Instruction manual

Sharp MX-3501N
www.BERTL.com
tel. (1) 732-761-2311
fax. (1) 732-761-2312
info@BERTL.com
Copyright © 2006 MCA Internet, LLC dba BERTL 2-May-06
All Rights Reserved. The license under which this document is made available and applicable law prohibit any
reproduction or further transmission of any portion of this document. This document may only be viewed elec-
tronically through the www.BERTL.com Web site and may not be stored in electronic or hard copy format. Any
reproduction of trademarks is strictly prohibited. BERTL accepts no responsibility for any inaccuracies or
omissions contained in this document.
Page 16
Color at Work
®
Security
With data and network security on the A-
list of most IT managers, Sharp looks well
positioned to deliver a host of security
options to cater to the needs of the
security-conscious buyer.
In addition to its already enviable list of
security features, Sharp has added PDF
encryption to the MX-3501N. Users are
now able to enter a PIN when creating
PDF documents for storage or external
communication. This ensures that if a PDF
file is intercepted, its contents cannot be
read unless the recipient has the PIN that
goes with the files. This PIN is encrypted
using 128-bit security and requires nothing
more than a standard Acrobat Reader,
utilizing Adobe’s own security technology.
To limit access to the device itself, Sharp
has included both IP and MAC address
filtering. MAC address filtering is an
important step up from IP address filtering
(which many competitors now have)
because unlike IP addresses — which can
be changed should a hacker discover the
range of approved IP addresses — the
MAC address of the network interface card
cannot be changed.
Sharp also includes a port lock down
utility. This searches the device for any
ports that are not being used and locks
them down to prevent back door entrances
for hackers into the network.
Sharp offers a variety of methods of
restricting user access to the functionality
of the device. At the most basic level, the
Sharp MX-3501N supports user and
departmental codes, either through its own
user code system or through third-party
applications such as Equitrac. This is used
to track activity at the device on a user-by-
user basis, ultimately controlling which
functions are available per user.
Administrators are able to apply IP and MAC
filters using the Web server.