Ricoh MP C2003 Series User Manual
Hide thumbs Also See for MP C2003 Series:
Table of Contents

Advertisement

Quick Links

Read This First
Manuals Provided with This Machine
Safety Information for This Machine
Other Information for This Machine
Appendix
Please look at the on-screen instruction manual (included in the
attached CD-ROM), the manual provided on this company's
website, or the manual viewable via the Smart Operation Panel
for information not included in the paper instruction manual.
Read this manual carefully before you use this machine and keep
it handy for future reference. For safe and correct use, be sure to
read the Safety Information in this manual before using the
machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh MP C2003 Series

  • Page 1 Read This First Manuals Provided with This Machine Safety Information for This Machine Other Information for This Machine Appendix Please look at the on-screen instruction manual (included in the attached CD-ROM), the manual provided on this company's website, or the manual viewable via the Smart Operation Panel for information not included in the paper instruction manual.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS How to Read the Manuals..........................2 Symbols Used in the Manuals........................2 Disclaimer................................2 Notes................................3 Machine Types............................... 3 1. Manuals Provided with This Machine Manuals for This Machine..........................5 Manuals List..............................7 How to Use the Operating Instructions......................9 Formats of the Operating Instructions......................
  • Page 4: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 5: Notes

    In no event will the manufacturer be responsible for any documents created by you using this machine or any results from the data executed by you. Notes Contents of this manual are subject to change without prior notice. The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products.
  • Page 7: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 8 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 9: Manuals List

    Manuals for This Machine • Manuals provided are specific to machine types. • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian. • You can download information about the machine's certification, which is based on an IT security certification system (hereafter CC Certification), from http://support-download.com/services/ device/ccmanual/mp_c2003_c2503/en/download_admin.html and http://support- download.com/services/device/ccmanual/mp_c2003_c2503/en/download_user.html.
  • Page 10 1. Manuals Provided with This Machine Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided Print Scan Connecting the Machine/ System Settings PostScript 3 Extended Feature Settings Security Guide Driver Installation Guide Quick Reference Copy Guide Quick Reference FAX Guide Quick Reference Scanner Guide *1 These manuals are available on our website or from authorized dealers.
  • Page 11: How To Use The Operating Instructions

    How to Use the Operating Instructions How to Use the Operating Instructions This chapter describes the operating instructions of this machine. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: • Printed manuals •...
  • Page 12: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 13 How to Use the Operating Instructions • Driver Installation Guide is included in the following folder on the supplied driver CD-ROM: MANUAL_DRIVER\(language) Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. To read Driver Installation Guide, click [Driver Installation Guide].
  • Page 14 1. Manuals Provided with This Machine...
  • Page 15: Safety Information For This Machine

    2. Safety Information for This Machine This chapter describes the safety precautions. Safety Information Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury.
  • Page 16: Handling Power Cords And Power Cord Plugs

    2. Safety Information for This Machine • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. • Do not place heavy objects on the machine. Doing so can cause the machine to topple over, possibly resulting in injury.
  • Page 17 Safety Information • Do not use power cords that are damaged, broken, or modified. Also, do not use power cords that have been trapped under heavy objects, pulled hard, or bent severely. Doing so could result in fire or electric shock. •...
  • Page 18: Handling The Main Machine

    2. Safety Information for This Machine • Be sure to disconnect the power cord from the wall outlet at least once a year and check for the following: • The power cord's inner wires are exposed, broken, etc. • The power cord's coating has a crack or dent. •...
  • Page 19 Safety Information • Be sure to locate the machine as close as possible to a wall outlet. This will allow easy disconnection of the power cord in the event of an emergency. • If the machine emits smoke or odours, or if it behaves unusually, you must turn off its power immediately.
  • Page 20 2. Safety Information for This Machine • After you move the machine, use the caster fixture to fix it in place. Otherwise the machine might move or come down to cause an injury. • If the lower paper tray is installed, do not pull out more than one tray at a time when you are changing or replenishing paper or resolving paper jams.
  • Page 21 Safety Information • Some of this machine's internal components get very hot. For this reason, take care when removing misfed paper. Not doing so could result in burns. • When removing jammed paper, make sure not to trap or injure your fingers. •...
  • Page 22 2. Safety Information for This Machine • The following explains the warning messages on the plastic bag used in this product's packaging. • Keep the polythene materials (bags, etc.) supplied with this machine away from babies and small children at all times. Suffocation can result if polythene materials are brought into contact with the mouth or nose.
  • Page 23 Safety Information • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your skin. If toner comes into contact with your skin, wash the affected area thoroughly with soap and water. • Do not attempt to print on stapled sheets, aluminum foil, carbon paper, or any kind of conductive paper.
  • Page 24: Safety Labels Of This Machine

    2. Safety Information for This Machine Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated.
  • Page 25 Safety Labels of This Machine Paper trays DAR002 1, 2, and 3. The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 26: Power Switch Symbols

    2. Safety Information for This Machine Internal Finisher SR3180 DAR003 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. Power Switch Symbols The meanings of the symbols for the switches on this machine are as follows: •...
  • Page 27: Other Information For This Machine

    3. Other Information for This Machine This chapter describes laws and regulations related to this machine. Laws and Regulations Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 28 (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Responsible party: Ricoh Americas Corporation Address: 5 Dedrick Place, West Caldwell, NJ 07006 Telephone number: 973-882-2000...
  • Page 29 7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is causing problems with your telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved.
  • Page 30: Important Safety Instructions For Facsimile Unit

    3. Other Information for This Machine contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual.
  • Page 31: Notes To Canadian Users Of Facsimile Unit

    Laws and Regulations Notes to Canadian Users of Facsimile Unit This product meets the applicable Industry Canada technical specifications. The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.
  • Page 32: Other Information

    3. Other Information for This Machine Other Information Notes to users in the state of California (Notes to Users in USA) Perchlorate Material - special handling may apply. See: www.dtsc.ca.gov/hazardouswaste/ perchlorate...
  • Page 33: Appendix

    4. Appendix This appendix describes trademarks for the machine. Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the United States and other countries.
  • Page 34 4. Appendix • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition • The product names of Windows Server 2003 R2 are as follows: ®...
  • Page 35 © 2013...
  • Page 36 D176-7513...
  • Page 37: User Guide

    User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. For safe and correct use, be sure to read the Safety Information in "Read This First"...
  • Page 39 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine Reducing my Costs............................. 9 Converting Documents to Electronic Formats Easily..................10 Registering Destinations...........................11 Operating the Machine More Effectively......................
  • Page 40 Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel)................................44 Changing the Display Language........................46 Changing the Display Language (When Using the Smart Operation Panel)......... 46 How to Use the [Home] Screen (When Using the Standard Operation Panel)......... 47 Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)......
  • Page 41 Copying onto Envelopes from the Bypass Tray..................85 Copying onto Envelopes from the Paper Tray...................86 Sort..................................87 Changing the Number of Sets........................88 Storing Data in the Document Server......................90 4. Fax Basic Procedure for Transmissions (Memory Transmission)................91 Sending Originals Using the Exposure Glass (Memory Transmission)........... 93 Registering a Fax Destination........................94 Deleting a Fax Destination..........................
  • Page 42 Saving and Printing Using the Document Server..................115 Storing Documents in Document Server....................115 Managing Documents Stored in Document Server................116 6. Scan Basic Procedure When Using Scan to Folder..................... 117 Creating a Shared Folder on a Computer Running Windows/Confirming a Computer's Information..................................
  • Page 43 Sending Faxes or Scanned Documents When Toner Has Run Out............169 Disposing of Used Toner...........................169 10. Troubleshooting When a Status Icon Is Displayed........................171 When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing............. 173 When the Machine Makes a Beeping Sound.....................175 When You Have Problems Operating the Machine...................176 When Multiple Functions Cannot Be Executed Simultaneously............
  • Page 44: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 45: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. DAT014 The following information is region-specific.
  • Page 46: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder...
  • Page 47: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a description by what you want to do. Reducing my Costs BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server. Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax)) See "Combined Copying", Copy/ Document Server.
  • Page 48: Converting Documents To Electronic Formats Easily

    1. What You Can Do with This Machine Converting Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan. Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan.
  • Page 49: Registering Destinations

    Registering Destinations Registering Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax. See "Registering a destination in the address book manually", Scan. Using Web Image Monitor to register destinations from a computer See "Registering Internet Fax Destination Information Using Web Image Monitor", Fax.
  • Page 50: Operating The Machine More Effectively

    1. What You Can Do with This Machine Operating the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions. Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Fax/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions. Registering frequently-used printing settings to the printer driver See "Using One Click Presets", Print.
  • Page 51: Customizing The [Home] Screen

    Customizing the [Home] Screen Customizing the [Home] Screen The icons of each function are displayed on the [Home] screen. CUM001 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons. •...
  • Page 52: Making Copies Using Various Functions

    1. What You Can Do with This Machine Making Copies Using Various Functions CJQ601 • You can make copies in full color. You can switch the color copy mode depending on the type of originals used and the desired finish. See "Copying in Color", Copy/ Document Server.
  • Page 53 Making Copies Using Various Functions • The finisher allows you to sort, staple, and punch holes in your copies. See "Finishing", Copy/ Document Server.
  • Page 54: Printing Data Using Various Functions

    1. What You Can Do with This Machine Printing Data Using Various Functions CJQ602 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 55: Utilizing Stored Documents

    Utilizing Stored Documents Utilizing Stored Documents You can store files scanned in copier, facsimile, printer, or scanner mode on the machine's hard disk. Web Image Monitor allows you to use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 56: Sending And Receiving Faxes Without Paper

    1. What You Can Do with This Machine Sending and Receiving Faxes without Paper Reception You can store and save received fax documents as electronic formats in the machine's hard disk without printing them. CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents).
  • Page 57 Sending and Receiving Faxes without Paper CJQ605 • To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer, and then specify the destination. • You can also check the sent image data. •...
  • Page 58: Sending And Receiving Faxes Via The Internet

    1. What You Can Do with This Machine Sending and Receiving Faxes via the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx CJQ606 E-mail Transmission and Reception This machine converts scanned document images to e-mail format, and transmits and receives the e-mail data over the Internet.
  • Page 59 Sending and Receiving Faxes via the Internet • For details about the machine's settings, see "Network Settings Requirements", Connecting the Machine/ System Settings.
  • Page 60: Sending And Receiving Faxes By Using The Machine Without Fax Unit Installed

    1. What You Can Do with This Machine Sending and Receiving Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). CJQ612 • To use the remote fax function, install the fax connection unit on the main-machine and sub- machine.
  • Page 61: Using The Facsimile And The Scanner In A Network Environment

    Using the Facsimile and the Scanner in a Network Environment Using the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax. See "Basic Procedure for Sending Scan Files by E-mail", Scan.
  • Page 62: Embedding Text Information In Scanned Files

    1. What You Can Do with This Machine Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document.
  • Page 63: Preventing Information Leakage (Security Functions)

    Preventing Information Leakage (Security Functions) Preventing Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 64: Centrally Controlling Scan Conditions And Distribution

    1. What You Can Do with This Machine Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data.
  • Page 65: Monitoring And Setting The Machine Using A Computer

    Monitoring and Setting the Machine Using a Computer Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 66: Preventing Unauthorized Copying

    1. What You Can Do with This Machine Preventing Unauthorized Copying You can print embedded patterns on printouts to prevent unauthorized copying. CUM003 • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy.
  • Page 67: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components Guide to Components (mainly Europe and Asia) • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components.
  • Page 68 2. Getting Started 3. Vents Prevent overheating. 4. Control panel See page 41 "Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel)" or page 44 "Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel)".
  • Page 69 Guide to Names and Functions of Components Front and right view DAT002 1. ADF's extender Pull this extender to support large paper. 2. Vents Prevent overheating. 3. Bypass tray Use to copy or print on OHP transparencies, adhesive labels, and paper that cannot be loaded in the paper trays.
  • Page 70: Guide To Components (Mainly North America)

    2. Getting Started 6. Lower right cover Open this cover when a paper jam occurs. 7. Right cover Open this cover when a paper jam occurs. Rear and left view DAT003 1. Vents Prevent overheating. Guide to Components (mainly North America) •...
  • Page 71 Guide to Names and Functions of Components Front and left view DAT001 1. ADF Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. 2.
  • Page 72 2. Getting Started 8. Paper trays (Trays 1–2) Load paper here. 9. Lower paper trays Load paper here. Front and right view DAT002 1. ADF's extender Pull this extender to support large paper. 2. Vents Prevent overheating. 3. Bypass tray Use to copy or print on OHP transparencies, adhesive labels, and paper that cannot be loaded in the paper trays.
  • Page 73 Guide to Names and Functions of Components 4. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 5. Extender Pull this extender out when loading sheets larger than A4 , 8 × 11 in the bypass tray.
  • Page 74: Guide To Functions Of The Machine's Options

    2. Getting Started Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options (mainly Europe) DAT005 1. Exposure glass cover Lower this cover over originals. 2. Lower paper tray Holds up to 550 sheets of paper. 3.
  • Page 75: Guide To Functions Of The Machine's External Options (Mainly Asia)

    Guide to Functions of the Machine's Options 5. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 6. Internal shift tray Sorts and stacks multiple sheets of paper. 7.
  • Page 76 2. Getting Started 1. Exposure glass cover Lower this cover over originals. 2. ADF Load a stack of originals here. They will feed in automatically. 3. Smart Operation Panel This control panel is provided with advanced operativity. 4. Lower paper tray Holds up to 550 sheets of paper.
  • Page 77: Guide To Functions Of The Machine's External Options (Mainly North America)

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options (mainly North America) DAT007 1. Smart Operation Panel This control panel is provided with advanced operativity. 2. Handset Used as a receiver when a fax unit is installed. Allows you to use the On Hook Dial and Manual Dial functions.
  • Page 78 2. Getting Started 6. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 7. Internal shift tray Sorts and stacks multiple sheets of paper. 8. External tray If you select this as the output tray, copied/printed paper and fax messages are delivered here face down. 9.
  • Page 79: Guide To The Names And Functions Of The Machine's Control Panel (When Using The Standard Operation Panel)

    Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel) Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel) This illustration shows the control panel of the machine with options fully installed. CUV012 1.
  • Page 80 2. Getting Started 5. [Program] key (copier, Document Server, facsimile, and scanner mode) • Press to register frequently used settings, or to recall registered settings. See "Registering Frequently Used Functions", Convenient Functions. • Press to program defaults for the initial display when modes are cleared or reset, or immediately after the main power switch is turned on.
  • Page 81 Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel) 18. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs. You can also display the job history and the machine's maintenance information. 19.
  • Page 82: Guide To The Names And Functions Of The Machine's Control Panel (When Using The Smart Operation Panel)

    2. Getting Started Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel) CXV208 1. [Home] key Press to display the [Home] screen. For details, see page 52 "How to Use the [Home] Screen (When Using the Smart Operation Panel)".
  • Page 83 Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel) 5. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs. You can also display the job history and the machine's maintenance information. 6.
  • Page 84: Changing The Display Language

    2. Getting Started Changing the Display Language You can change the language used on the display. English is set as default. Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. CXX005 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel.
  • Page 85: How To Use The [Home] Screen (When Using The Standard Operation Panel)

    How to Use the [Home] Screen (When Using the Standard Operation Panel) How to Use the [Home] Screen (When Using the Standard Operation Panel) The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen.
  • Page 86: Adding Icons To The [Home] Screen (When Using The Standard Operation Panel)

    2. Getting Started Press to switch pages when the icons are not displayed on one page. 7. Shortcut icon You can add shortcuts to programs or Web pages to the [Home] screen. For details about how to register shortcuts, see "Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)", Convenient Functions.
  • Page 87 How to Use the [Home] Screen (When Using the Standard Operation Panel) • You can register up to 72 function and shortcut icons. Delete unused icons if the limit is reached. For details see "Deleting an Icon on the [Home] Screen (When Using the Standard Operation Panel)", Convenient Functions.
  • Page 88 2. Getting Started Press [Edit Home]. Press [Add Icon]. Press the [Program] tab.
  • Page 89 How to Use the [Home] Screen (When Using the Standard Operation Panel) Make sure that [Copier Program] is selected. Select the program you want to add. Specify the position where [Blank] is displayed. Press [OK]. Press the [User Tools/Counter] key. •...
  • Page 90: How To Use The [Home] Screen (When Using The Smart Operation Panel)

    2. Getting Started How to Use the [Home] Screen (When Using the Smart Operation Panel) To display the [Home] screen, press the [Home] key on the control panel. One icon is assigned to each function, and these icons are displayed on the [Home] screen. You can add shortcuts to frequently used functions or Web pages to the [Home] screen.
  • Page 91: Adding Icons To The [Home] Screen (When Using The Smart Operation Panel)

    How to Use the [Home] Screen (When Using the Smart Operation Panel) 4. Icon display area Displays the function or application icons and widgets. Displayed icons differ between the five home screens. For details about icons on each screen, see "Main Icons on the [Home] Screen (When Using the Smart Operation Panel)", Getting Started.
  • Page 92 2. Getting Started Press [Application] or [Machine Application]. Press [Machine Application] to select copier mode, fax mode, or some other of the machine's applications. Press [Application] to select widgets, quick applications, or other Smart Operation Panel applications. Select the application you want to add from the list. Adding shortcuts to bookmarks on the [Home] screen (When using the Smart Operation Panel) You can add shortcuts to bookmarks that have been registered in favorites in the Web Browser to the...
  • Page 93 How to Use the [Home] Screen (When Using the Smart Operation Panel) Press the [Home] key. CZP155 Select the screen to which you want to add a shortcut. Press and hold down an area on the screen where no icons are displayed. Press [Icon] on the [Add to Home] screen.
  • Page 94 2. Getting Started Adding widgets to the [Home] screen (When using the Smart Operation Panel) You can add widgets to the [Home] screen to show the remaining amount of toner or change the display language. Press the [Home] key. CZP155 Select the screen to which you want to add a widget.
  • Page 95: Registering Functions In A Program

