Ricoh AFICIO MP C305SP Manual
Hide thumbs Also See for AFICIO MP C305SP:
Table of Contents

Advertisement

Printed in China
EN
US
D118-7504
Read This First
Manuals Provided with This Machine
Safety Information
Information for This Machine
Appendix
For information not in this manual, refer to
the HTML/PDF files on the supplied
CD-ROM.
Read this manual carefully before you use this machine and keep
it handy for future reference. For safe and correct use, be sure to
read the Safety Information in this manual before using the
machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh AFICIO MP C305SP

  • Page 1 Read This First Manuals Provided with This Machine Safety Information Information for This Machine Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 2: Table Of Contents

    TABLE OF CONTENTS Introduction.................................3 How to Read the Manuals..........................4 Symbols Used in the Manuals........................4 Disclaimer................................4 Notes................................4 Machine Types...............................5 1. Manuals Provided with This Machine Manuals for This Machine..........................7 Manuals List..............................10 On-screen Operating Instructions........................11 Formats of the Operating Instructions......................11 Reading the HTML Manuals on the CD-ROM..................11 Installing and Opening the HTML Manuals....................12 Reading the PDF Manuals on the CD-ROM....................12 2.
  • Page 3 Notes to Canadian Users of Facsimile Unit....................33 Remarques à l'attention des utilisateurs canadiens de l'unité Fax............33 ENERGY STAR Program..........................34 Energy Saving Functions..........................35 Notes to users in the state of California (Notes to Users in USA)..............36 4. Appendix Trademarks...............................37...
  • Page 4: Introduction

    Introduction Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine.
  • Page 5: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 6: Machine Types

    Machine Types Check the type of your machine before reading the manuals. • Type 1: MP C305SP/Aficio MP C305SP • Type 2: MP C305SPF/Aficio MP C305SPF Certain types might not be available in some countries. For details, please contact your local dealer.
  • Page 8: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 9 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 10 Manuals for This Machine • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian. • The following software products are referred to using general names: Product name General name ScanRouter EX Professional the ScanRouter delivery software ScanRouterEX Enterprise *1 The ScanRouter EX Professional and ScanRouterEX Enterprise are no longer available for sale.
  • Page 11: Manuals List

    1. Manuals Provided with This Machine Manuals List Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided User Guide Read This First Easy Search Getting Started Paper Specifications and Adding Paper Convenient Functions Maintenance and Specifications Troubleshooting Copy/ Document Server Print Scan Connecting the Machine/ System...
  • Page 12: On-Screen Operating Instructions

    On-screen Operating Instructions On-screen Operating Instructions This chapter describes the on-screen operating instructions of this machine. The on-screen operating instructions are included in the supplied manual CD-ROM. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 13: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 14 On-screen Operating Instructions Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. • To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your computer.
  • Page 15 1. Manuals Provided with This Machine...
  • Page 16: Safety Information

    2. Safety Information This chapter describes the safety precautions. Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property.
  • Page 17: Safety Precautions To Be Followed

    2. Safety Information Safety Precautions to Be Followed This section explains safety precautions that should always be followed when using this machine. Environments where the machine can be used This section explains safety precautions about environments where the machine can be used. •...
  • Page 18: Handling Power Cords And Power Cord Plugs

    Safety Precautions to Be Followed • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. Handling power cords and power cord plugs This section explains safety precautions about handling power cords and power cord plugs. •...
  • Page 19 2. Safety Information • It is dangerous to handle the power cord plug with wet hands. Doing so could result in electric shock. • If the power cord is damaged and its inner wires are exposed or broken, contact your service representative for a replacement.
  • Page 20: Handling The Main Machine

    Safety Precautions to Be Followed • When disconnecting the power cord from the wall outlet, always pull the plug, not the cord. Pulling the cord can damage the power cord. Use of damaged power cords could result in fire or electric shock. •...
  • Page 21 2. Safety Information • The following explains the warning messages on the plastic bag used in this product's packaging. • Keep the polythene materials (bags, etc.) supplied with this machine away from babies and small children at all times. Suffocation can result if polythene materials are brought into contact with the mouth or nose.
  • Page 22: Handling The Machine's Interior

    Safety Precautions to Be Followed Handling the machine's interior This section explains safety precautions about handling the machine's interior. • Do not remove any covers or screws other than those explicitly mentioned in this manual. Inside this machine are high voltage components that are an electric shock hazard and laser components that could cause blindness.
  • Page 23: Handling The Machine's Supplies

