Konica Minolta Kodak Scan Station 710 Operation Guide - Page 106

Scan Station Security, To help secure your Scan Station set the Remote Access Password.

Page 106 highlights

Scan Station Security Security is an important part of every day business. It is important that network devices do not allow intrusions from outside sources. The Scan Station 700 Series is configured to prevent external attacks from the Internet and from direct access by users. The following security features will block access to the Scan Station's operating system. • The Scan Station uses a firewall and blocks nearly all incoming network traffic. Most inbound ports are blocked and will not respond to queries from the network. • The Scan Station is also configured to respond to an echo (also known as a ping). This can be useful for diagnosing connectivity issues. • The Scan Station is protected from external intrusions via the Scan Station USB ports. The operating system is configured to disable any auto-run action that could occur when presenting a new USB device to the system. The Scan Station recognizes the presence of a USB removable device, but will only open and read files that have been created and encrypted specifically for use by the Scan Station. Any file found on a removable device that is not properly encrypted will be ignored. This makes it almost impossible to introduce a virus by inserting a removable device with an infected executable. • Viruses frequently find their way into a network-connected computer via email. Most viruses are spread as email attachments and infect a computer after the email has been opened and the attachment executed. The Scan Station does not receive any incoming emails, therefore, it cannot be infected in this manner. • The Scan Station will only read a valid, encrypted configuration file. • The underlying operating system is not available to the administrator or user. Updates to the operating system and/or the Scan Station firmware will be made available on the Kodak Alaris website http://www.kodakalaris.com/go/disupport) as needed. • To help secure your Scan Station set the Remote Access Password. For more information, see the section entitled, "Scanner menu" in Chapter 3. • You can require a user to login before scanning. For more information, see the section entitled, "Configuring your device options" in Chapter 4. 9-18 A-61796 September 2014

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

9-18
A-61796
September
2014
Scan Station Security
Security is an important part of every day business. It is important that
network devices do not allow intrusions from outside sources. The Scan
Station 700 Series is configured to prevent external attacks from the
Internet and from direct access by users. The following security
features will block access to the Scan Station’s operating system.
The Scan Station uses a firewall and blocks nearly all incoming
network traffic. Most inbound ports are blocked and will not respond
to queries from the network.
The Scan Station is also configured to respond to an echo (also
known as a
ping
). This can be useful for diagnosing connectivity
issues.
The Scan Station is protected from external intrusions via the Scan
Station USB ports. The operating system is configured to disable any
auto-run action that could occur when presenting a new USB device
to the system. The Scan Station recognizes the presence of a USB
removable device, but will only open and read files that have been
created and encrypted specifically for use by the Scan Station. Any
file found on a removable device that is not properly encrypted will be
ignored. This makes it almost impossible to introduce a virus by
inserting a removable device with an infected executable.
Viruses frequently find their way into a network-connected computer
via email. Most viruses are spread as email attachments and infect a
computer after the email has been opened and the attachment
executed. The Scan Station does not receive any incoming emails,
therefore, it cannot be infected in this manner.
The Scan Station will only read a valid, encrypted configuration file.
The underlying operating system is not available to the administrator
or user. Updates to the operating system and/or the Scan Station
firmware will be made available on the Kodak Alaris website
To help secure your Scan Station set the Remote Access Password.
For more information, see the section entitled, “Scanner menu” in
Chapter 3.
You can require a user to login before scanning. For more
information, see the section entitled, “Configuring your device
options” in Chapter 4.