CNET ecopy Printer/Fax/Scanner/Copier User Manual

Page 61

Advertising
background image

System Settings

53

3

Subnet Mask

When a fixed IP address is as-
signed to this machine on the net-
work you use, enter the subnet
mask to this item in the form of
xxx.xxx.xxx.xxx (xxx:0 through
255).
Do not specify this item manually
when you use this machine on a
DHCP environment, because this
item is automatically assigned to
this machine by selecting " DHCP "
for [Network Boot].

Default Gateway Address

When a fixed IP address is as-
signed to this machine on the net-
work you use, enter the default
gateway address to this item in the
form of xxx.xxx.xxx.xxx (xxx:0
through 255).
Do not specify this item manually
when you use this machine on a
DHCP environment, because this
item is automatically assigned to
this machine by selecting " DHCP "
for [Network Boot].

Access Control and Access Mask

Use these setup items together to
determine which of client comput-
ers has right to access this machine
w h e n i t w o r k s a s a n e t w o r k
TWAIN scanner.
Each of the client computers is
granted or denied its access to this
machine by its IP address, which is
determined by an access control
entry and an access mask entry in
combination. An access control en-
try is used as a reference value of
the IP address, while an access
mask entry determines the range
of the IP addresses.
• Access control is the value that

becomes the reference for re-
stricting the client that uses this
product as a network TWAIN
scanner

• Access mask is the value to

specify the restriction range. It
is collated (logically multiplied)
with access control to limit cli-
ents that can use this product as
a network TWAIN scanner.

Specify both the access control and
the access mask in the form of
xxx.xxx.xxx.xxx (xxx:0 through
255).

Note

❒ When you want to set no limita-

tion of access to this machine,
leave these settings as their de-
fault values.

❒ When an IP address of a client

computer falls within the logi-
cal products of the access con-
trol entry and the access mask
entry, the client computer is
granted its access to this ma-
chine.

❒ For example, a client computer

that has an IP address within
the range shown under “Ac-
cess-enabled IP address” col-
umn in the following table has
right to access this machine, in
accordance with the entry of the
access mask to the left, when
you set the access control to
192.168.15.18. In the following
table, “xxx” means any value is
available.

Access mask en-

try

Access-enabled

IP address

000.000.000.000

xxx.xxx.xxx.xxx

255.255.000.000

192.168.xxx.xxx

255.255.240.000

192.168.0.xxx
∼192.168.15.xxx

255.255.255.000

192.168.15.xxx

255.255.255.240

192.168.15.16
∼192.168.15.31

255.255.255.255

192.168.15.18

www.cnet.ie

Advertising