Dixon Aficio 1515 User Manual
Remote Maintenance by telnet
85
9
-
-
-
-Address
❖
❖
❖
❖ Subnet Mask
A number used to numerically
“mask” or hide the IP address on
the network by eliminating those
parts of the address that are alike
for all machines on the network.
“mask” or hide the IP address on
the network by eliminating those
parts of the address that are alike
for all machines on the network.
❖
❖
❖
❖ Broadcast address
A specified address for sending
data to specific devices on the net-
work.
data to specific devices on the net-
work.
Note
❒ To get the above addresses, contact
your network administrator.
❒ If you do not know the address to
configure, use the machine's de-
fault.
fault.
❒ The Ethernet interface and IEEE
802.11b interface share the same
TCP/IP address. When changing
interfaces, the former interface set-
ting is applied to the new interface.
TCP/IP address. When changing
interfaces, the former interface set-
ting is applied to the new interface.
❒ When installing the optional 1394
interface board, set the subnet so it
does not overlap with the Ethernet
interface or the IEEE 1394 inter-
face.
does not overlap with the Ethernet
interface or the IEEE 1394 inter-
face.
Access control
Use the “access” command to view
and configure access control. You can
also specify two or more access rang-
es.
and configure access control. You can
also specify two or more access rang-
es.
❖
❖
❖
❖ Reference
msh> access
❖
❖
❖
❖ Configuration
msh> access
✩ range start-
address end-address
•
✩ represents a target number
between 1 and 5. (Up to five ac-
cess ranges can be registered
and selected.)
between 1 and 5. (Up to five ac-
cess ranges can be registered
and selected.)
Example: To specify accessible IP
addresses between 192.168.0.10
and 192.168.0.20:
msh> access 1 range
192.168.0.10 192.168.0.20
addresses between 192.168.0.10
and 192.168.0.20:
msh> access 1 range
192.168.0.10 192.168.0.20
Note
❒ The access range restricts the
workstations from which print-
ing is possible by means of an
address. If you do not need to
restrict printing, make the set-
ting “0.0.0.0”.
ing is possible by means of an
address. If you do not need to
restrict printing, make the set-
ting “0.0.0.0”.
❒ The entry is invalid if the start
address is greater than the end
address.
address.
❒ Up to five access ranges can be
specified. The entry is invalid if
the target number is omitted.
the target number is omitted.
❒ Sessions other than those from a
Web browser or telnet are limit-
ed by access control.
ed by access control.