Scan station security – Kodak 500 User Manual

Page 119

Advertising
background image

6-2

A-61628 December 2011

Scan Station Security

Security is an important part of every day business. It is important that
network devices do not allow intrusions from outside sources. The Scan
Station 500 is configured to prevent external attacks from the Internet
and from direct access by users. The following security steps will block
access to the Scan Station’s operating system.

• The Scan Station uses a firewall and blocks nearly all incoming

network traffic. It can also respond to an Echo (also known as a ping).
Most inbound ports are blocked and will not respond to queries from
the network.

• The Scan Station is protected from external intrusions via the Scan

Station USB ports. The operating system is configured to disable any
auto-run action that could occur when presenting a new USB device
to the system. The Scan Station recognizes the presence of a USB
removable device, but will only open and read files that have been
created and encrypted specifically for use by the Scan Station. Any
file found on a removable device that is not properly encrypted will be
ignored. This makes it almost impossible to introduce a virus by
inserting a removable device with an infected executable.

• Viruses frequently find their way into a network-connected computer

via email. Most viruses are spread as email attachments and infect a
computer after the email has been opened and the attachment
executed. The Scan Station does not receive any incoming emails,
therefore, it cannot be infected in this manner.

• The Scan Station will only read a valid, encrypted configuration file

created by the Configuration Organizer and a firmware update file
created by Kodak. For more information, see the section entitled,
“Password protecting the administrative configuration file” later in this
chapter.

• The underlying operating system is not available to the administrator

or user. Updates to the operating system and/or the Scan Station
firmware will be made available on Kodak’s website (http://
www.kodak.com/go/disupport) as needed.

• You can require a user to login before scanning. For more

information, see the section entitled, “Device settings” in Chapter 3.

Advertising