SyncThru™ Web Service | 196
Security tab
The security tab has System Security, Network Security, User Access Control and System Log.
You cannot access this tab if you do not log-in as an administrator (see "Logging into SyncThru™
Web Service" on page 194).
• System Security: From the SyncThru™ Web Service, select the Security tab > System Security.
- System Administrator: Enter the system administrator’s information. The machine sends
email notification to the email address set here. This feature is also available from the
machine.
- Feature Management: Specifies the services, PC application security, physical ports, and
network protocol features to use. Select the features to use, and then click Apply.
- Information Hiding: Specifies which information to hide. Select the amount of information
that you want to hide, and then click Apply.
- Restart Device: You can reboot your machine. Click the Restart Now button to reboot.
- Menu Management: You can enable/disable network menu. Check the menu you want to
enable, and then click Apply.
• Network Security: From the SyncThru™ Web Service, select the Security tab > Network
Security.
- Digital Certificate: You can manage digital certificates. A digital certificate is an electronic
certificate that verifies the secure association between communication nodes. You need to
add the certificate for SSL communication.
- Secure Connection: You can enable or disable secure connection to use more enhanced
secure network channel. For secure communication, using the Secure Connection feature is
recommended.
- SNMPv3: You can set SNMPv3.
- IP Security: You can set IP security settings.
- IP/MAC Filtering: You can set filtering options for IP and MAC addresses. If the administrator
does not add a filtering rule for IPv4, IPv6, and MAC addresses, nothing is filtered. If the
administrator has added a filtering rule, filtering will be applied to the entered IPv4, IPv6, and
MAC addresses.
▪ IPv4 Filtering: You can enable/disable IPv4 filtering as well as manage filtering rules.
▪ IPv6 Filtering: You can enable/disable IPv6 filtering as well as manage filtering rules.
▪ MAC Filtering: You can enable/disable Mac filtering as well as manage filtering rules.
- 802.1x(External): You can enable/disable 802.1x Security as well as manage filtering rules.
• System Log: You can keep logs of events that have happened in the machine. The administrator
can record and manage the machine usage information by keeping the system log files. The
system log files are stored on the machine’s mass storage device (hard disk), and when it is full,
it will erase old data. Export and save the important audit data separately using the exporting
feature.
- Log configuration: You can enable or disable keeping logs. You can also backup log files by
periods and transfer to a repository server.
- Log Viewer: You can view, delete, and search log files.