8
Appendix
8-32
Viewing the Network Access Log
Viewing the Network Access Log
This machine logs attempts to gain access from IP addresses that it has been set to reject. The
procedure for referring to the access log is as follows.
For instruction on how to set the machine to permit or reject specific IP addresses, see step 8 in
"TCP/IPv4 Settings(p.3-4)" or step 6 in "TCP/IPv6 Settings(p.3-13)."
Remark
To display [Log], set <Job Log Display> in [System
Monitor Screen Restriction] in the System Settings
screen (from the Additional Functions screen) to 'On'.
1. Press [System Monitor]
→
[Print]
→
[Log]
→
select [Network] from the
drop-down list.
The log pertaining to the rejected IP addresses is displayed.
Up to 100 logs can be displayed.
You can export the log to a CSV format file, using the Remote UI. For instructions, see the
Remote UI Guide
Acesst 1.0 6251194
Summary of Contents for iR3245
Page 2: ......
Page 7: ...chapter 1 Before You Start...
Page 15: ...1 Before You Start Using E Mail I Fax 1 9 Using E Mail I Fax...
Page 18: ...1 Before You Start 1 12 Sending Data Sending Data...
Page 29: ...chapter 2 Settings Common to the Network Protocols...
Page 53: ...chapter 3 Using a TCP IP Network...
Page 149: ...3 Using a TCP IP Network FTP Server Settings 3 97 FTP Server Settings...
Page 171: ...chapter 4 Using a NetWare Network Windows...
Page 194: ...4 Using a NetWare Network Windows 4 24 Setting Up a Computer as a File Server...
Page 195: ...chapter 5 Using a NetBIOS Network...
Page 206: ...5 Using a NetBIOS Network 5 12 Printer Connection Method Printer Connection Method...
Page 222: ...5 Using a NetBIOS Network 5 28 Samba UNIX Linux Mac OS X...
Page 223: ...chapter 6 Using an AppleTalk Network Macintosh...
Page 228: ...6 Using an AppleTalk Network Macintosh 6 6 Setting Up a Computer for Printing...
Page 229: ...chapter 7 Troubleshooting...
Page 252: ...7 Troubleshooting 7 24 IEEE802 1X Authentication Problems and Remedies...
Page 253: ...chapter 8 Appendix...
Page 287: ......