Measures to Prevent Unauthorized Access

Be sure to read this section before using the machine in a network environment.
Printers and multifunction machines can provide various useful functions when connected to a network. However, because this also creates risks of unauthorized access and eavesdropping over the network, measures against security risks are essential.
This section provides examples of measures against unauthorized access that you can implement during setup when using the machine in a network environment.
There are additional measures against security risks you can implement on the machine, such as restricting communication with a firewall and using TLS encrypted communication to prevent eavesdropping and tampering. Take the necessary measures according to your usage environment. Security

Using a Private IP Address

There are two types of IP addresses: a global IP address, which is used for connecting to the Internet, and a private IP address, which is used in a local area network such as a company LAN.
If a global IP address is assigned to the machine, the machine can be accessed by users on the Internet. Thus, the risk of information leakage due to unauthorized access from external network increases.
On the other hand, if a private IP address is assigned to the machine, access to the machine is restricted to only users on your local area network. Therefore, it reduces the risk of unauthorized access compared to an assigned global IP address.
Basically, assign a private IP address to the machine.
A private IP address is used in one of the following ranges.
Ranges for Private IP Addresses
From 10.0.0.0 to 10.255.255.255
From 172.16.0.0 to 172.31.255.255
From 192.168.0.0 to 192.168.255.255
For details about how to assign and confirm the IP address, see the following:
Setting IPv4 Addresses
Setting IPv6 Addresses
 
If you want to assign a global IP address to the machine, you can create an environment to prevent outside access, such as by using a firewall, to reduce the risk of unauthorized access. Contact your network administrator about how to implement network security.

Using a PIN to Protect Information

By setting up a PIN to protect the information stored in the machine, you can reduce the risk of information leakage or unauthorized use if a malicious third party attempts to gain unauthorized access.
You can set a PIN to the functions indicated below. Only users who know the PIN can use these functions and access the information on the machine.
Remote UI
You can require the user to enter the Remote UI Access PIN when using Remote UI.
Setting the PIN to Use for Remote UI
System Manager ID
You can require the user to enter the System Manager ID and System Manager PIN, when changing any important settings.
Setting the Department ID and PIN for the Administrator
Address Book
You can require the user to enter the Address Book PIN when adding new entries and editing existing ones.
Restricting Address Book Registration and Editing by Setting a PIN

Precautions When Using Remote UI

Do not access other websites when using Remote UI.
After using Remote UI, be sure to log out and close your browser.
84CS-08J