Restricting Access from Computers on the Network
6-21
Pr
ot
ect
ing t
he Ma
ch
ine
f
rom Unau
th
or
iz
e
d
Acce
ss
6
Restricting Access from Computers on the Network
Restricting unauthorized access to the machine is highly important for enhanced
information security in a digitalized office. To protect the machine from
unauthorized access, you can use IP addresses and/or MAC addresses.
IMPORTANT
Changes made to IP Address Range Settings and Receiving MAC Address Settings
become effective when the machine is restarted. To restart the machine, turn it OFF,
wait at least 10 seconds, and then turn it ON. For instructions on how to turn the
machine ON and OFF, see Chapter 2, “Before You Start Using the Machine,” in the
User’s Guide
.
Setting the IP Address Range
You can control access to the machine by specifying (a range of) IP addresses. The
machine can be set to filter access by either accepting or rejecting the set (range
of) IP addresses.
IMPORTANT
•
Once you specify the IP addresses or IP address ranges with access permission, you
can set or browse machine settings using the Remote UI only from the computers
whose IP addresses are permitted.
•
Once you specify the IP addresses or IP address ranges with access permission, the
machine receives the print, fax, and remote scan jobs only from the computers with
the allowed IP addresses.
Setting IPv4 Address Range
1
Pre
ss
(Additional Function
s
)
➞
[
S
y
s
tem
S
ettin
gs
]
➞
[Network
S
ettin
gs
].