    Registering Functions in a Program Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Color mode, original type, density, Special Original, paper tray, Store File (except for User Name,...
  • Page 96 2. Getting Started CXX002 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [Copier] icon on the Home screen 4. Edit the copy settings so all functions you want to store in a program are selected.
  • Page 97 Registering Functions in a Program Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit]. • The number of characters you can enter for a program name varies depending on the functions as follows: •...
  • Page 98: Example Of Programs

    2. Getting Started • Program numbers with next to them already have settings made for them. • Programs can be registered to the [Home] screen, and can be recalled easily. For details, see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions and page 48 "Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)".
  • Page 99 Registering Functions in a Program Scanner mode Program name Program description Effect Easy PDF scan Select [Full Color: Text / Photo] in You can scan documents efficiently. [Scan Settings]. In [Send File Type / Name], select [PDF] under [File Type] and enter the business details such as "London branch: daily report"...
  • Page 100 2. Getting Started Program name Program description Effect Scan to XXXX Select e-mail or folder destinations If you register destinations and scan from the list that is registered in the settings that you use often, you can (replace XXXX by a machine's Address Book, and then skip the procedures to specify them destination name)
  • Page 101: Turning On/Off The Power

    Turning On/Off the Power Turning On/Off the Power The main power switch is on the right side of the machine. When this switch is turned on, the main power turns on and the main power indicator on the right side of the control panel lights up. When this switch is turned off, the main power turns off and the main power indicator on the right side of the control panel goes out.
  • Page 102: When The Authentication Screen Is Displayed

    2. Getting Started When the Authentication Screen is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 103: Logging In Using The Control Panel (When Using The Smart Operation Panel)

    When the Authentication Screen is Displayed Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging In Using the Control Panel (When Using the Smart Operation Panel) This section explains the procedure for logging in to the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 104: Logging Out Using The Control Panel (When Using The Standard Operation Panel)

    2. Getting Started Logging Out Using the Control Panel (When Using the Standard Operation Panel) This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set. • To prevent use of the machine by unauthorized persons, always log out when you have finished using the machine.
  • Page 105: Placing Originals

    Placing Originals Placing Originals Placing Originals on the Exposure Glass (mainly Europe and Asia) • Keep your hands away from the hinges and exposure glass when lowering the ADF. Not doing so may result in an injury if your hands or fingers are pinched. •...
  • Page 106: Placing Originals In The Auto Document Feeder

    2. Getting Started • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF. Be sure to lift the ADF by more than 30 degrees. Otherwise, the size of the original might not be detected correctly.
  • Page 107 Placing Originals Place the aligned originals squarely face up in the ADF. Do not stack originals beyond the limit mark. The first page should be on the top. CSN004 1. Limit mark 2. Original guide...
  • Page 108 2. Getting Started...
  • Page 109: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 110 3. Copy Make sure that no previous settings remain. When there are previous settings remaining, press the [Reset] key. Place the originals. Make desired settings. Enter the number of copies with the number keys. The maximum copy quantity that can be entered is 999. Press the [Start] key.
  • Page 111: Auto Reduce / Enlarge

    Auto Reduce / Enlarge Auto Reduce / Enlarge The machine automatically detects the original size and then selects an appropriate reproduction ratio based on the paper size you select. CKN008 • If you select a reproduction ratio after pressing [Auto Reduce / Enlarge], [Auto Reduce / Enlarge] is canceled and the image cannot be rotated automatically.
  • Page 112 3. Copy Press [Auto Reduce / Enlarge]. Select the paper size. Place the originals, and then press the [Start] key.
  • Page 113: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page. 2 Sided 2 Sided Copies one 2-sided page on one 2-sided page.
  • Page 114 3. Copy Original Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Dup./Combine/Series]. Make sure that [Duplex] is selected. If [Duplex] is not selected, press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output.
  • Page 115: Specifying The Original And Copy Orientation

    Duplex Copying Select the original orientation, and then press [OK]. Press the [Start] key. Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper.
  • Page 116 3. Copy Select [Top to Top] or [Top to Bottom] for [Original:] if the original is two-sided. Select [Top to Top] or [Top to Bottom] for [Copy:]. Press [OK].
  • Page 117: Combined Copying

    Combined Copying Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 118: One-Sided Combine

    3. Copy CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 There are six types of One-Sided Combine. 1 Sided 2 Originals Combine 1 Side Copies two 1-sided originals to one side of a sheet. 1 Sided 4 Originals Combine 1 Side Copies four 1-sided originals to one side of a sheet.
  • Page 119: Two-Sided Combine

    Combined Copying 2 Sided 4 Pages Combine 1 Side Copies two 2-sided originals to one side of a sheet. 2 Sided 8 Pages Combine 1 Side Copies four 2-sided originals to one side of a sheet. Press [Dup./Combine/Series]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original:].
  • Page 120 3. Copy CKN074 There are six types of Two-Sided Combine. 1 Sided 4 Originals Combine 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Combine 2 Sides Copies eight 1-sided originals to one sheet with four pages per side. 1 Sided 16 Originals Combine 2 Sides Copies 16 1-sided originals to one sheet with eight pages per side.
  • Page 121 Combined Copying Select [1 Sided] or [2 Sided] for [Original:]. Press [Combine 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original:] and/or [Copy:], and then press [OK]. Select the number of originals to combine. Press [OK]. Select the paper size.
  • Page 122: Copying Onto Custom Size Paper From The Bypass Tray

    3. Copy Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 148.0–457.2 mm (5.83–18.00 inches) and a vertical length of 90.0–320.0 mm (3.55–12.59 inches) can be fed in from the bypass tray. Load the paper face down in the bypass tray. The bypass tray ( ) is automatically selected.
  • Page 123: Copying Onto Envelopes

    Copying onto Envelopes Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Place the original on the exposure glass and place the envelope in the bypass tray or paper tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see page 155 "Recommended Paper Sizes and Types".
  • Page 124: Copying Onto Envelopes From The Paper Tray

    3. Copy Load the envelopes face down in the bypass tray. The bypass tray ( ) is automatically selected. Press the [ ] key. Press [Paper Size]. Specify the envelope size, and then press [OK] twice. Place the originals, and then press the [Start] key. Copying onto Envelopes from the Paper Tray Before using this function, specify the paper size and type under [Tray Paper Settings] in User Tools.
  • Page 125: Sort

    Sort Sort The machine assembles copies as sets in sequential order. • You cannot use the bypass tray with Rotate Sort. Sort/Shift Sort Copies are assembled as sets in sequential order. To use Shift Sort, a finisher or the internal shift tray is required. Each time the copies of one set or a job are delivered, the next copy is shifted to separate each set or job.
  • Page 126: Changing The Number Of Sets

    3. Copy Press [Finishing]. Select [Sort] or [Rotate Sort], and then press [OK]. Enter the number of copy sets using the number keys. Place the originals. To confirm the type of finishing, press the [Sample Copy] key. Press the [Start] key. Changing the Number of Sets You can change the number of copy sets during copying.
  • Page 127 Sort Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 128: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents on the Document Server screen. For details about the Document Server, see page 137 "Storing Data".
  • Page 129: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 130 4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Make the scan settings such as scan size and resolution. Configure the transmission settings such as [TX Mode] as necessary. Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 131: Sending Originals Using The Exposure Glass (Memory Transmission)

    Basic Procedure for Transmissions (Memory Transmission) If you send documents to Internet Fax or e-mail destinations or enable the E-mail TX Results function, specify a sender. Press the [Start] key. Sending Originals Using the Exposure Glass (Memory Transmission) Make sure [Immed. TX] is not highlighted. Place the first page of the original face down on the exposure glass.
  • Page 132: Registering A Fax Destination

    4. Fax Registering a Fax Destination Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 133: Deleting A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". Press [OK]. Press [Exit]. Close the initial settings screen. •...
  • Page 134 4. Fax You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination. Press [Fax Dest.]. Press [Change] under "Fax Destination". Press [Delete All], and then press [OK] under "Fax Destination". Press [OK]. Press [Exit].
  • Page 135: Transmitting While Checking Connection To Destination (Immediate Transmission)

    Transmitting while Checking Connection to Destination (Immediate Transmission) Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 136: Sending Originals Using The Exposure Glass (Immediate Transmission)

    4. Fax Press [Immed. TX]. Place the original into the ADF. Select the scan settings you require. Specify a destination. If you make a mistake, press the [Clear] key, and then enter again. Press the [Start] key. Sending Originals Using the Exposure Glass (Immediate Transmission) Press [Immed.
  • Page 137 Transmitting while Checking Connection to Destination (Immediate Transmission) Press the [ ] key.
  • Page 138: Canceling A Transmission

    4. Fax Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Cancel sending. • When using the standard operation panel Press the [Reset] key.
  • Page 139: Canceling A Transmission After The Original Is Scanned

    Canceling a Transmission Press the [Stop] key. CXX006 Press [Cancel Scanning] or [Cancel TX]. Depending on the transmission mode and function you use, either [Cancel Scanning] or [Cancel TX] is displayed. Canceling a Transmission After the Original Is Scanned Use this procedure to cancel a transmission after the original is scanned. You can cancel transmission of a file while the file is being sent, stored in memory, or if it fails to transmit.
  • Page 140 4. Fax Press [OK]. To cancel another file, repeat Steps 3 through 5. Press [Exit]. After pressing [Check / Stop Transmission File] under [TX/RX Status / Print] in Step 1, press [Exit] twice.
  • Page 141: Storing A Document

    Storing a Document Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 142: Sending Stored Documents

    4. Fax Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 143 Storing a Document Press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [User Name] to place the documents in order by programmed user name. •...
  • Page 144: Printing The Journal Manually

    4. Fax Printing the Journal Manually To print the Journal manually, select the printing method: [All], [Print per File No.], or [Print per User]. Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 145: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 146: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 147: Standard Printing

    Standard Printing Standard Printing • The default setting is 2 sided printing. If you want to print on only one side, select [Off] for the 2 sided printing setting. • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete.
  • Page 148: Printing On Both Sides Of Sheets

    5. Print Printing on Both Sides of Sheets This section explains how to print on both sides of each page using the printer driver. • The types of paper that can be printed on both sides are as follows: • Plain (60 to 81 g/m2), Recycled, Special 1, Special 2, Special 3, Middle Thick (82 to 105 g/m2), Thick 1(106 to 169 g/m2), Thick 2(170 to 220 g/m2), Thick 3(221 to 256 g/m2), Thin (52 to 59 g/m2), Color, Letterhead, Preprinted, Bond, Cardstock When Using the PCL 6 Printer Driver...
  • Page 149: Combining Multiple Pages Into Single Page

    Combining Multiple Pages into Single Page Combining Multiple Pages into Single Page This section explains how to print multiple pages onto a single sheet. The combine printing function allows you to economize on paper by printing multiple sheets at reduced size onto a single sheet. When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click [Print].
  • Page 150 5. Print 4 Pages per Sheet Right, then Down Down, then Right Left, then Down Down, then Left...
  • Page 151: Printing On Envelopes

    Printing on Envelopes Printing on Envelopes Configure the paper settings appropriately using both the printer driver and the control panel. Configuring Envelope Settings Using the Control Panel Load envelopes in the paper tray. Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key.
  • Page 152: Printing On Envelopes Using The Printer Driver

    5. Print Printing on Envelopes Using the Printer Driver When using the PCL 6 printer driver Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the [Select Printer] list, select the printer you want to use. Click [Preferences].
  • Page 153: Saving And Printing Using The Document Server

    Saving and Printing Using the Document Server Saving and Printing Using the Document Server The Document Server enables you to store documents on the machine's hard disk, and allows you to edit and print them as necessary. • Applications with their own drivers, such as PageMaker, do not support this function. •...
  • Page 154: Managing Documents Stored In Document Server

    5. Print If the folder is protected by a password, enter the password in the "Folder Password:" box. Click [OK]. Change any other print settings if necessary. Click [OK]. Start printing from the application's [Print] dialog box. • You can print the documents stored in the Document Server using the control panel. For details, see page 139 "Printing Stored Documents".
  • Page 155: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, see "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 156: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan Press the [Folder] tab. Place originals. If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 157 Basic Procedure When Using Scan to Folder Step 1: Confirming the user name and computer name Confirm the user name and the name of the computer you will send scanned documents to. On the [Start] menu, point to [All Programs], then [Accessories], and then click on [Command Prompt].
  • Page 158: Registering An Smb Folder

    6. Scan In the [Select Users or Groups] window, click [Advanced...]. Specify one or more object types, select a location, and then click [Find Now]. From the list of results, select the groups and users you want to grant access to, and then click [OK].
  • Page 159 Basic Procedure When Using Scan to Folder Check that [Program / Change] is selected. Press [New Program]. Press [Change] under "Name". The name entry display appears. Enter the name, and then press [OK]. Press [ Next]. Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: •...
  • Page 160 6. Scan Press [Change] under "Login Password". Enter the password of the destination computer, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [Folder]. Check that [SMB] is selected. Press [Change] or [Browse Network], and then specify the folder. To specify a folder, you can either enter the path manually or locate the folder by browsing the network.
  • Page 161 Basic Procedure When Using Scan to Folder If the network does not allow automatic obtaining of IP addresses, include the destination computer's IP address in the path. For example: if the IP address of the destination computer is "192.168.0.191", and the folder name is "Share", the path will be \\192.168.0.191\Share. Press [OK].
  • Page 162: Deleting An Smb Registered Folder

    6. Scan Deleting an SMB Registered Folder Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 163: Entering The Path To The Destination Manually

    Basic Procedure When Using Scan to Folder Entering the Path to the Destination Manually Press [Manual Entry]. Press [SMB]. Press [Manual Entry] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 164: Basic Procedure For Sending Scan Files By E-Mail

    6. Scan Basic Procedure for Sending Scan Files by E- mail Display the initial scanner screen. • When using the standard operation panel Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen.
  • Page 165: Registering An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 166 6. Scan Enter the name, and then press [OK]. Press [ Next]. Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. •...
  • Page 167: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail Press [OK]. Select [E-mail / Internet Fax Destination] or [Internet Fax Destination Only]. If [E-mail / Internet Fax Destination] is specified, registered e-mail addresses appear in both Internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 168: Entering An E-Mail Address Manually

    6. Scan Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. Entering an E-mail Address Manually Press [Manual Entry].
  • Page 169: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. We recommend that you protect stored files from unauthorized access by specifying passwords. • Scan file stored in the machine may be lost if some kind of failure occurs. We advise against using the hard disk to store important files.
  • Page 170: Checking A Stored File Selected From The List

    6. Scan Press [Store File]. Press [Store to HDD]. If necessary, specify the stored file's information, such as [User Name], [File Name], [Password], and [Select Folder]. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name.
  • Page 171 Basic Procedure for Storing Scan Files Press [Select Stored File]. Specify the folder in which to save the stored files. From the list of stored files, select the file you want to check. You can select more than one file. Press [Preview].
  • Page 172: Specifying The File Type

    6. Scan Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a memory storage device.
  • Page 173: Specifying Scan Settings

    Specifying Scan Settings Specifying Scan Settings Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 174 6. Scan...
  • Page 175: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 176 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the screen. CXX002 Press [To Scanning Screen]. Press [Target Fldr. to Store]. Specify a folder in which to store the document, and then press [OK]. Press [User Name].
  • Page 177: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [Finishing] ([Sort], [Rotate Sort], [Stack], [Staple], [Punch]) •...
  • Page 178 7. Document Server...
  • Page 179: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 180 8. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 181: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Precautions for Loading Paper • When loading paper, take care not to trap or injure your fingers. • Do not stack paper over the limit mark. •...
  • Page 182: Loading Paper Into Paper Trays

    9. Adding Paper and Toner Loading Paper into Paper Trays Every paper tray is loaded in the same way. In the following example procedure, paper is loaded into Tray 2. • (mainly Europe and Asia) Tray 1 can hold A4 paper only. If you want to print on A5 , B5 JIS , or 8 ×...
  • Page 183 Loading Paper into Paper Trays Carefully push the paper tray fully in. • Various sizes of paper can be loaded in Trays 2–4 by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in Trays 2–4", Paper Specifications and Adding Paper.
  • Page 184: Loading Paper Into The Bypass Tray

    9. Adding Paper and Toner Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Do not stack paper over the limit mark.
  • Page 185: Printing From The Bypass Tray Using The Printer Function

    Loading Paper into the Bypass Tray • When loading thick paper, thin paper, or OHP transparencies, specify the paper size and the paper type. • Letterhead paper must be loaded in a specific orientation. For details, see page 152 "Loading Orientation-fixed Paper or Two-sided Paper".
  • Page 186 9. Adding Paper and Toner CXX005 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4. Press [Tray Paper Settings].
  • Page 187 Loading Paper into the Bypass Tray CXX005 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4. Press [Tray Paper Settings].
  • Page 188: Control Panel

