beautypg.com

Konica Minolta IC-308 User Manual

Page 2

background image

2

Fiery Security White Paper

Table of Contents

1 Document Overview .............................................................................. 3
1.1 Electronics For Imaging (EFI) Security Philosophy .............................. 3
1.2 Configure the Security Feature Via Fiery Configure ............................ 3

2 Hardware and Physical Security ............................................................ 4
2.1 Volatile Memory .................................................................................. 4
2.2 Non-Volatile Memory and Data Storage ............................................. 4
2.2.1 Flash Memory ............................................................................... 4
2.2.2 CMOS ........................................................................................... 4
2.2.3 NVRAM ......................................................................................... 4
2.2.4 Hard Disk Drive ............................................................................. 4
2.2.5 Physical Ports ................................................................................ 4
2.3 Local Interface .................................................................................... 4
2.4 Removable HDD Kit Option ................................................................ 4
2.4.1 For External Servers ...................................................................... 4
2.4.2 For Embedded Servers ................................................................. 4

3 Network Security .................................................................................... 5
3.1 Network Ports ..................................................................................... 5
3.2 IP Filtering ........................................................................................... 5
3.3 Network Encryption ............................................................................ 5
3.3.1 IPsec ............................................................................................. 5
3.3.2 SSL and TLS .................................................................................. 5
3.3.3 Certificate Management ............................................................... 6
3.4 IEEE 802.1X ........................................................................................ 6
3.5 SNMP V3 ............................................................................................. 6
3.6 Email Security ..................................................................................... 6
3.6.1 POP before SMTP......................................................................... 6
3.6.2 OP25B ........................................................................................... 6

4 Access Control ........................................................................................ 7
4.1 User Authentication ............................................................................ 7
4.2 Fiery Software Authentication ............................................................ 7

5 Operating System Environment ........................................................... 8
5.1 Start Up Procedures ........................................................................... 8
5.2 Linux ................................................................................................... 8
5.2.1 Linux Anti-Virus Software .............................................................. 8
5.3 Windows 7 Professional ..................................................................... 8
5.3.1 Microsoft Security Patches ........................................................... 8
5.3.2 SMS Tools ...................................................................................... 8
5.3.3 Windows Anti-Virus Software ....................................................... 8
5.4 Email Viruses ....................................................................................... 8

6 Data Security ........................................................................................... 9
6.1 Encryption of Critical Information ....................................................... 9
6.2 Standard Printing ................................................................................ 9
6.2.1 Hold, Print and Sequential Print Queues ...................................... 9
6.2.2 Printed Queue ............................................................................... 9
6.2.3 Direct Queue (Direct Connection) ................................................ 9
6.2.4 Job Deletion .................................................................................. 9
6.2.5 Secure Erase ................................................................................. 9
6.2.6 System Memory ..........................................................................10
6.3 Secure Print .......................................................................................10
6.3.1 Workflow ......................................................................................10
6.4 Email Printing .....................................................................................10
6.5 Job Management ...............................................................................10
6.6 Job Log ..............................................................................................10
6.7 Setup ..................................................................................................10
6.8 Scanning ............................................................................................10

7 Conclusion ..............................................................................................11

Copyright © 2012 Electronics For Imaging, Inc. All rights reserved.
This publication is protected by copyright, and all rights are reserved. No part of it may be copied, reproduced, distributed, disclosed or transmitted in any form or by any means for any purpose without express prior written
consent from Electronics For Imaging. Information in this document is subject to change without notice and does not represent a commitment on the part of Electronics For Imaging. Electronics For Imaging, Inc. assumes
no responsibility or liability for any errors or inaccuracies, makes no warranty of any kind (express, implied or statutory) with respect to this publication, and expressly disclaims any and all warranties of merchantability,
fitness for particular purposes, and non-infringement of third party rights. The software described in this publication is furnished under license and may only be used or copied in accordance with the terms of such license.