SyncThru™ Web Service
188
8. Management Tools
-
IPv6 Filtering:
You can enable/disable IPv6 filtering as well as manage
filtering rules. This feature is also available from the machine (see
"Network filtering settings" on page 345).
-
MAC Filtering:
You can enable/disable Mac filtering as well as manage
filtering rules. This feature is also available from the machine (see
"Network filtering settings" on page 345).
-
802.1x
:
You can enable/disable 802.1x Security as well as manage
filtering rules. This feature is also available from the machine (see
"802.1x" on page 334).
•
External Authentication Server:
Set the servers for authentication.
•
802.1x:
You can enable 802.1x authentication, which is a port-based
authentication. If this authentication is enabled, the machine is not allowed
to access through the protected side of the network until the machine is
authorized. Use this feature to protect your network. This feature is also
available from the machine (see "802.1x" on page 334).
•
User Access Control:
You can restrict users from accessing the machine or
application. You can also give specific permission for user to only use certain
feature of the machine. For example, you can allow user A to only use print
feature. In this case, user A will not be able to scan, copy or fax with the
machine.
-
Authentication (Activating access control):
You can choose the
authentication method for user authentication. Select a mode and click
on the
Options
button. This feature is also available from the machine
(see "Authentication" on page 323).
-
Authorization
(Giving rights)
:
You can give permissions to a user to
only use certain features of the machine.
-
Authority Management:
You can give different rights to different
users. For example, you can allow user A to use all the machine’s
functions while giving user B only the right to print.
-
Accounting:
You can manage accounts.
-
User profile:
You can store user information on the machine’s hard
drive. You can use this feature to manage the users using the machine.
You can also group the users and manage them as a group. You can add
up to 1,000 entries. User identified by user ID and password are allowed
to modify their password. They are allowed to view all of their profile
information. When it comes to the role, users are allowed to see only the
role they belong to but not its permissions.
•
System Log:
You can keep logs of events that have happened in the
machine. The administrator can record and manage the machine usage
information by keeping the system log files. The system log files are stored
on the machine’s HDD (hard disk drive), and when it is full, it will erase old
data. Export and save the important audit data separately using the
exporting feature.
-
Log configuration:
You can enable or disable keeping logs. You can
also backup log files by periods and transfer to a repository server.
-
Log Viewer:
You can view, delete, and search log files.