Samsung SL-M5370LX User Manual Ver.1.0 (English) - Page 172
User Access Control
View all Samsung SL-M5370LX manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 172 highlights
SyncThru™ Web Service • Network Security: From the SyncThru™ Web Service, select the Security tab > Network Security. - Digital Certificate: You can manage digital certificates. A digital certificate is an electronic certificate that verifies the secure association between communication nodes. You need to add the certificate for SSL communication. This feature is also available from the machine (see "Network Security" on page 335). - Secure Connection: You can enable or disable secure connection to use more enhanced secure network channel. For secure communication, using the Secure Connection feature is recommended. - SNMPv3: You can set SNMPv3. - IP Security: You can set IP security settings. - IP/MAC Filtering: You can set filtering options for IP and MAC addresses. If the administrator does not add a filtering rule for IPv4, IPv6, and MAC addresses, nothing is filtered. If the administrator has added a filtering rule, filtering will be applied to the entered IPv4, IPv6, and MAC addresses. - IPv4 Filtering: You can enable/disable IPv6 filtering as well as manage filtering rules. This feature is also available from the machine (see "Network filtering settings" on page 346). - IPv6 Filtering: You can enable/disable IPv6 filtering as well as manage filtering rules. This feature is also available from the machine (see "Network filtering settings" on page 346). - MAC Filtering: You can enable/disable Mac filtering as well as manage filtering rules. This feature is also available from the machine (see "Network filtering settings" on page 346). - 802.1x: You can enable/disable 802.1x Security as well as manage filtering rules. This feature is also available from the machine (see "802.1x" on page 334). • External Authentication Server: Set the servers for authentication. • 802.1x: You can enable 802.1x authentication, which is a port-based authentication. If this authentication is enabled, the machine is not allowed to access through the protected side of the network until the machine is authorized. Use this feature to protect your network. This feature is also available from the machine (see "802.1x" on page 334). • User Access Control: You can restrict users from accessing the machine or application. You can also give specific permission for user to only use certain feature of the machine. For example, you can allow user A to only use print feature. In this case, user A will not be able to scan, copy or fax with the machine. - Authentication (Activating access control): You can choose the authentication method for user authentication. Select a mode and click on the Options button. This feature is also available from the machine (see "Authentication" on page 324). - Authorization (Giving rights): You can give permissions to a user to only use certain features of the machine. - Authority Management: You can give different rights to different users. For example, you can allow user A to use all the machine's functions while giving user B only the right to print. - Accounting: You can manage accounts. 8. Management tools 172