5. Enhanced Network Security
This chapter describes how to increase security over the network using the machine's functions.
Preventing Unauthorized Access
You can limit IP addresses, disable ports and protocols, or use Web Image Monitor to specify the network
security level to prevent unauthorized access over the network and protect the Address Book, stored files,
and default settings.
Access Control
This can be specified by the network administrator using Web Image Monitor. For details, see Web Image
Monitor Help.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access control range.
For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC
addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
• Using access control, you can limit access involving Web Image Monitor. You cannot limit access
involving telnet, when using the SNMPv1 monitoring.
1.
Open a Web browser.
2.
Enter " http://( the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3.
Click [Login].
The network administrator can log on using the appropriate login user name and login password.
4.
Click [Configuration], and then click [Access Control] under "Security".
The Access Control page appears.
5.
To specify the IPv4 Address, enter an IP address that has access to the machine in "Access
Control Range".
To specify the IPv6 Address, enter an IP address that has access to the machine in "Range" under
"Access Control Range", or enter an IP address in "Mask" and specify the "Mask Length".
6.
Click [OK].
Access control is set.
103
5
Содержание Pro C550EX
Страница 9: ...INDEX 229 7...
Страница 18: ...1 Getting Started 16 1...
Страница 68: ...2 Authentication and its Application 66 2...
Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Страница 96: ...3 Ensuring Information Security 94 3...
Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...
Страница 104: ...4 Managing Access to the Machine 102 4...
Страница 148: ...5 Enhanced Network Security 146 5...
Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Страница 162: ...6 Specifying the Extended Security Functions 160 6...
Страница 180: ...7 Troubleshooting 178 7...
Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Страница 233: ...MEMO 231...
Страница 234: ...MEMO 232 EN USA D0797508...
Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...