
USING THE M204’S ADDITIONAL OPTIONS: TCP/IP Options 127
Only users that have root permission can configure the remote host access entries.
Users with guest permission can only display these entries.
To set up the access list, please see store tcpip on page 110 and to look at the current
settings, see list tcpip on page 88.
Scrambling/Descrambling
A second method of security is provided through data scrambling/descrambling.
This second TCP/IP security method protects users’ print data as it is sent across the
network to the M204 for printing. A binary is provided on the host, npscramble,
which scrambles the print job. Then when the job reaches the Print Server, it is
descrambled for printing.
This scrambling method will protect against casual viewing with network analyzers.
However, it is not encrypted and cannot be considered safe from cryptographic attack.
To utilize this feature, you need to:
1 Look into the npscramble.c source code for a variable called SR_KEY. This con-
tains a four digit hexadecimal value to be used as the descrambling key on the
M204.
2 Log into the Print Server as root user and set this value as the key. Enter:
set sysinfo descramblekey
key
3 Set descrambling on in the model you are utilizing. Enter:
set model
modelname
stty descramble
4 Save these new settings. Enter:
save
5 Incorporate npscramble into your print setup on your host. Scrambling can be set
within npr.if or added to the command line when printing.
cat test.txt | npscramble | rsh spike lp -d d1prn1
where test.txt is piped through npscramble for scrambling and then sent for
printing on the M204 spike’s destination d1prn1.
Please see Host Software on page 19, Printing Via the Spooler on page 32, and set
model on page 97.
Note
Note
Examp
e
Komentarze do niniejszej Instrukcji