Ricoh IS300e Operating Instructions Manual page 61

Ricoh image scanner operating instructions
Table of Contents

Advertisement

❖ ❖ ❖ ❖ Subnet Mask
When a fixed IP address is as-
signed to this machine on the net-
work you use, enter the subnet
mask to this item in the form of
xxx.xxx.xxx.xxx (xxx:0 through
255).
Do not specify this item manually
when you use this machine on a
DHCP environment, because this
item is automatically assigned to
this machine by selecting " DHCP "
for [Network Boot].
❖ ❖ ❖ ❖ Default Gateway Address
When a fixed IP address is as-
signed to this machine on the net-
work you use, enter the default
gateway address to this item in the
form of xxx.xxx.xxx.xxx (xxx:0
through 255).
Do not specify this item manually
when you use this machine on a
DHCP environment, because this
item is automatically assigned to
this machine by selecting " DHCP "
for [Network Boot].
❖ ❖ ❖ ❖ Access Control and Access Mask
Use these setup items together to
determine which of client comput-
ers has right to access this machine
w h e n i t w o r k s a s a n e t w o r k
TWAIN scanner.
Each of the client computers is
granted or denied its access to this
machine by its IP address, which is
determined by an access control
entry and an access mask entry in
combination. An access control en-
try is used as a reference value of
the IP address, while an access
mask entry determines the range
of the IP addresses.
• Access control is the value that
becomes the reference for re-
stricting the client that uses this
product as a network TWAIN
scanner
• Access mask is the value to
specify the restriction range. It
is collated (logically multiplied)
with access control to limit cli-
ents that can use this product as
a network TWAIN scanner.
Specify both the access control and
the access mask in the form of
xxx.xxx.xxx.xxx (xxx:0 through
255).
Note
❒ When you want to set no limita-
tion of access to this machine,
leave these settings as their de-
fault values.
❒ When an IP address of a client
computer falls within the logi-
cal products of the access con-
trol entry and the access mask
entry, the client computer is
granted its access to this ma-
chine.
❒ For example, a client computer
that has an IP address within
the range shown under "Ac-
cess-enabled IP address" col-
umn in the following table has
right to access this machine, in
accordance with the entry of the
access mask to the left, when
you set the access control to
192.168.15.18. In the following
table, "xxx" means any value is
available.
Access mask en-
try
000.000.000.000
255.255.000.000
255.255.240.000
255.255.255.000
255.255.255.240
255.255.255.255
System Settings
Access-enabled
IP address
xxx.xxx.xxx.xxx
192.168.xxx.xxx
192.168.0.xxx
∼192.168.15.xxx
192.168.15.xxx
192.168.15.16
∼192.168.15.31
192.168.15.18
53
3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

402252 - is 300e

Table of Contents