Network setup, Security, Access control – Samsung SCX-6555N-XBG User Manual
Page 84: 84 network setup 84
84 _Machine status and advanced setup
NETWORK SETUP
You may set up the network with the machine's touch screen. Before doing
that, you must have the information concerning the type of network
protocols and computer system you use. If you are not sure which setting to
use, contact your network administrator to configure this machine network.
1. Press Machine Setup on the control panel.
2. Press Admin Setting. When the login message pops up, enter
password and press OK.
3. Press the Setup tab > Network Setup.
SECURITY
This feature lets you control and lock all outgoing data, or change the
password.
1. Press Machine Setup on the control panel.
2. Press Admin Setting. When the login message pops up, then enter
password and press OK.
3. Press the Setup tab > Security.
Access Control
.
OPTION
DESCRIPTION
TCP/IP Protocol
Select appropriate protocol and configure
parameters to use the network environment.
There are lots of parameters to be set,
therefore, if you are not sure, leave as it is,
or consult the network administrator.
Apple Talk
Protocol
For Macintosh network environments, select this
option. This option provides packet transmission
and routing functionality for networking.
Ethernet Speed
Configure the network transmission speed.
Clear Setting
Reverts the network settings to the default values.
802.1x
You can select the user authentication for network
communication.
For details information consult the network
administrator.
IPv6
Machine supports IPv6 addresses for network
printing and managements.
•
IPv6 Activate: When you select On, the Host
Name and Link-Local Address will
automatically be entered into the address field.
•
DHCPv6 Configuration: If you have a
DHCPv6 server on your network, you can set
one of the option for default dynamic host
configuration.
•
Routers: Use DHCPv6 only when
requested by a router.
•
DHCPv6 Addresses: Always use DHCPv6
regardless of router request.
•
DHCPv6 Off: Never use DHCPv6
regardless of router request.
•
Using SyncThru™ Web Service, administrators can classify
users into several groups according to each user’s role. Each
user’s authorization, authentication and accounting will be
controlled by the group’s role definition. For example, if a group
A only has authorization to use the copy function, users in
group A can only copy with the machine: they cannot fax or
scan. You can set this feature from SyncThru™ Web Service.
Click Security > User Access Control > Authority.
•
When the Single Sign-On (SSO) feature is enabled, users just
need to log in to the service only one time. Then the system
automatically checks the user’s authority based on the user ID
and password. The SSO feature is related to all of the security
functions such as authentication, authorization and accounting.
The SSO feature can be configured from SyncThru™ Web
Service. Log in to the SyncThru™ Web Service as an
administrator. (See "Managing your machine from the
website" on page 96.) And click Security > User Access
Control > Authentication> Options.