    9. Adding Paper and Toner Specifying thick paper, thin paper, or OHP transparencies for paper type using the control panel • Use A4 or 8 × 11 size OHP transparencies, and specify their size. • Usually only one side of OHP transparencies can be used for printing. Be sure to load them with the print side down.
  • Page 189 Loading Paper into the Bypass Tray Press [OK]. Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. •...
  • Page 190: Loading Orientation-Fixed Paper Or Two-Sided Paper

    9. Adding Paper and Toner Loading Orientation-fixed Paper or Two-sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not be printed correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 191 Loading Orientation-fixed Paper or Two-sided Paper Original orientation Exposure glass Unreadable • Copy orientation • Scanner • Paper orientation • Copier mode Copy side Tray 1 Trays 2–4 Bypass tray One-sided Two-sided • Printer mode Print side Tray 1 Trays 2–4 Bypass tray One-sided Two-sided...
  • Page 192 9. Adding Paper and Toner • In copier mode: • For details about how to make two-sided copies, see page 75 "Duplex Copying". • In printer mode: • To print on letterhead paper when [Auto Detect] is specified for [Letterhead Setting], you must specify [Letterhead] as the paper type in the printer driver's settings.
  • Page 193: Recommended Paper Sizes And Types

    Recommended Paper Sizes and Types Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use paper that curls, either because it is too dry or too damp, a staple clogging or paper jam may occur.
  • Page 194 9. Adding Paper and Toner Tray 2 Paper type and weight Paper size Paper capacity 60–300 g/m (16 lb. Bond– Paper sizes that can be 550 sheets 110 lb. Cover) detected automatically: Plain Paper–Thick Paper 4 A3 , A4 , A5 , B4 JIS , B5 JIS ×...
  • Page 195 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 60–300 g/m (16 lb. Bond– Custom size 550 sheets 110 lb. Cover) Plain Paper–Thick Paper 4 Vertical: 90.0–320.0 mm Horizontal: 148.0–457.2 Vertical: 3.55–12.59 inches Horizontal: 5.83–18.00 inches Envelopes Select the paper size using •...
  • Page 196 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 60–300 g/m (16 lb. Bond– Select the paper size using the 550 sheets 110 lb. Cover) Tray Paper Settings menu: Plain Paper–Thick Paper 4 11 × 17 , 8 ×...
  • Page 197 Recommended Paper Sizes and Types Bypass tray Paper type and weight Paper size Paper capacity 52–300 g/m (14 lb. Bond– Paper sizes that can be • 100 sheets (up to 10 mm 110 lb. Cover) detected automatically: in height) Thin Paper–Thick Paper 4 •...
  • Page 198 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–300 g/m (14 lb. Bond– Custom size • 100 sheets (up to 10 mm 110 lb. Cover) in height) Thin Paper–Thick Paper 4 • Thick Paper 1: 40 sheets Vertical: 90.0–320.0 mm •...
  • Page 199 Recommended Paper Sizes and Types Paper Thickness Paper weight Plain Paper 2 75–81 g/m (20 lb. Bond) Middle Thick 82–105 g/m (20–28 lb. Bond) Thick Paper 1 106–169 g/m (28 lb. Bond–90 lb. Index) Thick Paper 2 170–220 g/m (65–80 lb. Cover) Thick Paper 3 221–256 g/m (80 lb.
  • Page 200: Thick Paper

    9. Adding Paper and Toner • We recommend that you use specified label paper. • It is recommended to place one sheet at a time. • Press [Bypass], and then select the appropriate paper thickness for [Paper Type]. • When loading OHP transparencies: •...
  • Page 201: Envelopes

    Recommended Paper Sizes and Types • Store all your paper in the same environment - a room where the temperature is 20–25°C (68– 77°F) and the humidity is 30–65%. • When loading paper in Trays 1–4, be sure to load at least 20 sheets. Also, be sure to position the side fences flush against the paper stack.
  • Page 202 9. Adding Paper and Toner • When loading envelopes in the orientation, load them with flaps fully open. Otherwise, they might not feed into the machine. • Before loading envelopes, press down on them to remove any air from inside, flatten out all four edges.
  • Page 203 Recommended Paper Sizes and Types *1 You cannot load side-opening envelopes in the orientation in Trays 3 and 4. When loading envelopes, specify the envelope size and thickness. For details, see page 85 "Copying onto Envelopes". In printer mode The way to load envelopes varies depending on the orientation of the envelopes. When printing onto envelopes, load them according to the applicable orientation shown below: How to load envelopes Types of envelopes...
  • Page 204 9. Adding Paper and Toner Recommended envelopes For information about recommended envelopes, contact your local dealer. For details about the sizes of envelopes you can load, see page 155 "Recommended Paper Sizes and Types". • Load only one size and type of envelope at a time. •...
  • Page 205: Adding Toner

    Adding Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 206 9. Adding Paper and Toner • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing.
  • Page 207: Sending Faxes Or Scanned Documents When Toner Has Run Out

    Adding Toner • For details about how to check contact number where you can order supplies, see "Inquiry", Maintenance and Specifications. Sending Faxes or Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send faxes or scanned documents.
  • Page 208 9. Adding Paper and Toner Pack used toner containers in the container's box or a bag to prevent the toner from leaking out of the container when you dispose of it. (mainly Europe and Asia) If you want to discard your used toner container, please contact your local sales office. If you discard it by yourself, treat it as general plastic waste material.
  • Page 209: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. When a Status Icon Is Displayed This section describes the status icons displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Status Icons Status : Paper Misfeed icon Appears when a paper misfeed occurs.
  • Page 210 10. Troubleshooting Status Icons Status : Open Cover icon Appears when one or more covers of the machine are open.
  • Page 211: When The Indicator Lamp For The [Check Status] Key Is Lit Or Flashing

    When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing If the indicator lamp for the [Check Status] key lights up or flashes, press the [Check Status] key to display the [Check Status] screen.
  • Page 212 10. Troubleshooting Problems Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper. For details about loading not print out. paper, see "Loading Paper", Paper Specifications and Adding Paper.
  • Page 213: When The Machine Makes A Beeping Sound

    When the Machine Makes a Beeping Sound When the Machine Makes a Beeping Sound The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep patterns Meanings Causes Single short beep...
  • Page 214: When You Have Problems Operating The Machine

    10. Troubleshooting When You Have Problems Operating the Machine Problems Causes Solutions When the machine is turned Functions other than the Wait a little longer. on, the only icon that copier function are not yet appears on the home screen ready.
  • Page 215 When You Have Problems Operating the Machine Problems Causes Solutions The power turns off The Weekly Timer setting is Change the Weekly Timer setting. For automatically. set to [Main Power Off]. details about the Weekly Timer setting, see "Timer Settings", Connecting the Machine/ System Settings.
  • Page 216 10. Troubleshooting Problems Causes Solutions Misfeeds occur frequently. Using curled paper often • Take the stiffness out of the paper causes misfeeds, soiled with your hands to straighten out paper edges, or slipped the curl. positions while performing • Load the paper up side down so staple or stack printing.
  • Page 217 When You Have Problems Operating the Machine Problems Causes Solutions Misfeeds occur frequently. Paper of undetectable size • Remove the misfed paper. For has been loaded. details about removing jammed paper, see "Removing Jammed Paper", Troubleshooting. • If you load a paper size that is not selected automatically, you need to specify the paper size with the control panel.
  • Page 218 10. Troubleshooting Problems Causes Solutions An error has occurred when The Address Book cannot be Wait a while, and then retry the the Address Book is changed while deleting the operation. changed from the display multiple stored documents. panel or Web Image Monitor.
  • Page 219: When Multiple Functions Cannot Be Executed Simultaneously

    When You Have Problems Operating the Machine • If you cannot make copies as you want because of paper type, paper size, or paper capacity problems, use the recommended paper. For details about recommended paper, see page 155 "Recommended Paper Sizes and Types". When Multiple Functions Cannot Be Executed Simultaneously If you are not able to carry out your job, it may be that the machine is being used by another function.
  • Page 220: Messages Displayed When Using The Copy/Document Server Function

    10. Troubleshooting Messages Displayed When Using the Copy/ Document Server Function • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper. For details about recommended paper, see page 155 "Recommended Paper Sizes and Types".
  • Page 221 Messages Displayed When Using the Copy/Document Server Function Messages Causes Solutions "Cannot display preview of The image data may have Press [Exit] to display the preview this page." been corrupted. screen without a thumbnail. If the selected document contains several pages, press [Switch] on the "Display Page"...
  • Page 222 10. Troubleshooting Messages Causes Solutions "Magazine or Booklet mode You selected the Make sure originals for the is not available due to mixed "Magazine" or "Booklet" "Magazine" or "Booklet" function are image mode." function for originals scanned using the same function. scanned using different functions, such as copy and printer.
  • Page 223 Messages Displayed When Using the Copy/Document Server Function Messages Causes Solutions "The selected folder is An attempt was made to edit For details about locked folders, see locked. Please contact the or use a locked folder. Security Guide. file administrator." •...
  • Page 224: Messages Displayed When Using The Facsimile Function

    10. Troubleshooting Messages Displayed When Using the Facsimile Function Messages Causes Solutions "Cannot find the specified The name of the computer or Check that the computer name and the path. Please check the folder entered as the folder name for the destination are settings."...
  • Page 225: When There Is A Problem Specifying The Network Settings

    Messages Displayed When Using the Facsimile Function Messages Causes Solutions "Some page(s) are near The first page of the The original's blank side might have blank." document is almost blank. been scanned. Be sure to place your originals correctly. For details about determining the cause of blank pages, see "Detecting Blank Pages", Fax.
  • Page 226 10. Troubleshooting Messages Causes Solutions "Check whether there are Registering of user name is • Correct that the correct SIP Server any network problems." rejected by SIP server. IP Address and SIP User Name are listed in [SIP Settings] of [13-17] [Facsimile Features].
  • Page 227 Messages Displayed When Using the Facsimile Function Messages Causes Solutions "Check whether there are The "Effective Protocol" and • Check that the correct IP address any network problems." "SIP Server IP Address" is specified for the machine in settings are different, or an [System Settings].
  • Page 228 10. Troubleshooting Messages Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or login listed correctly.
  • Page 229 Messages Displayed When Using the Facsimile Function Messages Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3 / IMAP4 Settings] of [15-01] [System Settings].
  • Page 230 10. Troubleshooting Messages Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 231: When The Remote Fax Function Cannot Be Used

    Messages Displayed When Using the Facsimile Function • Settings that can be confirmed in System Settings or Facsimile Features on the control panel can also be confirmed from Web Image Monitor. For details about how to confirm the settings from Web Image Monitor, see Web Image Monitor Help.
  • Page 232 10. Troubleshooting Messages Causes Solutions "Check whether there are • An IP address has not • Check that the correct IP address any network problems." been registered for the is specified for the machine in main machine. [System Settings]. For details [16-00] about the IP address of the main •...
  • Page 233 Messages Displayed When Using the Facsimile Function Messages Causes Solutions "Connection with the remote The settings or machine For details about the settings and machine has failed. There is configuration for using the machine configuration for using the a problem with the remote remote fax function to remote fax function to connect to a machine structure.
  • Page 234: Messages Displayed When Using The Printer Function

    10. Troubleshooting Messages Displayed When Using the Printer Function This section describes the principal messages that appear on the display panel, error logs or reports. If other messages appear, follow their instructions. Messages Displayed on the Control Panel When Using the Printer Function •...
  • Page 235 Messages Displayed When Using the Printer Function Messages Causes Solutions "Load following paper in n. The printer driver settings are Check that the printer driver settings To cancel job, press [Job incorrect or the tray does not are correct, and then load paper of Reset]."...
  • Page 236 10. Troubleshooting Messages Causes Solutions "Printer font error." An error has occurred in the Contact your service representative. font settings. "Problems with the wireless The machine has detected a Check that the Bluetooth unit is card. Please call service." Bluetooth failure, or it could installed properly, or contact your not detect a Bluetooth unit.
  • Page 237: Messages Printed On The Error Logs Or Reports When Using The Printer Function

    Messages Displayed When Using the Printer Function Messages Causes Solutions "Unable to access the • An error occurred Save the file to a different memory specified memory storage when the machine storage device, and then try to print device." accessed the memory again.
  • Page 238 10. Troubleshooting Messages Causes Solutions "An error occurred while The resolution is set to a On the printer driver, set the resolution processing an Unauthorized value less than 600 dpi to 600 dpi or higher, or deselect Copy Prevention job. The when [Unauthorized Copy [Unauthorized Copy Prevention].
  • Page 239 Messages Displayed When Using the Printer Function Messages Causes Solutions "Classification Code is The classification code is not Select [Optional] for classification incorrect." supported with the printer code. For details about how to specify driver. classification code settings, see "Configuring Classification Codes", Print.
  • Page 240 10. Troubleshooting Messages Causes Solutions "Punch has been cancelled." Punch printing was Check the paper orientation, print canceled. orientation, and then punch position. Certain settings can produce print results that might not be as expected. "Staple has been cancelled." Stapling printing was Check the paper orientation, paper canceled.
  • Page 241 Messages Displayed When Using the Printer Function Messages Causes Solutions "Exceeded max. number of While using the error job Delete Hold Print files (automatic) or files. (Auto)" store function to store unneeded files stored in the machine. Normal Print jobs as Hold Print files, the maximum file capacity for file storage or Hold Print file management...
  • Page 242 10. Troubleshooting When there is not enough free hard disk space Messages Causes Solutions "HDD is full." When printing with the Delete unneeded forms or fonts PostScript 3 printer driver, registered in the machine. the hard disk capacity for fonts and forms has been exceeded.
  • Page 243 Messages Displayed When Using the Printer Function When the user lacks privileges to perform an operation Messages Causes Solutions "No response from the A timeout occurred while Check the status of the server. server. Authentication has connecting to the server for failed."...
  • Page 244 10. Troubleshooting Messages Causes Solutions "Information for user The user name for LDAP or For details about user authentication, authentication is already Integration Server see Security Guide. registered for another user." authentication was already registered in a different server with a different ID, and a duplication of the user name occurred due to a switching of domains...
  • Page 245 Messages Displayed When Using the Printer Function Messages Causes Solutions "Compressed Data Error." The printer detected corrupt • Check the connection between compressed data. the computer and the printer. • Check that the program you used to compress the data is functioning correctly.
  • Page 246 10. Troubleshooting Messages Causes Solutions "I/O buffer overflow." An input buffer overflow • In [Printer Features], under [Host occurred. Interface], select [I/O Buffer], and then set the maximum buffer size to a larger value. • Reduce the number of files being sent to the machine.
  • Page 247: Messages Displayed When Using The Scanner Function

    Messages Displayed When Using the Scanner Function Messages Displayed When Using the Scanner Function Messages Displayed on the Control Panel When Using the Scanner Function This section describes likely causes of and possible solutions for the error messages that appear on the control panel.
  • Page 248 10. Troubleshooting Messages Causes Solutions "Exceeded max. number of The maximum enterable Check the maximum number of alphanumeric characters." number of alphanumeric characters which can be entered, and characters has been then enter it again. For details about exceeded. the maximum enterable number of characters, see "Values of Various Set Items for Transmission/Storage/ Delivery Function", Scan.
  • Page 249 Messages Displayed When Using the Scanner Function Messages Causes Solutions "The program is recalled. The currently logged-in user For details about how to set Cannot recall the does not have permission to permissions, see Security Guide. destination(s) for which view the destination that was access privileges are registered in the program.
  • Page 250 10. Troubleshooting Messages Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity." maximum data capacity. again. Note that it may not be possible to scan very large originals at a high "Check scanning resolution, resolution.
  • Page 251 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Not all of the image will be Using "Specify Reproduction Specify a large size in [Specify Size], scanned." Ratio" to scale down a large and then try to scan the original again. document may cause part of If displaying the entire image is not the image to be lost.
  • Page 252 10. Troubleshooting Messages Causes Solutions "Memory is full. Scanning Because there is not enough Specify whether to use the data or not. has been cancelled. Press free hard disk space in the [Send] to send the scanned machine for delivering or data, or press [Cancel] to sending by e-mail while delete."...
  • Page 253 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Transmission has failed. Transmission has failed. Allocate sufficient space. Insufficient memory in the There was not enough free destination hard disk. To space on the hard disk of the check the current status, SMTP server, FTP server, or press [Scanned Files client computer at the...
  • Page 254 10. Troubleshooting When data cannot be sent because there are too many documents or pages Messages Causes Solutions "Exceeded max. number of The file being stored has Specify whether to store the data or pages per file. Do you want exceeded the maximum not.
  • Page 255 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Cannot start scanning The [Take no action] setting Open scanner properties, click the because communication was has been selected on the [Events] tab, and then select [Start this failed." client computer, forcing the program] as the computer's response client computer to remain on receipt of scan data.
  • Page 256: Messages Displayed On The Client Computer

    10. Troubleshooting Messages Causes Solutions "Cannot write on the The memory storage device Unlock the write-protection on the memory storage device is write-protected. memory storage device. because the device is write- protected." "Cannot write on the The memory storage device •...
  • Page 257 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Any of Login User Name, The entered login user Check your login user name, login Login Password or Driver name, password, or driver password, or driver encryption key, Encryption Key is incorrect." encryption key was invalid.
  • Page 258 10. Troubleshooting Messages Causes Solutions "Error has occurred in the An error has occurred in the • Check whether the network cable scanner driver." driver. is connected correctly to the client computer. • Check whether the Ethernet board of the client computer is recognized correctly by Windows.
  • Page 259 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help.
  • Page 260 10. Troubleshooting Messages Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such • Cancel the job that is being as the Copier function.
  • Page 261 Messages Displayed When Using the Scanner Function Messages Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly.
  • Page 262 10. Troubleshooting Messages Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool. For the WIA not be obtained from the driver, check the [Network host name.
  • Page 263: When Other Messages Appear

