100 also ignores e-mails in RTF (Rich Text Format) or HTML (Hypertext Markup Language) format, and any included JavaScript code. You can define lists of authorized e-mail addresses on the E100. Any e-mail that the E100 receives from an e-mail address not in the authorized list is deleted. For more information, see page 47. Restricting IP addresses, ports, and MAC addresses To restrict unauthorized connections to the E100, you can permit only users whose IP addresses or MAC addresses are within a defined range. You can also close unnecessary ports to reject inbound access from the network. Commands or jobs sent from unauthorized IP addresses or ports are ignored by the E100. Make sure that the Network Security option in Setup from the copier touch panel is selected. If you deselect this option, IP address, ports, and Mac address filtering are disabled. For more information, see page 29. Secure Printing This option allows the printing of highly sensitive or confidential files with user authentication. A user printing a file with the printer driver assigns a password to the job. The user must then enter the password at the copier to print the job. For more information about how to print a secure job with a password, see Printer Driver Help.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59

P
REPARING
FOR
E100 S
ETUP
20
Additional security features
In addition to the traditional security features such as passwords, you can use these features to
keep the E100 secure:
E-mail access
IP addresses, ports, and MAC addresses
Secure Printing
LDAP authentication
Secure Erase
Controlling E-mail access to the E100
Because you can allow users to print file attachments in e-mail messages sent to the E100, the
E100 accepts only valid attachments (for example, PostScript or PDF files). Typically, viruses
transmitted via e-mail require execution by the receiver. Attachments that are not valid files
are discarded by the E100.
Because file types such as .BAT, .VBS, and .EXE could launch harmful virus activity, the E100
does not process these file types. The E100 also ignores e-mails in RTF (Rich Text Format) or
HTML (Hypertext Markup Language) format, and any included JavaScript code.
You can define lists of authorized e-mail addresses on the E100. Any e-mail that the E100
receives from an e-mail address not in the authorized list is deleted. For more information, see
page 47
.
Restricting IP addresses, ports, and MAC addresses
To restrict unauthorized connections to the E100, you can permit only users whose IP
addresses or MAC addresses are within a defined range. You can also close unnecessary ports
to reject inbound access from the network. Commands or jobs sent from unauthorized IP
addresses or ports are ignored by the E100.
Make sure that the Network Security option in Setup from the copier touch panel is selected.
If you deselect this option, IP address, ports, and Mac address filtering are disabled. For more
information, see
page 29
.
Secure Printing
This option allows the printing of highly sensitive or confidential files with user
authentication. A user printing a file with the printer driver assigns a password to the job. The
user must then enter the password at the copier to print the job. For more information about
how to print a secure job with a password, see Printer Driver Help.