    2. Safety Information Handling the machine's supplies This section explains safety precautions about handling the machine's supplies. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame. •...
  • Page 24 Safety Precautions to Be Followed • If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult a doctor if necessary. • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary.
  • Page 25: Safety Labels Of This Machine

    2. Safety Information Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. CMV605 CMV602 Do not incinerate toner (new or used) or toner containers.
  • Page 26: Power Switch Symbols

    Safety Labels of This Machine Power Switch Symbols The meanings of the symbols for the switches on this machine are as follows: • : POWER ON • : STANDBY...
  • Page 27 2. Safety Information...
  • Page 28: Information For This Machine

    3. Information for This Machine This chapter describes laws and regulations related to this machine. Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 29: Laser Safety

    3. Information for This Machine Laser Safety CDRH Regulations This equipment complies with requirements of 21 CFR subchapter J for class I laser products. This equipment contains four AlGaInP laser diodes, 9 milliwatts, 648–663 nanometer wavelength for each emitter. The beam divergence angle is 28 degrees (minimum) and 35 degrees (maximum) in the vertical direction, and 7 degrees (minimum) and 10 degrees (maximum) in the horizontal direction, and laser beams are generated in Continuous Wave (CW) mode.
  • Page 30: Notes To Usa Users Of Fcc Requirements

    Address: 5 Dedrick Place, West Caldwell, NJ 07006 Telephone number: 973-882-2000 Product Name: Multi Function Peripheral Model Number: • MP C305SP/Aficio MP C305SP • MP C305SPF/Aficio MP C305SPF Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
  • Page 31: Part 68 Of The Fcc Rules Regarding Facsimile Unit

    7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is causing problems with your telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved.
  • Page 32 Notes to USA Users of FCC Requirements WHEN PROGRAMMING EMERGENCY NUMBERS AND/OR MAKING TEST CALLS TO EMERGENCY NUMBERS: 1. Remain on the line and briefly explain to the dispatcher the reason for the call before hanging 2. Perform such activities in the off-peak hours, such as early morning hours or late evenings. The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device, including FAX machines, to send any message unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the...
  • Page 33: Important Safety Instructions For Facsimile Unit

    3. Information for This Machine Important Safety Instructions for Facsimile Unit When using your telephone equipment, basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons, including the following: • Do not use this product near water, for example, near a bath tub, wash bowl, kitchen sink or laundry tub, in a wet basement or near a swimming pool.
  • Page 34: Notes To Canadian Users Of Facsimile Unit

    Notes to Canadian Users of Facsimile Unit Notes to Canadian Users of Facsimile Unit This product meets the applicable Industry Canada technical specifications. The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.
  • Page 35: Energy Star Program

    3. Information for This Machine ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ® ENERGY STAR Program.
  • Page 36: Energy Saving Functions

    Energy Saving Functions Energy Saving Functions To reduce its power consumption, this machine has the following functions: Sleep mode • If this machine remains idle for a specified period or when the [Energy Saver] key is pressed, it enters Sleep mode to reduce its electrical consumption. •...
  • Page 37: Notes To Users In The State Of California (Notes To Users In Usa)

    3. Information for This Machine Notes to users in the state of California (Notes to Users in USA) Perchlorate Material - special handling may apply, See www.dtsc.ca.gov/hazardouswaste/ perchlorate...
  • Page 38: Appendix

    4. Appendix This chapter describes trademarks. Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the U.S.
  • Page 39 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 40 MEMO...
  • Page 41 MEMO D118-7504...
  • Page 42 User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 44 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine I Want to Save Paper............................9 I Want to Convert Documents to Electronic Formats Easily................10 I Want to Register Destinations........................11 I Want to Operate the Machine More Effectively..................12 You Can Customize the [Home] Screen as You Like..................13...
  • Page 45 Turning On/Off the Power..........................49 Turning On the Main Power........................49 Turning Off the Main Power........................49 When the Authentication Screen is Displayed....................51 User Code Authentication Using the Control Panel..................51 Logging In Using the Control Panel......................51 Logging Out Using the Control Panel......................52 Placing Originals..............................53 Placing Originals on the Exposure Glass (mainly Europe)..........53 Placing Originals on the Exposure Glass...
  • Page 46 Canceling a Transmission Before the Original Is Scanned..............82 Canceling a Transmission While the Original Is Being Scanned.............82 Canceling a Transmission After the Original Is Scanned (While a Transmission Is in Progress)...83 Canceling a Transmission After the Original Is Scanned (Before a Transmission Is Started)....83 Sending at a Specific Time (Send Later)......................85 Storing a Document............................86 Sending Stored Documents.........................87...
  • Page 47 Basic Procedure for Storing Scan Files......................113 Checking a Stored File Selected from the List..................114 Specifying the File Type..........................115 Specifying Send Settings..........................116 7. Document Server Storing Data..............................117 Printing Stored Documents..........................119 8. Web Image Monitor Displaying Top Page.............................121 Viewing Received Fax Documents Using Web Image Monitor..............123 9.
  • Page 48 11. Appendix Trademarks..............................207 INDEX ................................209...
  • Page 49: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 50: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CMR641 The following information is region-specific.
  • Page 51: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder...
  • Page 52: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a description by what you want to do. I Want to Save Paper BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax)) See "Combined Copying", Copy/ Document Server See "Combine Two Originals", Fax...
  • Page 53: I Want To Convert Documents To Electronic Formats Easily