    When Other Messages Appear When Other Messages Appear Messages Causes Solutions "Cannot connect with the • The wireless LAN Turn off the power, and then confirm wireless card. Turn the main board was not inserted the wireless LAN board is inserted power switch off, then check when the machine was correctly.
  • Page 264: When There Is A Problem Scanning Or Storing Originals

    10. Troubleshooting Messages Causes Solutions "Self checking..." The machine is performing The machine may perform periodic image adjustment maintenance during operations. The operations. frequency and duration of maintenance depends on the humidity, temperature, and printing factors such as number of prints, paper size, and paper type.
  • Page 265: When The Home Screen Cannot Be Edited (When Using The Standard Operation Panel)

    When Other Messages Appear Messages Causes Solutions "Captured file exceeded The maximum number of Reduce the number of pages in the max. number of pages per pages per file has been transmitted file, and then resend the file. Cannot send the exceeded.
  • Page 266: When The Address Book Is Updated

    10. Troubleshooting When the Address Book Is Updated Messages Causes Solutions "Updating the destination list A network error has • Check whether the server is has failed. Try again?" occurred. connected. • Antivirus programs and firewalls can prevent client computers from establishing connection with this machine.
  • Page 267: When Data Cannot Be Sent Due To A Problem With The Destination

    When Other Messages Appear When Data Cannot Be Sent Due to a Problem with the Destination Messages Causes Solutions "Some invalid destination(s) The specified group contains In the message that appears at each contained. Do you want to fax destinations, e-mail transmission, press [Select].
  • Page 268 10. Troubleshooting Messages Causes Solutions "XXX cannot be YYY The device certificate (S/ A new device certificate (S/MIME) because the device MIME) has expired. must be installed. For details about certificate used for the S/ how to install a device certificate (S/ MIME signature is not MIME), see Security Guide.
  • Page 269: When Problems Occur While Logging In

    When Other Messages Appear When Problems Occur While Logging In Messages Causes Solutions "Authentication has failed." The entered login user name For details about the correct login user or login password is not name and login password, see correct. Security Guide. "Authentication has failed."...
  • Page 270 10. Troubleshooting Messages Causes Solutions "Exceeded time limit for A network error has • Try the operation again. If the LDAP server search. Check occurred and connection message is still shown, the the server status." has failed. network may be busy. •...
  • Page 271: Index

    INDEX Document Server..10, 17, 48, 90, 115, 116, 137 DSM............... 2 Sided Print............Duplex..............Duplex Copy............. 9, 75 Address Book........11, 94, 95, 228 Address Book Management......... E-mail address............. ADF..........8, 29, 33, 38, 68 E-mail destination........127, 129 ADF's extender..........
  • Page 272 Internal Finisher SR3130......37, 38, 40 Internal Finisher SR3180......37, 38, 40 OCR unit..............Internal shift tray........37, 38, 40 OHP transparency..........Internal tray 1..........30, 33 One-Sided Combine..........Internal tray 2........... 37, 38, 40 Options..............Interrupt key............Orientation-fixed paper........IP-Fax..............
  • Page 273 Scan settings............Scan to Folder..........23, 117 Vents........30, 31, 32, 33, 34, 35 Scanner..47, 117, 209, 211, 213, 214, 215, 216, 217, 222 Sending scan files........... 10, 23 Web Image Monitor........27, 141 Shared folder............Widget..............Shortcut..............WSD scanner............Shortcut icon..........
  • Page 274 MEMO D176-7503...
  • Page 275 © 2013...
  • Page 276 D176-7503...
  • Page 277 Notes for Users Due to product improvements, the shapes of the main unit’s paper trays (Trays 2, 3, 4) have been changed. In accordance with this, changes to the manual have been made as shown below. v Paper trays (Shapes of Trays 2, 3, 4 before and after the improvement) The illustration below shows Tray 2.
  • Page 278 3. Tighten the fixed screw with an object such as a coin. DDU013 v Recommended Paper Sizes (Trays 2, 3, 4) The paper sizes that can be loaded in Trays 2, 3, 4 are changed as follows: The paper sizes for postcards and envelopes are those specified in the manual. Paper Specifications and Adding Paper >...
  • Page 279: Operating Instructions

    Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in Read This First before using the machine.
  • Page 281 TABLE OF CONTENTS Functions That Require Options.........................9 Main Software Names............................10 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators and Users..........................14 Administrators..............................15 Configuring Administrator Authentication......................16 Specifying Administrator Privileges......................17 Registering and Changing Administrators....................19 Using Web Image Monitor to Configure Administrator Authentication..........22 Administrator Login Method..........................23 Logging in Using the Control Panel......................23 Logging in Using Web Image Monitor......................24...
  • Page 282 Creating the Server Certificate........................51 If the Fax Number Cannot be Obtained....................51 LDAP Authentication............................53 Integration Server Authentication........................58 Printer Job Authentication..........................63 Printer Job Authentication Levels.........................63 Printer Job Types............................63 "authfree" Command...........................66 Auto Registration to the Address Book......................67 Automatically Registered Address Book Items..................67 Data Carry-over Setting for Address Book Auto-program...............67 User Lockout Function............................69 Specifying the User Lockout Function......................70 Canceling Password Lockout........................70...
  • Page 283 Printing a List of Print Volume Use Counters....................89 Clearing Print Volume Use Counters......................91 Configuring the Auto-Reset Function......................92 4. Preventing Leakage of Information from Machines Protecting the Address Book...........................95 Specifying Address Book Access Permissions...................95 Encrypting Data in the Address Book......................97 Encrypting Data on the Hard Disk........................99 Enabling the Encryption Settings......................101 Backing Up the Encryption Key........................103 Updating the Encryption Key........................103...
  • Page 284 Enabling SSL/TLS............................136 User Setting for SSL/TLS...........................137 Setting the SSL/TLS Encryption Mode.....................138 Enabling SSL for SMTP Connections.......................139 Configuring S/MIME............................141 E-mail Encryption............................141 Attaching an Electronic Signature......................143 Specifying Checking of the Certificate Valid Period................145 Configuring PDFs with Electronic Signatures....................147 Configuring IPsec............................148 Encryption and Authentication by IPsec....................148 Encryption Key Auto Exchange Settings....................149 IPsec Settings.............................150 Encryption Key Auto Exchange Settings Configuration Flow..............156...
  • Page 285 Configuring Access Permission for Each User for Stored Files..............185 Specifying Passwords for Stored Files.....................187 Unlocking Stored Files..........................188 Managing Locked Print Files.........................190 Deleting Locked Print Files........................190 Changing the Password of a Locked Print File..................192 Unlocking a Locked Print File........................193 Unauthorized Copy Prevention / Data Security for Copying..............195 Enabling Pattern Printing...........................196 Enabling Detect Data Security for Copying....................197 Printing User Information on Paper.......................199...
  • Page 286 Troubleshooting............................246 Managing Device Information........................248 Exporting Device Information........................249 Importing Device Information........................250 Troubleshooting............................252 Managing Eco-friendly Counter........................254 Configuring the Display of Eco-friendly Counters..................254 Clearing a Machine's Eco-friendly Counter....................255 Clearing Users’ Eco-friendly Counters....................255 Managing the Address Book........................256 Specifying Auto Deletion of Address Book Data..................256 Deleting All Data in the Address Book....................256 Specifying the Extended Security Functions....................257 Other Security Functions..........................265...
  • Page 287 System Settings...............................296 Edit Home (When Using the Standard Operation Panel)................306 Copier / Document Server Features......................307 Facsimile Features............................313 Printer Functions.............................316 Printer Features...............................317 Scanner Features............................321 Browser Features............................323 Extended Feature Settings..........................324 Maintenance..............................325 Screen Features (When Using the Smart Operation Panel)...............326 Edit Home (When Using the Smart Operation Panel)................328 Web Image Monitor: Display Eco-friendly Counter...................329 Web Image Monitor: Job..........................330 Web Image Monitor: Device Settings......................332...
  • Page 288 Web Image Monitor: Printer: Print Jobs.......................370 List of Operation Privileges for Stored Files....................371 List of Operation Privileges for Address Books....................373 Trademarks..............................377 INDEX ................................379...
  • Page 289: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Detect Data Security for Copying Copy Data Security Unit For details about other functions that require options, see "Functions Requiring Optional Configurations", Getting Started.
  • Page 290: Main Software Names

    Main Software Names Product name Names in the text ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise *1 This product is no longer sold.
  • Page 291: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. •...
  • Page 292: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. For details about turning on the main power, see "Turning On/Off the Power", Getting Started.
  • Page 293 Before Using This Machine Change the administrator's user name and password. For details about specifying administrators' user names and passwords, see page 19 "Registering and Changing Administrators". Connect the machine to the general usage network environment. • To enable higher security, see page 268 "Additional Information for Enhanced Security".
  • Page 294: Administrators And Users

    1. Getting Started Administrators and Users This section explains the terms "administrator", "supervisor", "user", and "owner" as used in this manual. Administrator There are four types of administrators for the machine: user administrator, machine administrator, network administrator, and file administrator. Their main role is to specify the settings for operating the machine.
  • Page 295: Administrators

    Administrators Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 296: Configuring Administrator Authentication

    1. Getting Started Configuring Administrator Authentication Administrator authentication requires the login user name and password for verifying administrators attempting to specify the machine's settings or access them from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book. Administrators are handled differently from the users registered in the Address Book.
  • Page 297: Specifying Administrator Privileges

    Configuring Administrator Authentication Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again. 2.
  • Page 298 1. Getting Started Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 299: Registering And Changing Administrators

    Configuring Administrator Authentication Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. The available settings depend on the administrator type. To specify administrator authentication for more than one category, repeat Steps 6 to 8. Press [OK].
  • Page 300 1. Getting Started Press [Program / Change Administrator]. In the line for the administrator whose privilege you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. When allocating administrators' privileges to one person each, select one administrator under each category as shown below.
  • Page 301 Configuring Administrator Authentication Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Follow the password policy to strengthen the login password. For details about the password policy and how to specify it, see page 257 "Specifying the Extended Security Functions".
  • Page 302: Using Web Image Monitor To Configure Administrator Authentication

    1. Getting Started about specifying the password policy, see "Password Policy" in page 257 "Specifying the Extended Security Functions". Using Web Image Monitor to Configure Administrator Authentication Using Web Image Monitor, you can log in to the machine and change the administrator settings. For details about logging in and logging out with administrator authentication, see page 23 "Administrator Login Method"...
  • Page 303: Administrator Login Method

    Administrator Login Method Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key.
  • Page 304: Logging In Using Web Image Monitor

    1. Getting Started Enter the login user name, and then press [OK]. The default login name for administrators is "admin" and "supervisor" for supervisors. Enter the login password, and then press [OK]. There is no preset default password for administrators or supervisors. Therefore, leave the password field blank and press [OK].
  • Page 305: Administrator Logout Method

    Administrator Logout Method Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the logout key. • When using the standard operation panel Press the [Login/Logout] key, and then press [Yes].
  • Page 306: Supervisor

    1. Getting Started Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If you have logged in using the supervisor's user name and password, you cannot use normal functions or specify system settings.
  • Page 307: Changing The Supervisor

    Supervisor Press [Change] for the administrator you wish to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK] twice. You will be automatically logged out. •...
  • Page 308 1. Getting Started Press [OK] twice. You will be automatically logged out.
  • Page 309: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the information in the machine's Address Book, and can only use the functions they are permitted to access by administrators.
  • Page 310: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a system requiring the login user name and password for verifying users to operate the machine or access the machine over the network. CJC010 1. User A user performs normal operations on the machine, such as copying and printing. 2.
  • Page 311: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 312 2. Configuring User Authentication Type Details Basic authentication Authentication is performed using the machine's address book. It is necessary to register users in the machine's address book in advance. Authentication can be applied to each user. Windows authentication Authentication is performed using the domain controller of the Windows server on the same network as the machine.
  • Page 313 Configuring User Authentication • From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you are not going to use, or set up a login password. For details about deleting accounts, see "Deleting a Registered Name", Connecting the Machine/ System Settings.
  • Page 314: User Code Authentication

    2. Configuring User Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Registering a User Code", Connecting the Machine/ System Settings.
  • Page 315 User Code Authentication The selected functions are subject to User Code authentication. User Code authentication is not applied to the functions not selected. For details about limiting available functions for individuals or groups, see page 80 "Limiting Available Functions". To specify printer job authentication, select an item other than [PC Control] for "Printer" under "Functions to Restrict".
  • Page 316 2. Configuring User Authentication Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 317: Basic Authentication

    Basic Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 318 2. Configuring User Authentication In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next]. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book.
  • Page 319: Authentication Information Stored In The Address Book

    Basic Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 320: Specifying Login User Names And Passwords

    2. Configuring User Authentication Users must have a registered account in the Address Book in order to use the machine when user authentication is specified. For details about user registration in the Address Book, see "Registering User Information", Connecting the Machine/ System Settings. User authentication can also be specified via Web Image Monitor.
  • Page 321: Specifying Login Details

    Basic Authentication Enter a login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK]. Press [Exit]. Log out. • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4.
  • Page 322 2. Configuring User Authentication If the function you want to select is not displayed, press [ Next]. Press [OK]. Press [Exit]. Log out. • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4.
  • Page 323: Windows Authentication

    Windows Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 324 2. Configuring User Authentication • Windows Server 2003/2003 R2 • Windows Server 2008/2008 R2 • Windows Server 2012 To use Kerberos authentication under Windows Server 2008, Service Pack 2 or later must be installed. • Transmission between the machine and the KDC server is encrypted if Kerberos authentication is enabled.
  • Page 325: Specifying Windows Authentication

    Windows Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". Log in as the machine administrator from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [User Authentication Management].
  • Page 326 2. Configuring User Authentication Select Kerberos authentication realm and proceed to step 10. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters. For details about registering a realm, see "Programming the Realm", Connecting the Machine/ System Settings.
  • Page 327 Windows Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 328 2. Configuring User Authentication Press [ Next]. Under "Group", press [Program / Change], and then press [* Not Programmed]. Press [Change] for "Group Name", and then enter the group name. Press [OK]. In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next].
  • Page 329: Installing Internet Information Services (Iis) And Certificate Services

    Windows Authentication Installing Internet Information Services (IIS) and Certificate Services Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory. We recommend you install Internet Information Services (IIS) and Certificate services as the Windows components.
  • Page 330 2. Configuring User Authentication Installation under Windows Server 2012 On the Start screen, click [Server Manager]. On the [Manage] menu, click [Add Roles and Features]. Click [Next>]. Select [Role-based or feature-based installation], and then click [Next>]. Select a server. Select the "Active Directory Certificate Services" and "Web Server (IIS)" check boxes, and then click [Next>].
  • Page 331: Creating The Server Certificate

    Windows Authentication Creating the Server Certificate After installing Internet Information Services (IIS) and Certificate services Windows components, create the Server Certificate as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrative Tools], and then click [Internet Information Services (IIS) Manager].
  • Page 332 2. Configuring User Authentication Click [Active Directory Scheme] in the left column, and then open the [Attributes] folder. Right-click [facsimileTelephoneNumber], and then click [Properties]. Select the "Replicate this attribute to the Global Catalog" check box, and then click [Apply]. Click [OK]. On the [File] menu, click [Save].
  • Page 333: Ldap Authentication

    LDAP Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 334 2. Configuring User Authentication • When SSL is being used, TLSv1 or SSLv3 can function on the LDAP server. • The LDAP server must be registered in the machine. • When registering the LDAP server, the following setting must be specified. •...
  • Page 335 LDAP Authentication Press [ Next]. Press [User Authentication Management]. Select [LDAP Auth.]. If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication. Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see page 63 "Printer Job Authentication".
  • Page 336 2. Configuring User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 337 LDAP Authentication For details about specifying available functions for individuals or groups, see page 80 "Limiting Available Functions". Press [ Next] to display Page 4. Press [Change] for "Login Name Attribute". Enter the login name attribute, and then press [OK]. Use the login name attribute as a search criterion to obtain information about an authenticated user.
  • Page 338: Integration Server Authentication

    2. Configuring User Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. To use the Integration Server authentication, software featuring Authentication Manager (e.g., Remote Communication Gate S) is required.
  • Page 339 Integration Server Authentication Enter the server name, and then press [OK]. Enter the IPv4 address or host name. In "Authentication Type", select the authentication system for external authentication. Select an available authentication system. For general usage, select [Default]. Press [Change] for "Domain Name". Enter the domain name, and then press [OK].
  • Page 340 2. Configuring User Authentication If you set "Authentication Type" to [Notes], you can use the Notes group. If you set "Authentication Type" to [Basic (Integration Server)], you can use the groups created using the Authentication Manager. Press [Program / Change] for "Group", and then press [* Not Programmed]. Press [Change] for "Group Name", and then enter the group name.
  • Page 341 Integration Server Authentication Select the "Printer Job Authentication" level. If you cannot see this item, press [ Next] to display more settings. For a description of the printer job authentication levels, see page 63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 25. If you select [Simple (Limitation)], proceed to step 22.
  • Page 342 2. Configuring User Authentication Press [On] for "Use Secure Connection (SSL)", and then press [OK]. To not use secure sockets layer (SSL) for authentication, press [Off]. Press [OK]. Log out. • When using the standard operation panel Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 343: Printer Job Authentication

