If the number of authentication requests exceeds the setting, the system classifies the access session
as a password attack. The access session is recorded in the Access Log and the log data is sent to
the machine administrator by e-mail.
If the "Max. Allowed No. of Access" is set to [0], password attacks are not detected.
• Max. Allowed No. of Access
Specify the maximum number of allowable authentication attempts.
Use the number keys to enter the number between "0" and "100", and then press [ ].
Default: [30]
• Measurement Time
Specify the interval to count the number of repeated failed authentication attempts. When the
measurement time is over, the logged counts of failed authentication attempts are cleared.
Use the number keys to enter the time between "1" and "10", and then press [ ].
Default: [5]
• Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement
Time], you may frequently receive violation detection e-mail.
• If violation detection e-mail is received frequently, check the content and review the setting values.
Device Access Violation
This can be specified by the machine administrator.
If the number of log in requests exceeds the setting, the system classifies the access session as an
access violation. The access session is recorded in the Access Log and the log data is sent to the
machine administrator by e-mail. Also, a message is displayed on the control panel and on Web
Image Monitor.
If the "Max. Allowed No. of Access" is set to [0], over access is not detected.
In "Authentication Delay Time", you can specify response delay time for log-in requests to prevent
the system from becoming unavailable when an access violation is detected.
In "Simultns. Access Host Limit", you can specify the limit number of hosts accessing the machine at
one time. If the number of access exceeds the setting, monitoring becomes unavailable and the
detected unavailability is recorded in the Log.
•
Max. Allowed No. of Access
Specify the maximum number of allowable access attempts.
Use the number keys to enter the number between "0" and "500", and then press [
].
Default: [100]
• Measurement Time
Specify the interval to count the number of excessive access. When the measurement time is
over, the logged counts of access are cleared.
Specifying the Extended Security Functions
265