Samsung SL-X7400GX Manual De Usuario

Descargar
Página de 428
SyncThru™ Web Service
189
8. Management Tools
-
IPv6 Filtering: You can enable/disable IPv6 filtering as well as manage 
filtering rules. This feature is also available from the machine (see 
"Network filtering settings" on page 347).
-
MAC Filtering: You can enable/disable Mac filtering as well as manage 
filtering rules. This feature is also available from the machine (see 
"Network filtering settings" on page 347).
-
802.1xYou can enable/disable 802.1x Security as well as manage 
filtering rules. This feature is also available from the machine (see 
"802.1x" on page 336).
External Authentication Server: Set the servers for authentication.
802.1x: You can enable 802.1x authentication, which is a port-based 
authentication. If this authentication is enabled, the machine is not allowed 
to access through the protected side of the network until the machine is 
authorized. Use this feature to protect your network. This feature is also 
available from the machine (see "802.1x" on page 336).
User Access Control: You can restrict users from accessing the machine or 
application. You can also give specific permission for user to only use certain 
feature of the machine. For example, you can allow user A to only use print 
feature. In this case, user A will not be able to scan, copy or fax with the 
machine.
-
Authentication (Activating access control): You can choose the 
authentication method for user authentication. Select a mode and click 
on the Options button. This feature is also available from the machine 
(see "Authentication" on page 325).
-
Authorization (Giving rights)You can give permissions to a user to 
only use certain features of the machine.
-
Authority Management: You can give different rights to different 
users. For example, you can allow user A to use all the machine’s 
functions while giving user B only the right to print. 
-
Accounting: You can manage accounts.
-
User profile: You can store user information on the machine’s hard 
drive. You can use this feature to manage the users using the machine. 
You can also group the users and manage them as a group. You can add 
up to 1,000 entries. User identified by user ID and password are allowed 
to modify their password. They are allowed to view all of their profile 
information. When it comes to the role, users are allowed to see only the 
role they belong to but not its permissions.
System Log: You can keep logs of events that have happened in the 
machine. The administrator can record and manage the machine usage 
information by keeping the system log files. The system log files are stored 
on the machine’s HDD (hard disk drive), and when it is full, it will erase old 
data. Export and save the important audit data separately using the 
exporting feature.
-
Log configuration: You can enable or disable keeping logs. You can 
also backup log files by periods and transfer to a repository server. 
-
Log Viewer: You can view, delete, and search log files.