    Printer Job Authentication Printer Job Authentication Printer job authentication is a function allowing user authentication to be applied to print jobs. User authentication is supported by the PCL and PostScript3 drivers. The PostScript3 driver supports User Code authentication only. Printer Job Authentication Levels The security level for "Entire"...
  • Page 344 2. Configuring User Authentication When user authentication is disabled, printing is possible for all job types. Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver.
  • Page 345 Printer Job Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 346: Authfree" Command

    2. Configuring User Authentication "authfree" Command If [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command can be used to specify exceptions to the printer job authentication. The default user name for logging into telnet is "admin". The password is not configured by default. For details about logging into and using telnet, see "Remote Maintenance Using telnet", Connecting the Machine/ System Settings.
  • Page 347: Auto Registration To The Address Book

    Auto Registration to the Address Book Auto Registration to the Address Book The personal information of users logging in via Windows, LDAP or Integration Server authentication is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 348 2. Configuring User Authentication Press [Data Carry-over Setting for Address Book Auto-program]. Press [Carry-over Data]. Use the number keys to enter the registration number of the Address Book to apply the specified setting, and then press [ ]. Press [OK]. Log out.
  • Page 349: User Lockout Function

    User Lockout Function User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 350: Specifying The User Lockout Function

    2. Configuring User Authentication Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 351: Auto Logout

    Auto Logout Auto Logout After you log in, the machine automatically logs you out if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 352 2. Configuring User Authentication • When using the Smart Operation Panel Press [Logout]. A confirmation message appears. If you press [OK], you will be automatically logged out. • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function.
  • Page 353: Authentication Using An External Device

    Authentication Using an External Device Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 354 2. Configuring User Authentication...
  • Page 355: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The use of the destination list can be restricted separately under the scanner and fax functions. Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) You can prohibit the sending of faxes and scanned documents to addresses other than those registered in the Address Book.
  • Page 356 3. Restricting Machine Usage If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear. Similarly, if you set "Restrict Use of Destinations (Scanner)" to [On], "Restrict Adding of User Destinations (Scanner)" will not appear. Press [OK].
  • Page 357: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings Limiting the Settings that Can Be Changed by Each Administrator The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 358: Specifying Menu Protect

    3. Restricting Machine Usage Specifying Menu Protect Menu Protect allows you to limit user permission to access the settings in the User Tools menu except for the System Settings. This setting can be used regardless of user authentication. To change the menu protect setting, first enable administrator authentication.
  • Page 359: Scanner Function

    Specifying Menu Protect Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function Log in as the machine administrator from the control panel. Press [Scanner Features]. Press [Initial Settings]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out.
  • Page 360: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Specify the functions available to registered users. By making this setting, you can limit the functions available to users.
  • Page 361 Limiting Available Functions In "Available Functions", select the functions you want to specify. If the function you want to select is not displayed, press [ Next]. Press [OK]. Log out. • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4.
  • Page 362: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 363: Managing Print Volume Per User

    Managing Print Volume per User Managing Print Volume per User This function limits how much each user can print. If users reach their maximum print volume, their print jobs are canceled and/or a message indicating so is displayed. Print volume The print volume is calculated by multiplying the number of pages by a unit count.
  • Page 364: Specifying Limitations For Print Volume

    3. Restricting Machine Usage Item Explanation Setting Print Volume You can specify the limits for the print 0 to 200 volume per user under the following eight (The default per-page unit count for Limitation: conditions. every print condition is 1.) Unit Count •...
  • Page 365 Managing Print Volume per User Press [ Next]. Press [Machine action when limit is reached]. Select [Stop Job] or [Finish Job and Limit], and then press [OK]. If you do not want to limit print volume, select [Allow Continue Use]. Press [Print Volume Use Limitation: Unit Count Setting].
  • Page 366: Specifying The Default Maximum Use Count

    3. Restricting Machine Usage • Limitations for print volume can also be specified in [Print Volume Use Limitation] under "Configuration" in Web Image Monitor. Restrictions When User Code Authentication is Enabled When User Code authentication is enabled, the following restrictions apply to the print volume limitation settings: •...
  • Page 367: Specifying The Maximum Use Count Per User

    Managing Print Volume per User [Print Volum. Use Limit.: Default Limit Value] does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached". Use the number keys to enter a value between "0" and "999,999" as the maximum available print volume, and then press [ ].
  • Page 368: Checking Print Volume Per User

    3. Restricting Machine Usage Press [Limit] in "Print Volum. Use Limit.". "Print Volum. Use Limit." does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached". If you do not want to limit user's print volume, press [Do not Limit]. Press [Change], and then use the number keys to enter a value between "0"...
  • Page 369: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User Press [Display / Clear / Print Counter per User]. Press [Print Volume Use]. Each user's print volume limit and print volume used to date are displayed. After confirming the settings, log out. • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters.
  • Page 370 3. Restricting Machine Usage Press [Display / Clear / Print Counter per User]. Press [Print Volume Use]. A list of users' print volume use counters is displayed. To select all the users displayed on the page, press [Select All on the Page]. To print a list of the volume use counters of every user, press [Print Counter List] under "All Users".
  • Page 371: Clearing Print Volume Use Counters

    Managing Print Volume per User Clearing Print Volume Use Counters Clearing a user's print volume counter or increasing a user's print volume limit allows the user to continue printing beyond his/her original print volume limit. Log in as the user administrator from the control panel. Press [System Settings].
  • Page 372: Configuring The Auto-Reset Function

    3. Restricting Machine Usage Select [Print Volume Use], and then press [OK]. Log out. • You can also use [Address Book] in Web Image Monitor to clear the print volume use counters. However if you want to clear the print volume use counters of all users simultaneously, use the control panel.
  • Page 373 Managing Print Volume per User Press [Volume Use Counter: Scheduled/Specified Reset Settings]. Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions. Press [OK]. Log out. • If the machine is turned off at the specified time on the specified date, the print volume will be reset when the power is turned on.
  • Page 374 3. Restricting Machine Usage...
  • Page 375: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 376 4. Preventing Leakage of Information from Machines Press [Program/Change/Delete] for "Permissions for Users / Groups", under "Protect Destination". Press [New Program]. Select the users or groups to which to apply the access permission. You can select more than one user. By pressing [All Users], you can select all the users.
  • Page 377: Encrypting Data In The Address Book

    Protecting the Address Book Encrypting Data in the Address Book • The machine cannot be used during encryption. The time it takes to encrypt the data in the Address Book depends on the number of registered users. Encrypting the data in the Address Book may take a long time. Log in as the user administrator from the control panel.
  • Page 378 4. Preventing Leakage of Information from Machines If you press [Stop] during decryption, the data stays encrypted. Normally, once encryption is complete, "Encryption / Decryption is successfully complete. Press [Exit]." appears. Press [Exit]. Press [OK]. Log out. • If you register additional users after encrypting the data in the Address Book, those users are also encrypted.
  • Page 379: Encrypting Data On The Hard Disk

    Encrypting Data on the Hard Disk Encrypting Data on the Hard Disk • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written.
  • Page 380 4. Preventing Leakage of Information from Machines Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approx. 1 hour Only Architecture (stored documents in applications' Document Server, program/log Locked Print files / Sample Print files / •...
  • Page 381: Enabling The Encryption Settings

    Encrypting Data on the Hard Disk Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 382 4. Preventing Leakage of Information from Machines Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 383: Backing Up The Encryption Key

    Encrypting Data on the Hard Disk Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 384: Canceling Data Encryption

    4. Preventing Leakage of Information from Machines • When the encryption key is updated, encryption is performed using the new key. After completing the procedure on the machine's control panel, turn off the main power and restart the machine to enable the new settings.
  • Page 385 Encrypting Data on the Hard Disk • After completing this procedure on the machine's control panel, turn off the main power and restart the machine to enable the new settings. Restarting can be slow when there is data to be carried over to the hard disk.
  • Page 386: Deleting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 387 Deleting Data on the Hard Disk The copier, fax and printer functions take priority over the Auto Erase Memory function. If a copy, fax or print job is in progress, overwriting will only be done after the job is completed. Overwrite icon When Auto Erase Memory is set to [On], the Data Overwrite icon will be indicated in the bottom right hand corner of the panel display of your machine.
  • Page 388 4. Preventing Leakage of Information from Machines Each item of data is overwritten by a random number, then by its complement, then by another random number, and is then verified. • Random Numbers Temporary data is overwritten multiple times with random numbers. The number of overwrites can be selected from 1 to 9.
  • Page 389 Deleting Data on the Hard Disk Press [Auto Erase Memory Setting]. Press [On]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 390 4. Preventing Leakage of Information from Machines Types of data that can or cannot be overwritten The following are the types of data that can or cannot be overwritten by "Auto Erase Memory". Data overwritten by Auto Erase Memory Copier •...
  • Page 391: Erase All Memory

    Deleting Data on the Hard Disk Erase All Memory You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. The following data will also be erased by Erase All Memory. For details about using the machine after executing Erase All Memory, contact your sales representative.
  • Page 392 4. Preventing Leakage of Information from Machines Press [Erase All Memory]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 393 Deleting Data on the Hard Disk • Erase All Memory cannot be canceled. Press [Suspend] while Erase All Memory is in progress. Press [Yes]. Erase All Memory is suspended. Turn off the main power. For details about turning off the main power, see "Turning On/Off the Power", Getting Started. •...
  • Page 394 4. Preventing Leakage of Information from Machines...
  • Page 395: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 396: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel or by using Web Image Monitor, telnet, SmartDeviceMonitor for Admin/Device Manager NX Lite or Remote Communication Gate S.
  • Page 397 Enabling and Disabling Protocols Protocol Port Setting method When disabled TCP:21 • Web Image Monitor Functions that require FTP cannot be used. • telnet You can restrict personal information • SmartDeviceMonitor from being displayed by making for Admin settings on the control panel using •...
  • Page 398 5. Enhanced Network Security Protocol Port Setting method When disabled HTTP TCP:80 • Web Image Monitor Functions that require HTTP cannot be used. • telnet Cannot print using IPP on port 80. • SmartDeviceMonitor for Admin • Device Manager NX Lite HTTPS TCP:443...
  • Page 399 Enabling and Disabling Protocols Protocol Port Setting method When disabled SNMPv3 UDP:161 • Web Image Monitor Functions that require SNMPv3 cannot be used. • telnet You can also make settings to require • SmartDeviceMonitor SNMPv3 encrypted transmission and for Admin restrict the use of other transmission •...
  • Page 400 5. Enhanced Network Security Protocol Port Setting method When disabled IP-Fax TCP:1720 (H. • Control panel IP-Fax connecting functions using H. 323) 323, SIP and T.38 cannot be used. • Web Image Monitor UDP:1719 • SmartDeviceMonitor (Gatekeeper) for Admin TCP/UDP: •...
  • Page 401 Enabling and Disabling Protocols Protocol Port Setting method When disabled DIPRINT TCP:9100 • Web Image Monitor DIPRINT functions cannot be used. • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP:10021 • Control panel You can attempt to update firmware via FTP.
  • Page 402 5. Enhanced Network Security Protocol Port Setting method When disabled WSD (Printer) TCP:53001 • Web Image Monitor WSD (Printer) functions cannot be used. (variable) • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP-53002 •...
  • Page 403: Enabling And Disabling Protocols Using The Control Panel

    Enabling and Disabling Protocols Enabling and Disabling Protocols Using the Control Panel Log in as the network administrator from the control panel. Press [System Settings]. Press [Interface Settings]. Press [Effective Protocol]. Set the desired protocols to active/inactive. Press [OK]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor.
  • Page 404 5. Enhanced Network Security "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], wait for a while, and then click the web browser's refresh button. Log out.
  • Page 405: Specifying Network Security Level

    Specifying Network Security Level Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 406: Specifying Network Security Level Using Web Image Monitor

    5. Enhanced Network Security Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 407 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 IPP > Port 631 Open Open Close Close SSL/TLS > Port 443 Open Open Open Open SSL/TLS > Permit SSL/TLS Ciphertext Ciphertext Ciphertext Ciphertext Communication Priority Priority Only Only SSL/TLS Version >...
  • Page 408 5. Enhanced Network Security Function Level 0 Level 1 FIPS 140 Level 2 WSD (Scanner)/DSM Active Active Active Active WSD (Encrypted Communication of Inactive Inactive Active Active Device) RHPP Active Active Inactive Inactive The same settings are applied to IPv4 and IPv6. TCP/IP setting is not governed by the security level.
  • Page 409 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 S/MIME > Encryption 3DES-168 bit 3DES-168 bit 3DES-168 bit AES-256 bit Algorithm S/MIME > Digest SHA1 SHA1 SHA1 SHA-256 bit Algorithm SNMPv3 > SHA1 SHA1 SHA1 Authentication Algorithm SNMPv3 >...
  • Page 410: Protecting The Communication Path Via A Device Certificate

    5. Enhanced Network Security Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. It can also protect PDFs by means of a PDF or PDF/A digital signature.
  • Page 411: Creating And Installing A Device Certificate From Web Image Monitor (Self-Signed Certificate)

    Protecting the Communication Path via a Device Certificate Press [Program / Delete Device Certificate]. Check that [Program] is selected. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. To use the device certificate for S/MIME, PDF Digital Signature, or PDF/A Digital Signature, enter the machine's administrator’s e-mail address in the e-mail address setting.
  • Page 412: Creating The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Check the radio button next to the number of the certificate you want to create. To use SSL/TLS, select [Certificate 1]. To use any other protocol, select the certificate number desired. Click [Create]. Click [Delete] to delete the device certificate from the machine. Make the necessary settings.
  • Page 413: Installing The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Apply to the certificate authority for the device certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority. For the application, click Web Image Monitor Details icon and use the information that appears in "Certificate Details".
  • Page 414: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority. If you do not have the intermediate certificate issued by the certificate authority, a warning message will appear during communication.
  • Page 415: Configuring Ssl/Tls

    Configuring SSL/TLS Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so helps prevent data from being intercepted, cracked or tampered with during transmission. Flow of SSL/TLS encrypted communications 1. To access the machine from a user's computer, request the SSL/TLS device certificate and public key.
  • Page 416: Enabling Ssl/Tls

    5. Enhanced Network Security Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 417: User Setting For Ssl/Tls

    Configuring SSL/TLS Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 418: Setting The Ssl/Tls Encryption Mode

    5. Enhanced Network Security • If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store location with the certificate authority. • To change the host name or IP address in [Common Name] of the device certificate when using the operating system's standard IPP port under Windows Vista/7/8 or Windows Server 2008/2008 R2/2012, delete any previously configured PC printer beforehand and re-install it after changing [Common Name].
  • Page 419: Enabling Ssl For Smtp Connections

    Configuring SSL/TLS Press [Permit SSL / TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 420 5. Enhanced Network Security In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out.
  • Page 421: Configuring S/Mime

    Configuring S/MIME Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 422 5. Enhanced Network Security 4. Using the shared key, encrypt the e-mail message. 5. The shared key is encrypted using the user's public key. 6. The encrypted e-mail is sent. 7. The receiver decrypts the shared key using a secret key that corresponds to the public key. 8.
  • Page 423: Attaching An Electronic Signature

    Configuring S/MIME Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 424 5. Enhanced Network Security 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 425: Specifying Checking Of The Certificate Valid Period

    Configuring S/MIME Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending Email by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax"...
  • Page 426 5. Enhanced Network Security Operation mode Description Performance Priority Performing (b) and (c) are omitted. If it takes a long time to verify the validity period when the address is selected or when the [Start] key is pressed, the time taken can be shortened by selecting "Performance Priority".
  • Page 427: Configuring Pdfs With Electronic Signatures

    Configuring PDFs with Electronic Signatures Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 428: Configuring Ipsec

    5. Enhanced Network Security Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine uses automatic key exchange to configure the pre-shared key for both parties. Using the auto exchange setting, you can renew the shared key exchange settings within a specified validity period, and achieve higher transmission security.
  • Page 429: Encryption Key Auto Exchange Settings

    Configuring IPsec • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 430: Ipsec Settings

    5. Enhanced Network Security When IPsec is enabled, set 1 has the highest priority and 4 has the lowest. You can use this priority system to target IP addresses more securely. For example, set the broadest IP range at the lowest priority (4), and then set specific IP addresses at a higher priority level (3 and higher).
  • Page 431 Configuring IPsec Security level Security level features Select this level if you want to encrypt the data packets as well as authenticate the transmission partner and prevent Authentication and Low Level unauthorized packet tampering. Packet encryption helps Encryption prevent eavesdropping attacks. This level provides less security than "Authentication and High Level Encryption".
  • Page 432 5. Enhanced Network Security Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption HMAC-SHA1-96/ HMAC-SHA1-96/ HMAC- HMAC- Phase 2 SHA256-128/ HMAC-SHA256-128/ SHA256-128/ Authentication HMAC- HMAC-SHA384-192/ HMAC- Algorithm SHA384-192/ HMAC-SHA512-256 SHA384-192/ HMAC- HMAC-SHA512-256 SHA512-256 Phase 2 Encryption Cleartext (NULL 3DES/AES-128/ AES-128/AES-192/...
  • Page 433 Configuring IPsec Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 434 5. Enhanced Network Security Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners.
  • Page 435 Configuring IPsec Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 436: Encryption Key Auto Exchange Settings Configuration Flow

