Preventing Unauthorized Access
129
5
Access Control
This can be specified by the network administrator.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access
control range.
For example, if you specify the access control range as [192.168.15.16]-
[192.168.15.20], the client PC addresses from which access is possible will be from
192.168.15.16 to 192.168.15.20.
Limitation
❒
Using access control, you can limit access involving LPR, RCP/RSH, FTP, IPP,
DIPRINT, Web Image Monitor, SmartDeviceMonitor for Client or DeskTop-
Binder. You cannot limit the Monitoring of SmartDeviceMonitor for Client.
❒ You cannot limit access involving telnet, or SmartDeviceMonitor for Admin.
A Open a Web Image Monitor.
B Enter “http://(machine's-address)/” in the address bar to access the ma-
chine.
C Log onto the machine.
The network administrator can log on using the appropriate login user name
and login password.
D Click [Configuration], under [Security], click [Access Control].
The [Access Control] page appears.
E To specify the IPv4 Address, in [Access Control Range], enter an IP address
that has access to the machine. To specify the IPv6 Address, in [Access Con-
trol Range] - [Range], enter an IP address that has access to the machine, or in
[Mask], enter an IP address that has access to the machine and specify the
[Mask Length].
F Click [OK].
Access control is set.
G Log off from the machine.
Reference
For details, see the Web Image Monitor Help.
BelliniC3-EN_Sec_F_FM_forPaper.book Page 129 Friday, December 16, 2005 9:16 AM