![Ricoh Aficio MP C2000 Скачать руководство пользователя страница 139](http://html.mh-extra.com/html/ricoh/aficio-mp-c2000/aficio-mp-c2000_operating-instructions-manual_1455779139.webp)
Preventing Unauthorized Access
131
5
A
Open a Web Image Monitor.
B
Enter "http://(machine's-address)/" in the address bar to access the machine.
C
Log onto the machine.
The network administrator can log on using the appropriate login user name
and login password.
D
Click
[
Configuration
]
, under
[
Security
]
, click
[
Access Control
]
.
The
[
Access Control
]
page appears.
E
To specify the IPv4 Address, in
[
Access Control Range
]
, enter an IP address
that has access to the machine. To specify the IPv6 Address, in
[
Access Con-
trol Range
]
-
[
Range
]
, enter an IP address that has access to the machine, or in
[
Mask
]
, enter an IP address that has access to the machine and specify the
[
Mask Length
]
.
F
Click
[
OK
]
.
Access control is set.
G
Log off from the machine.
Reference
For details, see the Web Image Monitor Help.
Specifying Network Security Level
This can be specified by the network administrator.
This setting lets you change the security level to limit unauthorized access.
Set the security level to
[
Level 0
]
,
[
Level 1
]
, or
[
Level 2
]
.
Select
[
Level 2
]
for maximum security to protect confidential information.
Select
[
Level 1
]
for moderate security. Use this setting if the machine is connected
to the office local area network (LAN).
Select
[
Level 0
]
to use this setting if no information needs to be protected.
You can specify the entire network security level setting the machine’s control
panel.
If you change this setting using Web Image Monitor, the network security level
settings other than the specified one will be reset to the default.
Reference
For details about logging on and logging off with user authentication, see p.23
“Logging on Using Administrator Authentication”, p.26 “Logging off Using
Administrator Authentication”.
Содержание Aficio MP C2000
Страница 10: ...2 ...
Страница 80: ...Authentication and its Application 72 2 ...
Страница 108: ...Preventing Information Leaks 100 3 D Press Unlock Files E Press Yes F Press OK ...
Страница 158: ...Enhanced Network Security 150 5 ...
Страница 172: ...Specifying the Extended Security Functions 164 6 ...