    1. What You Can Do with This Machine I Want to Convert Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan Storing scan files in a shared folder See "Basic Procedure When Using Scan to Folder", Scan...
  • Page 54: I Want To Register Destinations

    I Want to Register Destinations I Want to Register Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax See "Registering a destination in the address book manually", Scan Using Web Image Monitor to register destinations from a computer See "Registering Internet Fax Destination Information Using Web Image Monitor", Fax Downloading destinations registered in the machine to the LAN-Fax driver destination list...
  • Page 55: I Want To Operate The Machine More Effectively

    1. What You Can Do with This Machine I Want to Operate the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Fax/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions Registering frequently-used printing settings to the printer driver...
  • Page 56: You Can Customize The [Home] Screen As You Like

    You Can Customize the [Home] Screen as You Like You Can Customize the [Home] Screen as You Like The icons of each function are displayed on the [Home] screen. CMQ001 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 57: You Can Make Copies Using Various Functions

    1. What You Can Do with This Machine You Can Make Copies Using Various Functions CMQ002 • You can make copies in full color. You can switch the color copy mode depending on the type of originals used and the desired finish. •...
  • Page 58: You Can Print Data Using Various Functions

    You Can Print Data Using Various Functions You Can Print Data Using Various Functions CMQ003 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 59: You Can Utilize Stored Documents

    1. What You Can Do with This Machine You Can Utilize Stored Documents You can store files scanned in copier, facsimile, printer, or scanner mode on the machine's hard disk. With Web Image Monitor, you can use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 60: You Can Send And Receive Faxes Without Paper

    You Can Send and Receive Faxes without Paper You Can Send and Receive Faxes without Paper Reception You can store and save received fax documents as electronic formats in the machine's hard disk without printing them. CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents).
  • Page 61 1. What You Can Do with This Machine CJQ605 • To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer, and then specify the destination. • You can also check the sent image data. •...
  • Page 62: You Can Send And Receive Faxes Using The Internet

    You Can Send and Receive Faxes Using the Internet You Can Send and Receive Faxes Using the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx CJQ606 E-mail Transmission and Reception This machine converts scanned document images to e-mail format, and transmits and receives this data over the Internet.
  • Page 63 1. What You Can Do with This Machine • For details about how to transmit and receive documents over the Internet, see "Transmission" and "Reception", Fax...
  • Page 64: You Can Use The Facsimile And The Scanner In A Network Environment

    You Can Use the Facsimile and the Scanner in a Network Environment You Can Use the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). •...
  • Page 65: You Can Prevent Information Leakage (Security Functions)

    1. What You Can Do with This Machine You Can Prevent Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 66: You Can Monitor And Set The Machine Using A Computer

    You Can Monitor and Set the Machine Using a Computer You Can Monitor and Set the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 67: You Can Prevent An Unauthorized Copy

    1. What You Can Do with This Machine You Can Prevent an Unauthorized Copy You can print embedded pattern on paper to prevent them from being copied. CJQ613 • Using the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy, preventing confidential information from being copied.
  • Page 68: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components Guide to Components (mainly Europe) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur.
  • Page 69 2. Getting Started 5. Paper tray Load paper here. 6. Paper tray unit (Tray 2 and Tray 3) Load paper here. 7. Ventilation holes Prevent overheating. 8. Main power switch To operate the machine, the main power switch must be on. If it is off, turn the switch on. 9.
  • Page 70: Guide To Components (Mainly Asia)