    5. Enhanced Network Security Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings...
  • Page 437 Configuring IPsec Make encryption key auto exchange settings in [Settings 1]. If you want to make multiple settings, select the settings number and add settings. Click [OK]. Select [Active] for "IPsec" in "IPsec". Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission.
  • Page 438 5. Enhanced Network Security On the [Start] menu, click [Control Panel], click [System and Security], and then click [Administrative Tools]. Under Windows 8, hover the mouse pointer over the top- or bottom-right corner of the screen, and then click [Settings], [Control Panel], [System and Security], and then [Administrative Tools]. If you are using Windows XP, on the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then click [Administrative Tools].
  • Page 439 Configuring IPsec In [Name], enter an IP Filter name, and then click [Add]. The IP Filter Wizard appears. Click [Next]. If required, enter a description of the IP filter, and then click [Next]. For Windows XP, go to Step 22. Select "My IP Address"...
  • Page 440: Telnet Setting Commands

    5. Enhanced Network Security Select the filter action that was just created, and then click [Next]. If you set "Encryption Key Auto Exchange Settings" to "Authentication and High Level Encryption", select the IP filter action that was just created, click [Edit], and then check "Use session key perfect forward secrecy (PFS)"...
  • Page 441 Configuring IPsec Displays the following IPsec settings information: • IPsec settings values • Encryption key auto exchange settings, IKE setting 1-4 values • Encryption key auto exchange settings, IKE default setting values Display current settings portions msh> ipsec -p • Displays IPsec settings information in portions. ipsec exclude To display or specify protocols excluded by IPsec, use the "ipsec exclude"...
  • Page 442 5. Enhanced Network Security • To set the local or remote address values, specify masklen by entering [/] and an integer 0-32 when settings an IPv4 address. When setting an IPv6 address, specify masklen by entering [/] and an integer 0-128. •...
  • Page 443 Configuring IPsec Tunnel end point setting msh> ipsec ike {1|2|3|4|default} tunneladdr "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address. • Not specifying either the beginning or ending address displays the current setting. IKE partner authentication method setting msh>...
  • Page 444 5. Enhanced Network Security ISAKMP SA (phase 1) validity period setting msh> ipsec ike {1|2|3|4|default} ph1 lifetime "validity period" • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity period. • Enter the validity period (in seconds) from 300 to 172800. •...
  • Page 445 Configuring IPsec Reset setting values msh> ipsec ike {1|2|3|4|default|all} clear • Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying [all] resets all of the settings, including default.
  • Page 446: Configuring Ieee 802.1X Authentication

    5. Enhanced Network Security Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 447: Selecting The Device Certificate

    Configuring IEEE 802.1X Authentication Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see page 130 "Protecting the Communication Path via a Device Certificate".
  • Page 448 5. Enhanced Network Security • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 449: Setting Items Of Ieee 802.1X For Wireless Lan

    Configuring IEEE 802.1X Authentication • If there is a problem with settings, you might not be able to communicate with the machine. In such a case, access [Print List] in [Interface Settings] on the control panel, and then print the network summary to check the status.
  • Page 450 5. Enhanced Network Security PEAP • Click [Change] in "Password", and then enter the password set in the RADIUS server. If [TLS] is selected for "Phase 2 Method", you do not need to specify a password. • Click [Change] on "Phase 2 User Name", and then enter the user name set in the RADIUS server.
  • Page 451: Snmpv3 Encryption

    SNMPv3 Encryption SNMPv3 Encryption When using SmartDeviceMonitor for Admin/Device Manager NX Lite or another application that communicates via SNMPv3, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Log in as the network administrator from the control panel. Press [System Settings].
  • Page 452: Encrypting Transmitted Passwords

    5. Enhanced Network Security Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security against password cracking. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together. Also, encrypt the login password for administrator authentication and user authentication.
  • Page 453: Specifying An Ipp Authentication Password

    Encrypting Transmitted Passwords Press [Extended Security]. For "Driver Encryption Key", press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 454 5. Enhanced Network Security Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password"...
  • Page 455: Kerberos Authentication Encryption Setting

    Kerberos Authentication Encryption Setting Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 456 5. Enhanced Network Security Log out.
  • Page 457: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Managing Folders This section explains how to manage the folders in Document Server: how to delete folders, change their passwords, and unlock them when locked.
  • Page 458: Changing The Password Of A Folder

    6. Preventing the Leaking of Documents CXX002 Press [Edit Folder]. Select the folder. Press [Delete]. If a password entry screen appears, enter the password of the folder, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Delete].
  • Page 459: Unlocking Folders

    Managing Folders Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. If the message "You do not have the privileges to use this function." appears, press [Exit]. Press the [Home] key on the control panel, and press the [Document Server] icon on the screen.
  • Page 460 6. Preventing the Leaking of Documents If you specify [On] for "Enhance File Protection", the folder will be locked and become inaccessible if an invalid password is entered ten times. This section explains how to unlock folders. "Enhance File Protection" is one of the extended security functions. For details about this and other extended security functions, see page 257 "Specifying the Extended Security Functions".
  • Page 461: Managing Stored Files

    Managing Stored Files Managing Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server. This can prevent activities such as printing or sending of stored files by unauthorized users. You can also specify which users can change or delete stored files.
  • Page 462: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents Configuring Access Permission for Each Stored File This can be specified by the file administrator or owner. Specify the users and their access permissions for each stored file. • If files become inaccessible, reset their access permission as the owner. This can also be done by the file administrator.
  • Page 463 Managing Stored Files Select the folder. Select the file. Press [Change File Info.]. Press [Change Access Priv.].
  • Page 464 6. Preventing the Leaking of Documents Press [Program/Change/Delete]. Press [New Program]. Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 465: Changing The Owner Of A Document

    Managing Stored Files Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. • The "Edit", "Edit / Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 466 6. Preventing the Leaking of Documents Specify the users and their access permission to files stored by a particular user. This makes managing access permission easier than specifying and managing access permissions for each stored file. • If files become inaccessible, be sure to enable the user administrator, so that the user administrator can reset the access permission for the files in question.
  • Page 467: Specifying Passwords For Stored Files

    Managing Stored Files Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit]. Press [OK]. Press [Exit]. Log out. • The "Edit", "Edit / Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 468: Unlocking Stored Files

    6. Preventing the Leaking of Documents Select the file. Press [Change File Info.]. Press [Change Password]. Enter the new password for the stored file, and then press [OK]. You can use 4 to 8 numbers as the password for the stored file. Re-enter the password for confirmation, and then press [OK].
  • Page 469 Managing Stored Files Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. If the message "You do not have the privileges to use this function." appears, press [Exit]. Press the [Home] key on the control panel, and press the [Document Server] icon on the screen.
  • Page 470: Managing Locked Print Files

    6. Preventing the Leaking of Documents Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function.
  • Page 471 Managing Locked Print Files Press the [Home] key on the control panel, and press the [Printer] icon on the screen. CXX002 Press [Print Jobs]. Press [Locked Print Job]. Select the file.
  • Page 472: Changing The Password Of A Locked Print File

    6. Preventing the Leaking of Documents Press [Delete]. If a password entry screen appears, enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 473: Unlocking A Locked Print File

    Managing Locked Print Files Press [Locked Print Job]. Select the file. Press [Change Password]. If a password entry screen appears, enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK].
  • Page 474 6. Preventing the Leaking of Documents Log in as the file administrator from the control panel. Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen.
  • Page 475: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying The copier, Document Server, and printer functions let you embed a pattern in a printed copy to discourage or prevent unauthorized copying. If the Unauthorized Copy Prevention function is enabled, embedded text patterns (for instance, a warning message such as "No Copying") are displayed when documents are copied illegally.
  • Page 476: Enabling Pattern Printing

    6. Preventing the Leaking of Documents Enabling Pattern Printing You can enable embedded pattern printing to discourage or prevent unauthorized copying. Enabling embedded pattern printing in the Copier/Document Server functions Log in as the machine administrator from the control panel. Press [System Settings].
  • Page 477: Enabling Detect Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Unauthorized Copy Prevention Printing: Printer]. Press [Change] for "Unauthorized Copy Prevention Setting". Press [On], and then press [OK]. Press [Change] for "Compulsory Unauthorized Copy Prevention". Specify whether or not to make printing of the embedded pattern mandatory.
  • Page 478 6. Preventing the Leaking of Documents Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Detect Data Security for Copying]. Press [On]. If you do not want to specify "Detect Data Security for Copying", select [Off]. Press [OK]. Log out.
  • Page 479: Printing User Information On Paper

    Printing User Information on Paper Printing User Information on Paper The start time of the print job, information on the person who prints it (name or login user name), machine number and machine's IP address can be compulsorily embedded on printed sheets. This function is called Compulsory Security Stamp.
  • Page 480 6. Preventing the Leaking of Documents The user code or login user name in "Auth. Info" in the address book will be printed. • Machine ID The numbers displayed as the "Serial No. of Machine" in [Inquiry] will be printed. •...
  • Page 481: Enforced Storage Of Documents To Be Printed On A Printer

    Enforced Storage of Documents to be Printed on a Printer Enforced Storage of Documents to be Printed on a Printer By making it compulsory to keep jobs in the machine before printing them, you can prevent information leakage due to users failing to collect prints or leaving prints unattended. The following print jobs are subject to compulsory storage.
  • Page 482 6. Preventing the Leaking of Documents...
  • Page 483: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 484: Using Web Image Monitor To Manage Log Files

    7. Managing the Machine Using Web Image Monitor to Manage Log Files You can specify the types of log to store in the machine and the log collection level. You can also encrypt, bulk delete, or download log files. Logs That Can Be Managed Using Web Image Monitor The following tables explain the items in the job log and access log that the machine creates when you enable log collection using Web Image Monitor.
  • Page 485 Using Web Image Monitor to Manage Log Files Job Log Item Log Type Attribute Content Scanner: Stored File Scanner: Stored File Details of scan files stored in Document Server Downloading Downloading and downloaded using Web Image Monitor or Desk Top Editor For Production. Scanner: Stored File Scanner: Stored File Details of stored scan files that were also sent.
  • Page 486 7. Managing the Machine Job Log Item Log Type Attribute Content Printer: Document Printer: Document Details of files stored in Document Server Server Sending Server Sending when "Job Type:" was set to "Document Server" in printer properties. Report Printing Report Printing Details of reports printed from the control panel.
  • Page 487 Using Web Image Monitor to Manage Log Files Access Log Item Log Type Attribute Content Logout Logout Times of logout and identity of logged out users. File Storing File Storing Details of files stored in Document Server. Stored File Deletion Stored File Deletion Details of files deleted from Document Server.
  • Page 488 7. Managing the Machine Access Log Item Log Type Attribute Content Machine Data Machine Data Details of changes made to encryption keys Encryption Key Encryption Key using "Machine Data Encryption Key Change Change Change" setting. Firmware: Invalid Firmware: Invalid Details of checks for firmware validity made at times such as when the machine was switched Date/Time Change Date/Time Change...
  • Page 489: Attributes Of Logs You Can Download

    Using Web Image Monitor to Manage Log Files Access Log Item Log Type Attribute Content Import Device Setting Import Device Setting Log of when a device setting information file is Information Information imported. Export Device Setting Export Device Setting Log of when a device setting information file is Information Information exported.
  • Page 490 7. Managing the Machine File output format • Character Code Set: UTF-8 • Output Format: CSV (Comma-Separated Values) • File Names of Job Logs and Access Logs: "machine name +_log.csv" • File names for Eco-friendly Logs: "machine name+_ecolog.csv" Order of log entries Log entries are printed in ascending order according to Log ID.
  • Page 491 Using Web Image Monitor to Manage Log Files End Date/Time Indicates the end date and time of an operation or event. Log Type Details of the log type. For details about the information items contained in each type of log, see page 204 "Logs That Can Be Managed Using Web Image Monitor".
  • Page 492 7. Managing the Machine Value Content Completed The operation or event completed successfully on a job log entry. Failed The operation or event was unsuccessful on a job log entry. Succeeded The operation or event completed successfully on an access log entry.
  • Page 493 Using Web Image Monitor to Manage Log Files Value Content Write Error to Remote Machine An error occurred in writing to an output destination. Specified File: Incompatible The specified file is incompatible. Specified File: Format Error A format error occurred with the specified file. Specified File: Not Exist The specified file cannot be found.
  • Page 494 7. Managing the Machine Value Content External Charge Unit The accounting device is unplugged during operation. Disconnected Insufficient No. of Original for Pages are missing from a manuscript during execution of the Overlay overlaid copying. Exceed Max. Stored Page (File The storage capacity of pages on Document Server is Storage) exceeded.
  • Page 495 Using Web Image Monitor to Manage Log Files Value Content Data Transfer Interrupted Following cases are logged: • The driver being used is not matching. • A network malfunction occurs. • A job is cancelled by the LAN-Fax driver. • A fax communication failure occurs. Reception Error Fax failed to be received.
  • Page 496 7. Managing the Machine Value Content No Response There is not response from the destination. Not Facsimile Destination The destination is not a fax machine. Invalid Device Certificate Following case are logged: • The device certificate is missing. • The valid period has expired. •...
  • Page 497 Using Web Image Monitor to Manage Log Files Value Content 0xffffff8a Administrator 3 0xffffff8b Administrator 4 User Code/User Name Identifies the user code or user name of the user who performed the operation. If an administrator performed the operation, this ID will contain the login name of that administrator.
  • Page 498 7. Managing the Machine The number of server switches is indicated as 0 to 4. "0" indicates the authentication server is available. Logout Mode Mode of logout. Value Content by User's Operation Manual logout by the user by Auto Logout Timer Automatic logout following a timeout Login Method Indicates the route by which the authentication request is received.
  • Page 499 Using Web Image Monitor to Manage Log Files Target User Entry ID Indicates the entry ID of the target user. This is a hexadecimal ID that indicates users to whom the following settings are applied: • Lockout • Password Change Target User Code/User Name User code or user name of the user whose data was accessed.
  • Page 500 7. Managing the Machine Export Target Indicates the settings to be included in the device setting file to be exported. Value Content System Settings System Settings Copier Features Copier Features Facsimile Features Facsimile Features Printer Features Printer Features Scanner Features Scanner Features Program (Copier) Program (Copier)
  • Page 501 Using Web Image Monitor to Manage Log Files Value Content Delete Normal File Normal file deletion Auto Delete Automatic file deletion Others File deletion for other reason Folder Number Indicates the folder number. Folder Name Indicates the folder name. Creating/Deleting Folders Indicates the operations performed on folders.
  • Page 502 7. Managing the Machine Value Content Not Changed No changes have been made to the access log collection setting. Collect Eco-friendly Logs Indicates the status of the eco-friendly log collection setting. Value Content Active Eco-friendly log collection setting is enabled. Inactive Eco-friendly log collection setting is disabled.
  • Page 503 Using Web Image Monitor to Manage Log Files Value Content Job Log Job log Access Log Access log Eco-friendly Log Eco-friendly log Log Collect Level Indicates the level of log collection. Value Content Level 1 Level 1 Level 2 Level 2 User Settings User settings Encryption/Cleartext...
  • Page 504 7. Managing the Machine Primary Communication Protocol Indicates the primary communication protocol. Secondary Communication Protocol Indicates the secondary communication protocol. Encryption Protocol Indicates the protocol used to encrypt the communication. Communication Direction Indicates the direction of communication. Value Content Communication Start Request The machine received a request to start communication.
  • Page 505 Using Web Image Monitor to Manage Log Files Value Content Password Entry Violation Password entry violation Device Access Violation Device access violation Network Attack Type Details Indicates details of network attack types. Value Content Authentication Error Authentication error Encryption Error Encryption error Network Attack Route Identifies the route of the network attack.
  • Page 506 7. Managing the Machine Value Content Updated for Other Reasons The firmware update was performed using a method other than any of the above. Module Name Firmware module name. Parts Number Firmware module part number. Version Firmware version. Machine Data Encryption Key Operation Indicates the type of encryption key operation performed.
  • Page 507 Using Web Image Monitor to Manage Log Files Validity Error File Name Indicates the name of the file in which a validity error was detected. Configuration Category Indicates the categories with changed settings. Value Content User Lockout Policy User lockout policy Auto Logout Timer Auto logout timer Device Certificate...
  • Page 508 7. Managing the Machine Attribute Description Certificate No.: IEEE 802.1X The number of the certificate for applications is recorded. (WPA/WPA2) When a certificate is not used, "Do not Use" is recorded. Certificate No.: S/MIME The number of the certificate for applications is recorded. When a certificate is not used, "Do not Use"...
  • Page 509 Using Web Image Monitor to Manage Log Files Attribute Description Fax: Transferring The signature is recorded when transferring by fax. Fax: Email Sending The signature is recorded when the fax is used for sending email. Fax: Notification Email Sending The signature is recorded when the fax is used for sending email notification.
  • Page 510 7. Managing the Machine Value Content Printer The job file was sent from the printer driver. Received File The job file was received over the network. Report The job file was a printed report. Start Date/Time Dates and times "Scan File", "Received File" and "Printer" operations started. End Date/Time Dates and times "Scan File", "Received File"...
  • Page 511 Using Web Image Monitor to Manage Log Files Start Date/Time Dates and times "Print", "Store", and "Send" operations started. End Date/Time Dates and times "Print", "Store", and "Send" operations ended. Destination Name Names of "Send" destinations. Destination Address IP address, path, or e-mail address of "Send" destinations. Stored File ID Indicates the ID of data that is output as a store file.
  • Page 512 7. Managing the Machine Value Content Job Related Information Job related information Paper Usage Paper usage Power Consumption Power consumption Log Result Whether the event has ended or not is displayed. Value Content Completed Completed Failed Failed Result The result of the event is recorded. Value Content Succeeded...
  • Page 513 Using Web Image Monitor to Manage Log Files Value Content STR status Silent Print Silent print status Low Power Print Low power print status Fusing Unit Off Fusing unit off status Log Type The type of job log is recorded. Job Interval (seconds) Indicates the elapsed time from the start of the previous job to the start of the present job.
  • Page 514: Specifying Log Collect Settings

