Access Control
2-38
Co
nn
e
c
tin
g
th
e Ma
ch
in
e
to
a TC
P/IP
Ne
twor
k
2
Access Control
Restricting unauthorized access to the machine is highly important in a digitalized
office for enhanced information security. To protect the machine from unauthorized
access, you can use IP addresses and/or MAC addresses.
NOTE
To enhance the machine’s security, Department ID Management and User ID
Management are also available. For more information, see Chapter 4, “System Manager
Settings,” in the
Reference Guide
.
Setting the IP Address Range
You can control the access to the machine by specifying (a range of) IP addresses.
The machine can be set to filter the access by either accepting or rejecting the set
(range of) IP addresses.
1
Press
(Additional
Functions)
➞
use [
] or [
] to select
<System Settings>
➞
press [OK].
For help, see the screen shots in steps 1 and 2 in “Ethernet Driver,” on p. 2-2.
2
Use [
] or [
] to select
<Network Settings>
➞
press [OK].
3
Use [
] or [
] to select
<TCP/IP Settings>
➞
press [OK].
Device Info Settings
Dept. ID Management
User ID Management
Network Settings
System Settings
TCP/IP Settings
SNMP Settings
Ethernet Driver
Startup Time Set.
Network Settings
Содержание IR 2420
Страница 2: ...imageRUNNER 2422 2420 Network Guide ...
Страница 17: ...TCP IP Network Setup Operating Procedures 1 6 Before You Start Using This Machine 1 ...
Страница 87: ...Machine Management 3 20 Setting Up the Machine for Your Network Environment 3 ...
Страница 97: ...Printing Problems and Remedies 5 4 Troubleshooting 5 ...