Kodak 100 PLUS User Manual

Page of 129
5-4
A-61588 July 2008 
Securing your Scan 
Station
Network security is an important part of every day business and it is 
important that network devices do not allow intrusions from outside 
sources. The Scan Station 100 is configured to prevent external attacks 
from the Internet, and from direct access by users. With this in mind, 
several steps were taken to block access to the Scan Station’s 
operating system. 
• First, the Scan Station has an internal firewall active that only allows 
a response to an “echo (ping)” command. Inbound ports are blocked 
and will not respond to queries from the network. 
• Second, the Scan Station is protected from external intrusions via the 
USB ports found on the front and back of the device. The operating 
system is configured to disable any auto-run action that could occur 
when presenting a new USB device to the system. The Scan Station 
application recognizes the presence of a USB removable device, but 
will only open and read files that have been created and encrypted 
specifically for use by the Scan Station. Any file found on a 
removable device that is not properly encrypted will be ignored. This 
makes it almost impossible to introduce a virus from inserting a 
removable device with an infected executable. 
• Finally, viruses frequently find their way into a network-connected 
computer via email. Most viruses are spread as email attachments 
and infect a computer after the email has been opened and the 
attachment executed. The Scan Station does not receive any 
incoming emails, therefore, it cannot be infected in this manner.
Password protecting your 
configuration file
There are several ways an administrator can secure the Scan Station 
using passwords. As previously described in Chapter 3, the 
administrator can add a password (32-character alphanumeric PIN) to 
any administrative configuration file created (select 
User>Configuration Password and enter a password). This prevents 
access to the configuration file in the following ways:
• If the configuration file is saved with this password, it cannot be read 
by a user running the Configuration Organizer without knowing the 
password. Upon insertion of a flash drive that contains a password-
protected configuration file, the user will be prompted to enter the 
password. Failure to correctly enter the password forces the 
Configuration Organizer to ignore the file and proceed as if no file 
exists. 
• When a password configuration file is used to update a Scan Station, 
the password is applied to the configuration on the Scan Station and 
any attempts to modify the Scan Station’s configuration requires the 
entry of the correct password before any changes can be made. 
Because of this protection it is imperative that the password be kept 
in a safe place and not forgotten. If the password is forgotten, it will 
require you to contact Kodak Service to unlock the Scan Station.