Additional Security Features; Controlling Email Access To The Ex/I Print Server; Restricting Ip Addresses And Ports; Secure Printing - Xerox EX 570 Configuration And Setup

Table of Contents

Advertisement

S
R
15
YSTEM
EQUIREMENTS

Additional security features

In addition to the traditional security features such as passwords, you can use these features to
keep the EX/i Print Server secure:
• E-mail access
• IP addresses and ports

• Secure Printing

• LDAP authentication

Controlling email access to the EX/i Print Server

Because you can allow users to print file attachments in email messages sent to the EX/i Print
Server, the EX/i Print Server accepts only valid attachments (for example, PostScript or PDF
files). Typically, viruses transmitted via email require execution by the receiver. Attachments
that are not valid files are discarded by the EX/i Print Server. Because file types such as .BAT,
.VBS, and .EXE can cause virus activity, the EX/i Print Server does not process these file
types. The EX/i Print Server also ignores e-mails in RTF (Rich Text Format) or HTML
(Hypertext Markup Language) format, and any included JavaScript code.
You can define lists of authorized email addresses on the EX/i Print Server. Any email that the
EX/i Print Server receives from an email address that is not in the authorized list is deleted.
For more information, see
page
48.

Restricting IP addresses and ports

To restrict unauthorized connections to the EX/i Print Server, you can permit only users
whose IP addresses are within a defined range. You can also close unnecessary ports to reject
inbound access from the network. Commands or jobs sent from unauthorized IP addresses or
ports are ignored by the EX/i Print Server.
Secure Printing
This option allows the printing of highly sensitive or confidential files. A user printing a file
with the printer driver assigns a password to the job. The user must then enter the password at
the printer to print the job. For more information, see Printing.
LDAP authentication
When LDAP communication is enabled to retrieve names and other information for people
at your site, you can specify the type of authentication. For more information, see Configure
Help.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Exi 570

Table of Contents