Samsung MultiXpress SL-K3250 User Guide - Page 267

External User Authority

Page 267 highlights

SyncThru™ Web Service - Secure Connection: You can enable or disable secure connection to use more enhanced secure network channel. For secure communication, using the Secure Connection feature is recommended. - SNMPv3: You can set SNMPv3. - IP Security: You can set IP security settings. - IP/MAC Filtering: You can set filtering options for IP and MAC addresses. If the administrator does not add a filtering rule for IPv4, IPv6, and MAC addresses, nothing is filtered. If the administrator has added a filtering rule, filtering will be applied to the entered IPv4, IPv6, and MAC addresses. ▪ IPv4 Filtering: You can enable/disable IPv4 filtering as well as manage filtering rules. ▪ IPv6 Filtering: You can enable/disable IPv6 filtering as well as manage filtering rules. ▪ MAC Filtering: You can enable/disable Mac filtering as well as manage filtering rules. - 802.1x(Ethernet): You can enable/disable 802.1x Security as well as manage filtering rules. - External Authentication Server: Set the servers for authentication. • User Access Control: You can restrict users from accessing the machine or application. You can also give specific permission for user to only use certain feature of the machine. For example, you can allow user A to only use print feature. In this case, user A will not be able to scan, copy or fax with the machine. - Authentication: You can choose the authentication method for user authentication. Select a mode and click on the Options button. - Authorization (Giving rights): You can give permissions to a user to only use certain features of the machine. ▪ Authority Management: You can give different rights to different users. For example, you can allow user A to use all the machine's functions while giving user B only the right to print. ▪ External User Authority: Set the servers for authentication. - Accounting: You can manage accounts. - User profile: You can store user information on the machine's hard drive. You can use this feature to manage the users using the machine. You can also group the users and manage them as a group. You can make a maximum of 500 individual users and 200 user groups. • System Log: You can keep logs of events that have happened in the machine. The administrator can record and manage the machine usage information by keeping the system log files. The system log files are stored on the machine's mass storage device (hard disk), and when it is full, it will erase old data. Export and save the important audit data separately using the exporting feature. - Log configuration: You can enable or disable keeping logs. You can also backup log files by periods and transfer to a repository server. - Log Viewer: You can view, delete, and search log files. 13. Useful Tools 267

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432

SyncThru™ Web Service
267
13. Useful Tools
-
Secure Connection:
You can enable or disable secure connection to
use more enhanced secure network channel. For secure
communication, using the
Secure Connection
feature is
recommended.
-
SNMPv3:
You can set SNMPv3.
-
IP
Security:
You can set IP security settings.
-
IP/MAC Filtering:
You can set filtering options for IP and MAC
addresses. If the administrator does not add a filtering rule for IPv4, IPv6,
and MAC addresses, nothing is filtered. If the administrator has added a
filtering rule, filtering will be applied to the entered IPv4, IPv6, and MAC
addresses.
IPv4 Filtering:
You can enable/disable IPv4 filtering as well as
manage filtering rules.
IPv6 Filtering:
You can enable/disable IPv6 filtering as well as
manage filtering rules.
MAC Filtering:
You can enable/disable Mac filtering as well as
manage filtering rules.
-
802.1x(Ethernet):
You can enable/disable 802.1x Security as well as
manage filtering rules.
-
External Authentication Server:
Set the servers for authentication.
User Access Control:
You can restrict users from accessing the machine or
application. You can also give specific permission for user to only use certain
feature of the machine. For example, you can allow user A to only use print
feature. In this case, user A will not be able to scan, copy or fax with the
machine.
-
Authentication:
You can choose the authentication method for user
authentication. Select a mode and click on the
Options
button.
-
Authorization
(Giving rights)
:
You can give permissions to a user to
only use certain features of the machine.
Authority Management:
You can give different rights to different
users. For example, you can allow user A to use all the machine’s
functions while giving user B only the right to print.
External User Authority:
Set the servers for authentication.
-
Accounting:
You can manage accounts.
-
User profile:
You can store user information on the machine’s hard
drive. You can use this feature to manage the users using the machine.
You can also group the users and manage them as a group. You can
make a maximum of 500 individual users and 200 user groups.
System Log:
You can keep logs of events that have happened in the
machine. The administrator can record and manage the machine usage
information by keeping the system log files. The system log files are stored
on the machine’s mass storage device (hard disk), and when it is full, it will
erase old data. Export and save the important audit data separately using
the exporting feature.
-
Log configuration:
You can enable or disable keeping logs. You can
also backup log files by periods and transfer to a repository server.
-
Log Viewer:
You can view, delete, and search log files.