Viewing the Network Access Log
8-21
8
Appe
ndi
x
Viewing the Network Access Log
This machine logs attempts to gain access from IP addresses that it has been set
to reject. The procedure for referring to the access log is as follows.
For instruction on how to set the machine to permit or reject specific IP addresses,
see step 12 in "TCP/IP Settings," on p. 3-3.
NOTE
To display [Log], set <Job Log Display> in [System Monitor Screen Restriction] in the
System Settings screen (from the Additional Functions screen) to 'On'.
1
Press [System Monitor]
➞
[Print]
➞
[Log]
➞
select [Network]
from the drop-down list.
The log pertaining to the rejected IP addresses is displayed.
Up to 100 logs can be displayed.
You can export the log to a CSV format file, using the Remote UI. For instructions,
see the
Summary of Contents for image RUNNER 3045
Page 2: ......
Page 3: ...imageRUNNER 3045 3035 3030 3025 Network Guide 0 Ot ...
Page 16: ...xiv ...
Page 26: ...Checking Your Network Environment 1 10 1 Before You Start ...
Page 42: ...Communication Environment Setup 2 16 2 Settings Common to the Network Protocols ...
Page 100: ...Setting Up a Computer as a File Server 3 58 3 Using a TCP IP Network ...
Page 140: ...Setting Up a Computer as a File Server 5 24 5 Using a NetBIOS Network ...
Page 182: ...Confirming Settings 8 20 8 Appendix 08 24 2006 TUE 16 48 iR 3045 002 ...
Page 215: ......