    7. Managing the Machine Value Content Scanning/Printing Simultaneous scanning and printing Printing Machine's printing status Scanning Machine's printing status Engine Standby Engine's standby status Engine Low Engine's low-power status Engine Night Engine's silent status Engine Total Machine's total electricity consumption Fusing Unit Off Fusing unit off status Power Consumption(Wh)
  • Page 515: Specifying Log Encryption

    Using Web Image Monitor to Manage Log Files Click [Logs] under "Device Settings". Select [Active] for each function: "Collect Job Logs", "Collect Access Logs" and "Collect Eco-friendly Logs". Specify the collection level for each function, "Job Log Collect Level", "Access Log Collect Level", and "Eco-friendly Log Collect Level".
  • Page 516: Downloading Logs

    7. Managing the Machine Downloading Logs Use the following procedure to convert the logs stored in the machine into a CSV file for simultaneous batch download. To collect logs, set the collection setting for the job log, access log and eco-friendly log to [Active]. This setting can be specified in [Logs] under [Configuration] in Web Image Monitor.
  • Page 517 Using Web Image Monitor to Manage Log Files When using Web Image Monitor to manage logs, download the logs at an interval appropriate to the conditions in the table. After downloading the logs, perform a batch deletion of the logs. If you change the [Collect] / [Do not Collect] setting for log collection, you must perform a batch deletion of the logs.
  • Page 518: Notes On Operation When The Number Of Log Entries Reaches Maximum

    7. Managing the Machine Notes on Operation When the Number of Log Entries Reaches Maximum If the number of logs that can be stored on the machine exceeds the specified maximum limit, old logs are overwritten by new logs. The maximum number of logs that can be stored is defined for each of the job log, access log and eco-friendly log.
  • Page 519 Using Web Image Monitor to Manage Log Files If logs are downloaded during overwriting CJD007 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs.
  • Page 520: Printer Job Logs

    7. Managing the Machine Printer Job Logs Print Log entries are made before the login entry is made in the Access Log. Details of series of jobs (including reception, processing, and output of the jobs' data) are combined into single entries. When the machine receives a print job, it creates an ID for the job and records this in the job log.
  • Page 521: Deleting All Logs

    Using Web Image Monitor to Manage Log Files 9. Information about the outputting of the print job is recorded as an entry in the Job Log (using the same ID). 10. Authentication (logout) data is recorded as an entry in the Access Log. Deleting All Logs Use the following procedure to delete all logs stored in the machine.
  • Page 522: Managing Logs From The Machine

    7. Managing the Machine Managing Logs from the Machine You can specify settings such as whether or not to transfer logs to the log collection server and whether or not to delete all logs. Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer from the machine to the log collection server.
  • Page 523: Managing Logs From The Log Collection Server

    Managing Logs from the Machine Managing Logs from the Log Collection Server For details about using the log collection server to manage Log Files, see the manual supplied with the log collection server.
  • Page 524: Configuring The Home Screen For Individual Users

    7. Managing the Machine Configuring the Home Screen for Individual Users This allows each user to use their own home screen. When a user logs in, their personalized home screen is displayed. This setting is applied to the standard operation panel. Log in as the machine administrator from the control panel.
  • Page 525 Configuring the Home Screen for Individual Users • When Menu Protect has been set to [Level 1] or [Level 2], have the administrator create any necessary programs. • Only the icons of functions an administrator has permitted to be used are displayed. •...
  • Page 526: Configuring The Browser Functions

    7. Managing the Machine Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 527 Configuring the Browser Functions Messages • "This site has a security problem. The certificate has expired." • "This site has a security problem. The root certificate for verification does not exist." • "This site has a security problem. Verification of the server to connect to cannot be performed." •...
  • Page 528: Managing Device Information

    7. Managing the Machine Managing Device Information • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. The machine's device information can be set by an administrator with privileges to manage everything — devices, users, networks and files.
  • Page 529: Exporting Device Information

    Managing Device Information • Counters • Settings that can only be specified via Web Image Monitor or Web Service (for example, Bonjour, SSDP setting) • The file format for exports is CSV. • The device configuration of the machine importing the device setting information file must be the same as that of the machine, which exported the device setting information file.
  • Page 530: Importing Device Information

    7. Managing the Machine Press [ Next] four times. Press [Device Setting Information: Export (Memry Strge Devc)]. Set the export conditions. • Specify whether to [Include] or [Exclude] the "Device Unique Information". "Device Unique Information" includes the IP address, host name, fax number, etc. •...
  • Page 531 Managing Device Information Insert an SD card into the media slot on the side of the control panel. For details about inserting the SD card, see "Inserting/Removing a Memory Storage Device", Getting Started. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 532: Troubleshooting

    7. Managing the Machine Troubleshooting If an error occurs, check the log's result code first. Values other than 0 indicate that an error occurred. The result code will appear in the circled area illustrated below. Example of a log file "1.0.0"...
  • Page 533 Managing Device Information ResultCode Cause Solutions 9 (DEVICE ERROR) Failed to write or read Check whether the path to the folder for storing the log file. the file or the folder in which the file is stored is missing. 10 (LOG ERROR) Failed to write the log Contact your service representative.
  • Page 534: Managing Eco-Friendly Counter

    7. Managing the Machine Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter displays the ratio of use of color, duplex and combine printing to the total number of printed sheets. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 535: Clearing A Machine's Eco-Friendly Counter

    Managing Eco-friendly Counter Default: [Fixed Message 1] Display Information Screen Specify whether or not to display the information screen at user login. Default: [Off] Display Time Specify the timing for displaying the information screen. Default: [Every Time Login] Clearing a Machine's Eco-friendly Counter A machine's eco-friendly counter can be cleared.
  • Page 536: Managing The Address Book

    7. Managing the Machine Managing the Address Book Specifying Auto Deletion of Address Book Data Specify how the machine handles a request for auto registration after the registered data in the address book has reached the limit. If you set this to [On], new user accounts are added by automatically deleting old user accounts. Accounts that have not been used for the longest time are deleted first.
  • Page 537: Specifying The Extended Security Functions

    Specifying the Extended Security Functions Specifying the Extended Security Functions In addition to providing basic security through user authentication and each administrator's specified limits to access the machine, security can also be increased by encrypting transmitted data and data in the Address Book.
  • Page 538 7. Managing the Machine If [Simple Encryption] is specified, all jobs that pass user authentication are accepted. If [DES] is specified, jobs encrypted with DES or AES are accepted. If [AES] is specified, jobs encrypted with AES are accepted. If you select [AES] or [DES], specify the encryption settings using the printer driver. For details about specifying the printer driver, see the printer driver Help.
  • Page 539 Specifying the Extended Security Functions Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) This can be specified by the user administrator. The available fax and scanner destinations are limited to the destinations registered in the Address Book. A user cannot directly enter the destinations for transmission. If "Restrict Use of Destinations (Scanner)"...
  • Page 540 7. Managing the Machine For details, see "Reception Functions", Fax. Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 541 Specifying the Extended Security Functions The administrator can confirm if the updated structure change is permissible or not by checking the firmware version displayed on the control panel screen. If the firmware structure change is not permissible, contact your service representative before logging in. When "Change Firmware Structure"...
  • Page 542 7. Managing the Machine Specify the time to limit repeated access by a user. Use the number keys to enter the time between "0" and "60", and then press [ ]. Default: [15] • Managed User Host Limit Specify the number of user accounts to manage under "Security Setting for Access Violation".
  • Page 543 Specifying the Extended Security Functions • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values. Device Access Violation This can be specified by the machine administrator.
  • Page 544 7. Managing the Machine • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values.
  • Page 545: Other Security Functions

    Other Security Functions Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 546: Scanner Function

    7. Managing the Machine Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 547: Restricting A Customer Engineer Operation

    Restricting a Customer Engineer Operation Restricting a Customer Engineer Operation You can restrict the customer engineer's access to the service mode. Service mode is used by a customer engineer for inspection or repair. If you set "Service Mode Lock" to [On], service mode cannot be used unless the machine administrator logs on to the machine and cancels the service mode lock to allow a customer engineer to operate the machine for inspection and repair.
  • Page 548: Additional Information For Enhanced Security

    7. Managing the Machine Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 549 Additional Information for Enhanced Security Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See page 257 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See page 257 "Specifying the Extended Strength Security Functions". Administrator Extended Security Access Privilege...
  • Page 550: Settings You Can Configure Using Web Image Monitor

    7. Managing the Machine Scanner Features Item Setting Initial Settings Menu Protect Level 2 See page 78 "Specifying Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 551 Additional Information for Enhanced Security Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see page 69 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 552: Settings You Can Configure When Ipsec Is Available/Unavailable

    7. Managing the Machine Settings You Can Configure When IPsec Is Available/Unavailable All communication to and from machines on which IPsec is enabled is encrypted. If your network supports IPsec, we recommend you enable it. Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network.
  • Page 553 Additional Information for Enhanced Security • You can set "IPsec" and "Permit SSL/TLS Communication" using Web Image Monitor. Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. •...
  • Page 554 7. Managing the Machine • For details about specifying the IPsec setting via Web Image Monitor, see page 148 "Configuring IPsec".
  • Page 555: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication. If a message not shown below is displayed, follow the message to resolve the problem. "You do not have the privileges to use this function."...
  • Page 556 8. Troubleshooting "Failed to obtain URL." The machine is connected to the server, but the UA service is not responding properly. • Make sure the UA service is specified correctly. "Failed to obtain URL." SSL is not specified correctly on the server. •...
  • Page 557: If An Error Code Is Displayed

    If an Error Code is Displayed If an Error Code is Displayed When authentication fails, the message "Authentication has failed." appears with an error code. The following lists provide solutions for each error code. If the error code that appears is not on the lists, write down the error code and contact your service representative.
  • Page 558: Windows Authentication

    8. Troubleshooting B0206-002 : Case 2 The user attempted authentication from an application on the "System Settings" screen, where only the administrator has authentication ability. • Only the administrator has login privileges on this screen. • Log in as a general user from the application's login screen. B0206-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark (").
  • Page 559 If an Error Code is Displayed W0206-002 The user attempted authentication from an application on the "System Settings" screen, where only the administrator has authentication ability. • Only the administrator has login privileges on this screen. • Log in as a general user from the application's login screen. W0206-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark (").
  • Page 560 8. Troubleshooting • Recreate the account if the account name contains any of these prohibited characters. • If the account name was entered incorrectly, enter it correctly and log on again. W0406-101 Authentication cannot be completed because of the high number of authentication attempts. •...
  • Page 561 If an Error Code is Displayed • Make sure that the user is registered on the server. • Use a registered login user name and password. W0406-107 : Case 6 A domain name error occurred. • Make sure that the Windows authentication domain name is specified correctly. W0406-107 : Case 7 Cannot resolve the domain name.
  • Page 562: Ldap Authentication

    8. Troubleshooting • Kerberos authentication will fail if the realm name is specified in lower-case letters. Make sure the realm name is specified in capital letters. • Kerberos authentication will fail if automatic retrieval for KDC fails. Ask your service representative to make sure the KDC retrieval settings are set to "automatic retrieval".
  • Page 563 If an Error Code is Displayed L0104-000 Failed to encrypt password. • A password error occurred. Make sure the password is entered correctly. • Either [DES] or [AES] is selected for "Driver Encryption Key: Encryption Strength". You can make access by specifying the driver encryption key. •...
  • Page 564 8. Troubleshooting L0406-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark ("). • Recreate the account if the account name contains any of these prohibited characters. • If the account name was entered incorrectly, enter it correctly and log in again. L0406-200 Authentication cannot be completed because of the high number of authentication attempts.
  • Page 565 If an Error Code is Displayed • In simple authentication mode, the DN of the login user name is obtained in the user account. Authentication fails if the DN cannot be obtained. Make sure there are no errors in the server name, login user name/password, or information entered for the search filter.
  • Page 566: Integration Server Authentication

    8. Troubleshooting L0707-001 An authentication error occurred because the Address Book is being used at another location. • Wait a few minutes and then try again. Integration Server Authentication I0103-000 A TWAIN operation occurred during authentication. • Make sure no other user is logged in to the machine, and then try again. I0104-000 Failed to decrypt password.
  • Page 567 If an Error Code is Displayed • Ask the user administrator to unlock the account. I0406-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark ("). • Recreate the account if the account name contains any of these prohibited characters. •...
  • Page 568 8. Troubleshooting I0612-005 Authentication failed because no more users can be registered. (The number of users registered in the Address Book has reached capacity.) • Ask the user administrator to delete unused user accounts in the Address Book. I0707-001 An authentication error occurred because the Address Book is being used at another location. •...
  • Page 569: If The Machine Cannot Be Operated

    If the Machine Cannot Be Operated If the Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide the instructions on how to deal with them. Condition Cause Solution Cannot perform the following: User authentication has been Confirm the user name and rejected.
  • Page 570 8. Troubleshooting Condition Cause Solution After starting "User "Driver Encryption Set "Driver Encryption Management Tool" or "Address Key:Encryption Strength" is not Key:Encryption Strength" to Management Tool" in set correctly. Alternatively, [Simple Encryption]. SmartDeviceMonitor for "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", Admin/Device Manager NX although the required certificate install the server certificate in the...
  • Page 571 If the Machine Cannot Be Operated Condition Cause Solution "Prg. Dest." does not appear on "Restrict Adding of User Registration must be done by the fax or scanner screen for Destinations (Fax)" and/or the user administrator. specifying destinations. "Restrict Adding of User Destinations (Scanner)"...
  • Page 572 8. Troubleshooting Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination • Cannot select an address. certificate) has expired.
  • Page 573 If the Machine Cannot Be Operated Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet destinations specified using been disabled without "All and select [All Users] as the the machine do not appear. Users" being selected for access permission setting of the "Protect Destination".
  • Page 574 8. Troubleshooting...
  • Page 575: List Of Operation Privileges For Settings

    9. List of Operation Privileges for Settings This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. How to Read Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 576: System Settings

    9. List of Operation Privileges for Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [General Features] Settings User Mach N/W File Unset [Program / Change / Delete User Text] [Panel Key Sound] [Warm-up Beeper] [Copy Count Display]...
  • Page 577 System Settings [Tray Paper Settings] Settings User Mach N/W File Unset [Paper Tray Priority: Copier] [Paper Tray Priority: Facsimile] [Paper Tray Priority: Printer] [Tray Paper Size: Tray 1-4] [Printer Bypass Paper Size] [Paper Type: Bypass Tray] [Paper Type: Tray 1-4] [Cover Sheet Tray] [Slip Sheet Tray] [Double Feed Detect]...
  • Page 578 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Weekly Timer] [Interface Settings] [Network] Settings User Mach N/W File Unset [Machine IPv4 Address] [IPv4 Gateway Address] [Machine IPv6 Address] [IPv6 Gateway Address] [IPv6 Stateless Address Autoconfiguration] [DHCPv6 Configuration] [DNS Configuration] [DDNS Configuration]...
  • Page 579 System Settings Settings User Mach N/W File Unset [Permit SSL / TLS Communication] [Host Name] [Machine Name] [IEEE 802.1X Authentication for Ethernet] [Restore IEEE 802.1X Authentication to – – – – Defaults] *2 When auto-obtain is set, the data is read-only. *3 All administrators and users can run a test of connections.
  • Page 580 9. List of Operation Privileges for Settings [Print List] Settings User Mach N/W File Unset [Print List] – – – – [File Transfer] Settings User Mach N/W File Unset [Delivery Option] [Capture Server IPv4 Address] [Fax RX File Transmission] [SMTP Server] [SMTP Authentication] [POP before SMTP] [Reception Protocol]...
  • Page 581 System Settings *5 Passwords cannot be read. [Administrator Tools] Settings User Mach N/W File Unset [Address Book Management] [Address Book: Program / Change / Delete Group] [Address Book: Change Order] – – – – [Print Address Book: Destination List] – –...
  • Page 582 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Print Volum. Use Limit.: Default Limit Value] [Media Slot Use] [User Authentication Management] [Enhanced Authentication Management] [Administrator Authentication Management] – *10*11 [Program / Change Administrator] – – [Key Counter Management] [External Charge Unit Management] [Enhanced External Charge Unit...
  • Page 583 System Settings Settings User Mach N/W File Unset • [Remote Diagnostics (Facsimile)] – – – – – • [Authenticate Current Job] • [@Remote Service] • [Update Firmware] – – • [Change Firmware Structure] – – • [Password Policy] – – –...
  • Page 584 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Erase All Memory] – – – – – [Delete All Logs] – – – – [Transfer Log Setting] [Detect Data Security for Copying] [Unauthorized Copy Prevention Printing: Copier] [Unauthorized Copy Prevention Printing: Document Server]...
  • Page 585 System Settings Settings User Mach N/W File Unset [User's Own Customization] [Volume Use Counter: Scheduled/Specified Reset Settings] [Select Switchable Languages] – – – – *5 Passwords cannot be read. *6 Only changing headings and user searches are possible. *7 The items that can be executed, changed and read differ according is set to access privilege. *8 Can only be cleared.
  • Page 586: Edit Home (When Using The Standard Operation Panel)

