Oki C942dp C931 C941 C942 - Fiery C9 Server - Configuration Guide - Page 36

Windows Firewall, Antivirus protection, Removable hard disk drive, Restricting IP addresses and ports

Page 36 highlights

Configuration and Setup 36 Configuring the C9 Server for your network and print environment Configuring security features The C9 Server includes the following security settings: • Removable hard disk • Restrictions on the allowed IP addresses and ports • LDAP authentication • Secure Erase Note: You can protect the C9 Server against viruses by using antivirus software to scan it periodically. Windows Firewall By default, the Windows Firewall function is disabled on the C9 Server. Do not enable the Windows Firewall on the C9 Server. If you do, unexpected results may occur. Antivirus protection To protect against viruses, scan the C9 Server periodically with antivirus software. Make sure that you start the antivirus software only when the C9 Server is Idle and not receiving jobs. This prevents errors that may result if the antivirus software acts while C9 Server attempts to process a job. Use antivirus software to scan files sent to the C9 Server outside the usual print scenarios, including files copied to the C9 Server from removable media or a shared network directory. Removable hard disk drive The C9 Server provides an option for a removable hard disk drive. If you have this option, you can lock the hard disk drive for saving files and then remove it to a secure location after turning off the C9 Server. For more information, see the documentation that accompanies this option. Restricting IP addresses and ports To restrict unauthorized connections to the C9 Server, you can permit only users whose IP addresses are within a defined range. You can also close unnecessary ports to reject inbound access from the network. Commands or jobs sent from unauthorized IP addresses or ports are ignored by the C9 Server. Controlling email access to the C9 Server Because you can allow users to print file attachments in email messages sent to the C9 Server, the C9 Server accepts only valid attachments (for example, PostScript or PDF files). Typically, viruses transmitted via email require execution by the receiver. Attachments that are not valid files are discarded by the C9 Server. Because file types such as .BAT, .VBS, and .EXE can cause virus activity, the C9 Server does not process these file types. The C9 Server also ignores emails in RTF (Rich Text Format) or HTML (Hypertext Markup Language) format, and any included JavaScript code.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

Configuring security features
The C9 Server includes the following security settings:
Removable hard disk
Restrictions on the allowed IP addresses and ports
LDAP authentication
Secure Erase
Note:
You can protect the C9 Server against viruses by using antivirus software to scan it periodically.
Windows Firewall
By default, the Windows Firewall function is disabled on the C9 Server. Do not enable the Windows Firewall on the
C9 Server. If you do, unexpected results may occur.
Antivirus protection
To protect against viruses, scan the C9 Server periodically with antivirus software. Make sure that you start the
antivirus software only when the C9 Server is Idle and not receiving jobs. This prevents errors that may result if the
antivirus software acts while C9 Server attempts to process a job. Use antivirus software to scan files sent to the C9
Server outside the usual print scenarios, including files copied to the C9 Server from removable media or a shared
network directory.
Removable hard disk drive
The C9 Server provides an option for a removable hard disk drive. If you have this option, you can lock the hard disk
drive for saving files and then remove it to a secure location after turning off the C9 Server. For more information,
see the documentation that accompanies this option.
Restricting IP addresses and ports
To restrict unauthorized connections to the C9 Server, you can permit only users whose IP addresses are within a
defined range.
You can also close unnecessary ports to reject inbound access from the network. Commands or jobs sent from
unauthorized IP addresses or ports are ignored by the C9 Server.
Controlling email access to the C9 Server
Because you can allow users to print file attachments in email messages sent to the C9 Server, the C9 Server accepts
only valid attachments (for example, PostScript or PDF files).
Typically, viruses transmitted via email require execution by the receiver. Attachments that are not valid files are
discarded by the C9 Server. Because file types such as .BAT, .VBS, and .EXE can cause virus activity, the C9 Server
does not process these file types. The C9 Server also ignores emails in RTF (Rich Text Format) or HTML (Hypertext
Markup Language) format, and any included JavaScript code.
Configuration and Setup
Configuring the C9 Server for your network and print environment
36