PREPARING FOR FIERY X3ETY2 SETUP
19
Additional security features
In addition to the traditional security features such as passwords, you can use the following
features to keep the Fiery X3eTY2 secure:
• E-mail access
• IP addresses and ports
•Secure Printing
Controlling E-mail access to the Fiery X3eTY2
Because you can allow users to print file attachments in e-mail messages sent to the
Fiery X3eTY2, the Fiery X3eTY2 accepts only valid attachments (for example, PostScript or
PDF files). Typically, viruses transmitted via e-mail require execution by the receiver.
Attachments that are not valid files are discarded by the Fiery X3eTY2. Because file types such
as .BAT, .VBS, and .EXE could launch harmful virus activity, the Fiery X3eTY2 does not
process these file types. The Fiery X3eTY2 also ignores e-mails in RTF (Rich Text Format) or
HTML (Hypertext Markup Language) format, and any included JavaScript code.
You can define a list of authorized e-mail addresses on the Fiery X3eTY2. Any e-mail that the
Fiery X3eTY2 receives from an e-mail address not in the authorized list is deleted. For more
information, see page 41.
Restricting IP addresses and ports
To restrict unauthorized connections to the Fiery X3eTY2, you can permit only users whose
IP addresses are within a defined range. You can also close unnecessary ports to reject inbound
access from the network. Commands or jobs sent from unauthorized IP addresses or ports are
ignored by the Fiery X3eTY2.
Secure Printing
This option allows the printing of highly sensitive or confidential files. A user printing a file
with the printer driver assigns a password to the job. The user must then enter the password at
the copier to print the job. For more information, see Print Options.