If the number of authentication requests exceeds the setting, the system classifies the access session
as a password attack. The access session is recorded in the Access Log and the log data is sent to
the machine administrator by e-mail.
If the "Max. Allowed No. of Access" is set to [0], password attacks are not detected.
•
Max. Allowed No. of Access
Specify the maximum number of allowable authentication attempts.
You can specify a value in the range of 0 to 100.
Default: [30]
• Measurement Time
Specify the interval to count the number of repeated failed authentication attempts. When the
measurement time is over, the logged counts of failed authentication attempts are cleared.
You can specify a value in the range of 1 to 10.
Default: [5]
• Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement
Time], you may frequently receive violation detection e-mail.
•
If violation detection e-mail is received frequently, check the content and review the setting values.
Securty Setg for Accs Viol / Security Setting for Access Violation
This can be specified by the machine administrator.
When logging in to the printer via a network application, a user may be locked out erroneously
because the number of authentication attempts of the user does not match the number of attempts
logged internally.
For example, access may be denied when a print job for multiple sets of pages is sent from an
application.
If you select [On] under "Securty Setg for Accs Viol", you can prevent such authentication errors.
• On
• Accss Violtn Denial Duratn
Specify the time to limit repeated access by a user.
You can specify a value in the range of 0 to 60.
Default: [15]
• Managed User Host Limit
Specify the number of user accounts to manage under "Securty Setg for Accs Viol".
You can specify a value in the range of 50 to 200.
Default: [200]
• Password Entry Host Limit
Specifying the Extended Security Functions
223