Ldap authentication – Xerox 700 User Manual
Page 19

P
REPARING
FOR
F
IERY
C
ONTROLLER
S
ETUP
19
Controlling E-mail access to the Integrated Fiery Color Server
Because you can allow users to print file attachments in e-mail messages sent to the
Integrated Fiery Color Server, the Integrated Fiery Color Server accepts only valid
attachments (for example, PostScript or PDF files). Typically, viruses transmitted via e-mail
require execution by the receiver. Attachments that are not valid files are discarded by the
Integrated Fiery Color Server.
Because file types such as .BAT, .VBS, and .EXE could launch harmful virus activity, the
Integrated Fiery Color Server does not process these file types. The Integrated Fiery Color
Server also ignores e-mails in RTF (Rich Text Format) or HTML (Hypertext Markup
Language) format, and any included JavaScript code.
You can define lists of authorized e-mail addresses on the Integrated Fiery Color Server. Any
e-mail that the Integrated Fiery Color Server receives from an e-mail address not in the
authorized list is deleted. For more information, see
.
Restricting IP addresses and ports, and MAC addresses
To restrict unauthorized connections to the Integrated Fiery Color Server, you can permit
only users whose IP addresses or MAC addresses are within a defined range. You can also close
unnecessary ports to reject inbound access from the network. Commands or jobs sent from
unauthorized IP addresses or ports are ignored by the Integrated Fiery Color Server.
LDAP authentication
When you enable LDAP communication to retrieve names and other information for people
at your organization, you can specify the type of authentication. For more information, see
WebTools Configure Help.
Connecting network cable to the Integrated Fiery Color Server
This section includes an illustration of the Integrated Fiery Color Server back panel, and
provides information about connecting the Integrated Fiery Color Server to the network.