S
YSTEM
R
EQUIREMENTS
15
Additional security features
In addition to the traditional security features such as passwords, you can use these features to
keep the E-42B secure:
• E-mail access
• IP addresses and ports
• Secure Printing
• LDAP authentication
Controlling email access to the E-42B
Because you can allow users to print file attachments in email messages sent to the E-42B, the
E-42B accepts only valid attachments (for example, PostScript or PDF files). Typically, viruses
transmitted via email require execution by the receiver. Attachments that are not valid files are
discarded by the E-42B. Because file types such as .BAT, .VBS, and .EXE can cause virus
activity, the E-42B does not process these file types. The E-42B also ignores e-mails in RTF
(Rich Text Format) or HTML (Hypertext Markup Language) format, and any included
JavaScript code.
You can define lists of authorized email addresses on the E-42B. Any email that the E-42B
receives from an email address that is not in the authorized list is deleted. For more
information, see
.
Restricting IP addresses and ports
To restrict unauthorized connections to the E-42B, you can permit only users whose IP
addresses are within a defined range. You can also close unnecessary ports to reject inbound
access from the network. Commands or jobs sent from unauthorized IP addresses or ports are
ignored by the E-42B.
Secure Printing
This option allows the printing of highly sensitive or confidential files. A user printing a file
with the printer driver assigns a password to the job. The user must then enter the password at
the copier/printer to print the job. For more information, see
Printing
.
LDAP authentication
When LDAP communication is enabled to retrieve names and other information for people
at your site, you can specify the type of authentication. For more information, see Configure
Help.