    9. List of Operation Privileges for Settings Edit Home (When Using the Standard Operation Panel) When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". You cannot use this setting when using the Smart Operation Panel. [Edit Home] Settings User...
  • Page 587: Copier / Document Server Features

    Copier / Document Server Features Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Features] Settings User Mach N/W File Lv.1 Lv.2 [Auto Image Density Priority] [Original Type Priority] [Original Photo Type Priority] [Original Type Display]...
  • Page 588 9. List of Operation Privileges for Settings [Edit] Settings User Mach N/W File Lv.1 Lv.2 [Front Margin: Left / Right] [Back Margin: Left / Right] [Front Margin: Top / Bottom] [Back Margin: Top / Bottom] [1 Sided 2 Sided Auto Margin: TtoT] [1 Sided 2 Sided Auto Margin: TtoB] [Erase Border Width] [Erase Original Shadow in Combine]...
  • Page 589 Copier / Document Server Features [Preset Stamp] Settings User Mach N/W File Lv.1 Lv.2 [Stamp Language] [Stamp Priority] [Stamp Format]: COPY [Stamp Format]: URGENT [Stamp Format]: PRIORITY [Stamp Format]: For Your Info. [Stamp Format]: PRELIMINARY [Stamp Format]: For Internal Use Only [Stamp Format]: CONFIDENTIAL [Stamp Format]: DRAFT [Stamp Color]: COPY...
  • Page 590 9. List of Operation Privileges for Settings [User Stamp] Settings User Mach N/W File Lv.1 Lv.2 [Program / Delete Stamp] [Stamp Format]: 1-4 [Stamp Color]: 1-4 [Date Stamp] Settings User Mach N/W File Lv.1 Lv.2 [Format] [Font] [Size] [Superimpose] [Stamp Color] [Stamp Setting] *1 Only adjustments to print position can be set.
  • Page 591 Copier / Document Server Features Settings User Mach N/W File Lv.1 Lv.2 [Stamp Position:-1-,-2-...] [Stamp Position:P.1,P.2...] [Stamp Position:1,2...] [Stamp Position:1-1,1-2...] [Superimpose] [Stamp Color] [Page Numbering Initial Letter] *1 Only adjustments to print position can be set. The print position itself cannot be configured. [Stamp Text] Settings User...
  • Page 592 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Memory Full Auto Scan Restart] [Letterhead Setting] [Staple Position] [Punch Type] [Simplified Screen: Finishing Types] [Adjust Color Image] Settings User Mach N/W File Lv.1 Lv.2 [Background Density of ADS (Full Color / Two-color)] [Color Sensitivity] [A.C.S.
  • Page 593: Facsimile Features

    Facsimile Features Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Quick Operation Key 1-3] [Switch Title] [Search Destination] [Communication Page Count] [Adjust Sound Volume] [Box Setting] –...
  • Page 594 9. List of Operation Privileges for Settings [Reception Settings] Settings User Mach N/W File Lv.1 Lv.2 [Reception File Settings] [Switch Reception Mode] [Program Special Sender] – – – – – [Program Special Sender: Print List] – – – – – [Stored Reception File User Setting] [SMTP RX File Delivery Settings] [2 Sided Print]...
  • Page 595 Facsimile Features Settings User Mach N/W File Lv.1 Lv.2 [Program Fax Information] [Enable H.323] [Enable SIP] [H.323 Settings] [SIP Settings] [Program / Change / Delete Gateway] [Menu Protect] [E-mail Setting] [Folder Setting] [File Type to Transfer] [Security for E-mail TX Results]...
  • Page 596: Printer Functions

    9. List of Operation Privileges for Settings Printer Functions This section lists the printer function items that appear if [Printer] on the Home screen is pressed. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect"...
  • Page 597: Printer Features

    Printer Features Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [List / Test Print] Settings User Mach N/W File Lv.1 Lv.2 [Multiple Lists] – – – [Configuration Page] – –...
  • Page 598 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Store and Skip Errored Job] [Memory Overflow] [Auto Cancel Conf. for PDL Error Job] [Auto Cancel for Print Job(s) on Error] [Job Separation] [Rotate Sort: Auto Paper Continue] [Rotate by 180 Degrees] [Print Compressed Data] [Duplex]...
  • Page 599 Printer Features [Host Interface] Settings User Mach N/W File Lv.1 Lv.2 [I/O Buffer] [I/O Timeout] [PCL Menu] Settings User Mach N/W File Lv.1 Lv.2 [Orientation] [Form Lines] [Font Source] [Font Number] [Point Size] [Font Pitch] [Symbol Set] [Courier Font] [Extend A4 Width] [Append CR to LF] [Resolution] [PS Menu]...
  • Page 600 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Toner Saving] [Color Setting] [Color Profile] [Process Color Model] [Orientation Auto Detect] [Gray Reproduction] [PDF Menu] Settings User Mach N/W File Lv.1 Lv.2 [Change PDF Password] [PDF Group Password] [Reverse Order Printing] [Resolution]...
  • Page 601: Scanner Features

    Scanner Features Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Switch Title] [Update Delivery Server Destination List] – – – –...
  • Page 602 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Blank Page Detect] [Reproduction Ratio] [Program / Change / Delete Scan Size] [Send Settings] Settings User Mach N/W File Lv.1 Lv.2 [Compression (Black & White)] [Compression Method (Black & White)] [Compression (Gray Scale / Full Color)] [Compression Method for High Compression PDF]...
  • Page 603: Browser Features

    Browser Features Browser Features When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Browser Default Settings] [Settings per Users] [View Logs]...
  • Page 604: Extended Feature Settings

    9. List of Operation Privileges for Settings Extended Feature Settings [Extended Feature Settings] Settings User Mach N/W File Unset [Startup Setting] [Install] [Uninstall] [Extended Feature Info] [Administrator Tools] – – – – – [Add.Program Startup Setting] [Install Add.Program] [Uninstall Add.Program] [Add.Program Info]...
  • Page 605: Maintenance

    Maintenance Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Maintenance] Settings User Mach N/W File Unset [Auto Color Calibration] – – – – [Color Registration] – – – – [Plain Paper Setting] –...
  • Page 606: Screen Features (When Using The Smart Operation Panel)

    9. List of Operation Privileges for Settings Screen Features (When Using the Smart Operation Panel) These settings appear if you press [Screen Features] on the home screen. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings".
  • Page 607 Screen Features (When Using the Smart Operation Panel) [Keyboard] Settings User Mach N/W File Unset [Language settings] – – – – [Keyboard settings] – – – – [Screen Device Settings Information] Settings User Mach N/W File Unset [Status] – – [Legal information] –...
  • Page 608: Edit Home (When Using The Smart Operation Panel)

    9. List of Operation Privileges for Settings Edit Home (When Using the Smart Operation Panel) This section describes the user privileges associated with the settings that can be specified by pushing the home screen or holding down icons on the home screen. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings".
  • Page 609: Web Image Monitor: Display Eco-Friendly Counter

    Web Image Monitor: Display Eco-friendly Counter Web Image Monitor: Display Eco-friendly Counter These settings are in [Status/Information]. Each user can only view his or her own counter. Settings User Mach File Unset [Download] – – – – – [Device Total Counter] –...
  • Page 610: Web Image Monitor: Job

    9. List of Operation Privileges for Settings Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. [Job List] Settings User Mach N/W File Unset [Current/Waiting Jobs]: [Change Order] – – – – –...
  • Page 611 Web Image Monitor: Job Settings User Mach N/W File Unset [Fax Remote Send History] – – – [Scanner Remote Send History] – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 612: Web Image Monitor: Device Settings

    9. List of Operation Privileges for Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [System] Settings User Mach N/W File...
  • Page 613 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Cover Sheet Tray] [Slip Sheet Tray] [Function Key Allocation/Function Priority] Settings User Mach N/W File Unset [Function Key Allocation] [Function Priority] *1 This does not appear on Smart Operation Panel. [Paper] Settings User...
  • Page 614 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [System Auto Reset Timer] [Copier/Document Server Auto Reset Timer] [Facsimile Auto Reset Timer] [Scanner Auto Reset Timer] [Printer Auto Reset Timer] [Auto Logout Timer] [Fusing Unit Off Mode On/Off] [Weekly Timer] [Logs] Settings...
  • Page 615 Web Image Monitor: Device Settings [Email] Settings User Mach N/W File Unset [Administrator Email Address] – – – [Signature] – – – [Reception Protocol] – – – [Email Reception Interval] – – – [Max. Reception Email Size] – – – [Email Storage in Server] –...
  • Page 616 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Receive Fax Email] – – – – [Fax Email User Name] – – – – [Fax Email Password] – – – – [Email Notification E-mail Address] – –...
  • Page 617 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [SMB Password] – – – – [FTP User Name] – – – – [FTP Password] – – – – [NCP User Name] – – – – [NCP Password] – –...
  • Page 618 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Network Administrator Authentication] [Available Settings for Network Administrator] [File Administrator Authentication] [Available Settings for File Administrator] [Program/Change Administrator] Settings User Mach N/W File Unset [User Administrator] – –...
  • Page 619 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Change] – – – – [Delete] – – – – [Firmware Update] Settings User Mach N/W File Unset [Update] – – – – – [Firmware Version] – – – –...
  • Page 620 9. List of Operation Privileges for Settings [Compulsory Security Stamp] Settings User Mach N/W File Unset [Copier] [Document Server] [Facsimile] [Printer] [Unauthorized Copy Prevention: Copier] Settings User Mach N/W File Unset [Compulsory Unauthorized Copy Prevention] [Unauthorized Copy Prevention Type] [Mask Type for Pattern/Density/Effect] [Prevention Text Settings] [Unauthorized Copy Prevention: Document Server] Settings...
  • Page 621 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Prevention Text Settings]...
  • Page 622: Web Image Monitor: Printer

    9. List of Operation Privileges for Settings Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Basic Settings] Settings User Mach N/W File Lv.1...
  • Page 623 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 [Tray Setting Priority] [Store and Skip Errored Job] [Edge to Edge Print] [Default Printer Language] [Tray Switching] [List/Test Print Lock] [Extended Auto Tray Switching] [Virtual Printer] [Restrict Direct Print Jobs] [Initial screen switch setting] [Host Interface] [PCL Menu]...
  • Page 624 9. List of Operation Privileges for Settings [PDF Group Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Group Password] – – – – – [PDF Fixed Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Fixed Password] – – –...
  • Page 625 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 [PDF Menu] [RHPP Settings] [Permissions for Printer Language to Operate File System] Settings User Mach N/W File Lv.1 Lv.2 [PJL] [PDF, PostScript]...
  • Page 626: Web Image Monitor: Fax

    9. List of Operation Privileges for Settings Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Initial Settings] Settings User Mach N/W File Lv.1...
  • Page 627 Web Image Monitor: Fax [Reception File Settings] Settings User Mach N/W File Lv.1 Lv.2 [Output Mode Switch Timer] – – – – – [Prohibit Auto Print] – – – – – [Print Standby to Print Files] – – – – –...
  • Page 628: Web Image Monitor: Scanner

    9. List of Operation Privileges for Settings Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1...
  • Page 629 Web Image Monitor: Scanner Settings User Mach N/W File Lv.1 Lv.2 [High Compression PDF Level] [Compression Method for High Compression PDF] [Max. Email Size] [Divide & Send Email] [Insert Additional Email Info] [No. of Digits for Single Page Files] [Stored File Email Method] [Default Email Subject] *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user privilege becomes R/W.
  • Page 630 9. List of Operation Privileges for Settings [Default Settings for Simplified Screens on Device] Settings User Mach N/W File Lv.1 Lv.2 [Scan Settings] – – – [Send File Type] – – –...
  • Page 631: Web Image Monitor: Interface

    Web Image Monitor: Interface Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Interface Settings] Settings User Mach N/W File Unset [LAN Type]...
  • Page 632 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Security Method] [WEP Settings] [WPA2 Settings]...
  • Page 633: Web Image Monitor: Network

    Web Image Monitor: Network Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [IPv4] Settings User Mach N/W File Unset [IPv4] [Host Name]...
  • Page 634 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Domain Name] [Link-local Address] [Stateless Address] [Manual Configuration Address] [DHCPv6] [DHCPv6 Address] [DDNS] [LLMNR] [Details] *2 IPv6 cannot be disabled from Web Image Monitor when using IPv6 transmission. [NetWare] Settings User...
  • Page 635 Web Image Monitor: Network [SNMP] Settings User Mach N/W File Unset [SNMP] – – – – – [Protocol] – – – – – [SNMPv1,v2 Setting] – – – – – [Community] – – – – – [SNMPv3] Settings User Mach N/W File Unset [SNMP]...
  • Page 636 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Local Hostname] [Details] [Print Order Priority] [System Log] Settings User Mach N/W File Unset [System Log] –...
  • Page 637: Web Image Monitor: Security

    Web Image Monitor: Security Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Network Security] – – – – – [Access Control] – – – – – [IPP Authentication] – – – –...
  • Page 638: Web Image Monitor: @Remote

    9. List of Operation Privileges for Settings Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Setup RC Gate] – – – – – [Update RC Gate Firmware] – – – – –...
  • Page 639: Web Image Monitor: Webpage

    Web Image Monitor: Webpage Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Webpage] Settings User Mach N/W File Unset [Webpage Language] [Web Image Monitor Auto Logout]...
  • Page 640: Web Image Monitor: Extended Feature Settings

    9. List of Operation Privileges for Settings Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Startup Setting] – – – – – [Extended Feature Info] [Install] – – – –...
  • Page 641: Web Image Monitor: Address Book

    Web Image Monitor: Address Book Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset [Add User] – – – [Change] – – – [Delete] – – – [Add Group] – – – [Data Carry-over Setting for Address Book –...
  • Page 642: Web Image Monitor: Reset Printer Job

    9. List of Operation Privileges for Settings Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset [Reset Current Job] – – – – – [Reset All Jobs] – – – – –...
  • Page 643: Web Image Monitor: Reset The Machine

    Web Image Monitor: Reset the Machine Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Reset the Machine] –...
  • Page 644: Web Image Monitor: Device Home Management (When Using The Standard Operation Panel)

    9. List of Operation Privileges for Settings Web Image Monitor: Device Home Management (When Using the Standard Operation Panel) These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach...
  • Page 645: Web Image Monitor: User's Own Customization (When Using The Smart Operation Panel)

    Web Image Monitor: User's Own Customization (When Using the Smart Operation Panel) Web Image Monitor: User's Own Customization (When Using the Smart Operation Panel) These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings".
  • Page 646: Web Image Monitor: Screen Monitoring

    9. List of Operation Privileges for Settings Web Image Monitor: Screen Monitoring These settings are in [Device Management]. Settings User Mach File Unset [Display Device's Screen] – – – – –...
  • Page 647: Web Image Monitor: Customize Screen Per User

    Web Image Monitor: Customize Screen per User Web Image Monitor: Customize Screen per User This appears if [User's Own Customization] is set to [Allow]. Users can change only their own settings. Settings User Mach File Unset [Edit Icons] – – –...
  • Page 648: Web Image Monitor: Document Server

    9. List of Operation Privileges for Settings Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see page 371 "List of Operation Privileges for Stored Files". Settings User Mach...
  • Page 649: Web Image Monitor: Fax Received File

    Web Image Monitor: Fax Received File Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset [Print] – – – – [Delete] – – – – [Download] – – – – Edit detailed information] –...
  • Page 650: Web Image Monitor: Printer: Print Jobs

    9. List of Operation Privileges for Settings Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 651: List Of Operation Privileges For Stored Files

    List of Operation Privileges for Stored Files List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 652 9. List of Operation Privileges for Settings *1 The owner can change operation privileges.
  • Page 653: List Of Operation Privileges For Address Books

    List of Operation Privileges for Address Books List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 654 9. List of Operation Privileges for Settings Settings Read Edit Full Entry User [Login User Name] – – – – [Login Password] – – – – [SMTP Authentication] – – – – [Folder Authentication] [LDAP Authentication] – – – – [Available Functions] –...
  • Page 655 List of Operation Privileges for Address Books Settings Read Edit Full Entry User [Select Line] [Adv. Features] [International TX Mode] [Fax Header] [Label Insertion] [E-mail] Settings Read Edit Full Entry User [E-mail Address] [Use E-mail Address for] [Send via SMTP Server] [Folder] Settings Read...
  • Page 656 9. List of Operation Privileges for Settings Settings Read Edit Full Entry User [Search] [Switch Title] • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 657: Trademarks

    Trademarks Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. LINUX is a registered trademark of Linus Torvalds.
  • Page 658 9. List of Operation Privileges for Settings ® ® Microsoft Windows 7 Home Premium ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows 8 are as follows: ®...
  • Page 659: Index

    INDEX Error code............Error message............Access Control............. ESP Protocol............Access permission for stored files...... Extended security functions........ Address Book access permission......Administrator............Administrator privileges........Firmware validity..........Administrator registration........AH Protocol..........148, 149 IEEE 802.1X............AH Protocol + ESP Protocol....... 148, 149 device certificate.............
  • Page 660 Password for stored files........Windows authentication........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax)..Restrict Adding of User Destinations (Scanner) Restrict Display of User Information....Restrict Use of Destinations (Fax).......
  • Page 662 D176-7576 © 2013...

This manual is also suitable for:

Mp c2503 series

Table of Contents