Environment Confirmation; Settings For Access Mode In Sites; Logging Into Other Domains At Multi-Domain - Canon imageRUNNER ADVANCE 8105 Series Service Manual

Hide thumbs Also See for imageRUNNER ADVANCE 8105 Series:
Table of Contents

Advertisement

2
Technology > MEAP > Login Service > Environment confirmation

Settings for access mode in sites

Switching between site internal access mode/ non site internal access mode, as well as
detailed mode settings, are done via DMS or iWEMC. Site internal access mode settings
window (DMS)
The figure below shows a sample of processing Access Mode in Sites.
Sample of Processing Access Mode in Sites
Domain X
4.Access Active
4.Access Active
Directory of same
Directory of same
site
site
DNS Server A
records:
DC-Tokyo/DNS
AD 192.168.1.2
172.24.12.2
AD 172.24.12.2
AD 172.24.35.2
2.Get Active
2.Get Active
AD 211.111.1.30
Directory list
Directory list
SSO-Tokyo 172.24.12.80
SSO-Osaka 192.168.1.90
SSO-Hakata 211.111.1.3
3. Access Active
3. Access Active
Directory of same
Directory of same
subnet
subnet
Site:Tokyo
172.12.12.0/24
DC-Osaka/DNS
172.24.35.0/24
172.168.1.2
SSO-Tokyo
192.168.1.90
Site:Osaka
192.168.1.0/24
2
Technology > MEAP > Login Service > Environment confirmation
F-2-273
F-2-273
Site:Tokyo::
172.24.12.0/24
172.24.35.0/24
1. When making initial
1. When making initial
Site:Osaka::
settings, obtain site list
settings, obtain site list
192.168.1.0/24
and ascertain which
and ascertain which
site the device
site the device
belongs to.
Site:Hakata::
belongs to.
SSO-Tokyo
211.111.1.0/24
172.24.12.80
DC-Hakata/DNS
211.111.1.30
SSO-Tokyo
211.111.1.3
Site:Hakata
211.111.1.0/24
F-2-274
F-2-274
1) SSO-Tokyo acquires site lists from Active Directories.
Note, however, that the Active Directories accessed in order to acquire site lists are in the
order in which they were returned by DNS, so there is no guarantee that the same Active
Directory will be accessed as in the initial settings (upon device settings or changes to NW
settings, etc.).
[Site subnet list]
Site: Tokyo: = 172.24.12.0/24, 172.24.35.0/24
Site: Osaka: = 192.168.1.0/24
Site: Hakata: = 211.111.1.0/24
As a result, since SSO-Tokyo is 172.24.12.80, the subnet is 172.24.12.0/24, and is judged
as belonging to site Tokyo.
2) The DNS server obtains its Active Directory list from the primary or secondary DNS, as set
in the device.
[Active Directory]
172.24.12.2, 172.24.35.2, 192.168.1.2, 211.111.1.30
3) Of the Active Directories in 2), above, the ones that belong to the same site (Tokyo) are
172.24.12.2 and 172.24.35.2.
Of these, the Active Directory that is the same subnet as SS-Tokyo is 172.24.12.2.
Therefore, this one will be accessed.
4) If access fails at step 3), above, the other Active Directory of the same site, 172.24.35.2,
will be accessed.
5) If access fails at step 4), above, also, SSO-Osaka and SSO-Hakata will be accessed (the
order will depend on the order of the Active Directories in DNS). Note, however, that this is
an optional operation.

Logging into other domains at multi-domain

At multi-domain, if another domain is logged into, based on the site/ subnet information
retrieved in the home domain, the Active Directories of the login destination domain/ KDC
address list are computed. In the event that the domain controller IP addresses of other
domains are outside of the site access range, and only the domain controller within the site
is programmed for access, an error message will be displayed to the effect that the site
information is incorrect.

Environment confirmation

Refer to the section of "Checking the Operating Environment" of this manual for system
requirements needed in each login service.
2-198
2-198

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents