imagePRESS C910/C810/C710 Customer Expectations Document
Version 5
imagePRESS C910/C810/C710 Customer Expectations Document
Page 28
2.8.4 Network Security
The imagePRESS C910/C810/C710 secure network communications by using IP
Address and MAC (Media Access Control) Address filters, encryption and
authentication, and network port and application access control.
•
IP Address and MAC Address Filters
- IP Address Filter performs a function
similar to many firewalls. It permits or rejects incoming packets from up to eight
IP addresses or ranges of IP addresses. Also, IP address filters to outbound
connections can be applied. For example, if such functions as Remote Copy
and Universal Send are used, system administrators can block or restrict users
from sending files to specific IP addresses. This helps to minimize the risk of
data being sent out of the company to systems that are not trusted.
MAC Address Filter permits or rejects access for up to 100 MAC addresses. It
is useful for environments that use DHCP (Dynamic Host Configuration
Protocol) for IP address assignments. If DHCP leases expire and a new IP
address is issued to a certain system, the filter can still identify the system’s
MAC address, and permit or reject access to the machine. MAC addresses can
be easily added, edited, or deleted through the Remote UI. MAC Address Filter
takes a higher priority than IP Address Filter, which prevents unknown systems
from accessing the machine.
•
Encryption and Authentication
- SSL (Secure Sockets Layer) protects data
transferred over the network by encrypting file names and formats. The System
Administrator can also add IPSec capabilities to secure Internet Protocol (IP)
communications from lower layer protocols, such as TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol) by authenticating and
encrypting each IP packet of a data stream across the Internet.
Additionally, the imagePRESS C910/C810/C710 support IEEE 802.1
x
, which
provides port-based authentication. Authentication involves communications
between a supplicant, authenticator, and authentication server. The supplicant
is authentication software on a client device. The client device (the
imagePRESS C910/C810/C710) needs the supplicant to provide credentials,
such as user names/passwords or digital certificates, to the authenticator (a
wireless access point). The authenticator then forwards the credentials to the
authentication server (generally a RADIUS database) for verification. If the
credentials are valid in the authentication server database, the client device is
allowed to access resources located on the protected side of the network.
•
Network Port and Application Access Control
- Network Port and
Application Access Control enables system administrators to set up only the
necessary protocols, such as IPP, FTP, SNTP, SNMP, RAW, LPD, and others
for transferring data. These protocols can be switched on and off. The
administrator can also disable unneeded services, protocols, ports, and the
potential paths of attack so that attacks on the machine can be minimized.