    Guide to Names and Functions of Components 3. Internal tray Copied/printed paper and fax messages are delivered here. Rear and left view CMR634 1. Ventilation holes Prevent overheating. Guide to Components (mainly Asia) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur.
  • Page 71 2. Getting Started 1. ADF Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. 2. Exposure glass Place originals face down here. 3.
  • Page 72 Guide to Names and Functions of Components Front and left view CMR602 1. Internal tray guide Open out and raise the end fence to support large paper. 2. Extenders Raise these extenders to support large paper. 3. Internal tray Copied/printed paper and fax messages are delivered here. Rear and left view CMR634 1.
  • Page 73: Guide To Components (Mainly North America)

    2. Getting Started Guide to Components (mainly North America) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur. Front and right view CMR601 1. ADF Lower the ADF over originals placed on the exposure glass.
  • Page 74 Guide to Names and Functions of Components 9. Bypass tray Use to copy or print on OHP transparencies and label paper (adhesive labels). 10. Extender Pull this extender out when loading A4 , 8 × 11 or larger size paper in the bypass tray. 11.
  • Page 75 2. Getting Started Rear and left view CMR634 1. Ventilation holes Prevent overheating.
  • Page 76: Guide To Functions Of The Machine's Options

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options (mainly Europe) CMR603 1. Exposure glass cover Lower this cover over originals. 2. ADF Load a stack of originals here. They will feed in automatically. 3.
  • Page 77: Guide To Functions Of The Machine's External Options (Mainly Asia)

    2. Getting Started Guide to Functions of the Machine's External Options (mainly Asia) CMR604 1. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 2. Paper tray unit (Tray 2 and Tray 3) Holds up to 500 sheets of paper.
  • Page 78 Guide to Functions of the Machine's Options 3. Paper tray unit (Tray 2 and Tray 3) Holds up to 500 sheets of paper.
  • Page 79: Guide To The Names And Functions Of The Machine's Control Panel

    2. Getting Started Guide to the Names and Functions of the Machine's Control Panel This illustration shows the control panel of the machine with options fully installed. CMR606 1. [Home] key Press to display the [Home] screen. For details, see p.39 "How to Use the [Home] Screen". 2.
  • Page 80 Guide to the Names and Functions of the Machine's Control Panel See "Registering Frequently Used Functions", Convenient Functions • Press to program defaults for the initial display when modes are cleared or reset, or immediately after the main power switch is turned on. See "Changing the Default Functions of the Initial Screen", Convenient Functions 6.
  • Page 81 2. Getting Started • Confidential File indicator Lights continuously while personal box data is being received. Blinks while Memory Lock file is being received. See "Personal Boxes" and "Printing a File Received with Memory Lock", Fax 17. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs.
  • Page 82: How To Use The [Home] Screen

    How to Use the [Home] Screen How to Use the [Home] Screen The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen.
  • Page 83: Adding Icons To The [Home] Screen

    2. Getting Started 5. Home screen image You can display an image on the [Home] screen, such as a corporate logo. To change the image, see "Displaying the Image on the [Home] Screen", Convenient Functions 6. [Scanner] Press to scan originals and save images as files. For details about how to use the scanner function, see Scan 7.
  • Page 84 How to Use the [Home] Screen • You can change the position of icons. For details, see "Changing the Order of Icons on the [Home] Screen", Convenient Functions Adding icons to the [Home] screen using Web Image Monitor Start Web Image Monitor. For details, see "Using Web Image Monitor", Connecting the Machine/ System Settings Log in to Web Image Monitor as an administrator.
  • Page 85 2. Getting Started Press [Edit Home]. Press [Add Icon]. Press [Select Icon to Add]. Press [Program].
  • Page 86 How to Use the [Home] Screen Press [Copier Program]. Select the program you want to add. Press [Select Destination]. Specify the position where [Blank] is displayed.
  • Page 87 2. Getting Started Press [Exit]. Press the [User Tools/Counter] key. • Press [ ] on the upper-right corner of the [Select Destination] screen to check the position on the simple screen.
  • Page 88: Registering Functions In A Program

    Registering Functions in a Program Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Color mode, paper tray, Orig.
  • Page 89 2. Getting Started Press the [Program] key. CMT001 Press [Program]. Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit] twice. • The number of characters you can enter for a program name varies depending on the functions as follows: •...
  • Page 90: Example Of Programs

    Registering Functions in a Program • Programs are not deleted by turning the power off or by pressing the [Reset] key unless the program is deleted or overwritten. • Program numbers with next to them already have settings made for them. •...
  • Page 91 2. Getting Started Program name Program description Effect Digital signature In [Send Settings], specify [PDF], You can add a digital signature to an scan [High Compress. PDF], or [PDF/A] in important document such as a [File Type], and also specify [Digital contract, so that any data tampering Signature].
  • Page 92: Turning On/Off The Power

    Turning On/Off the Power Turning On/Off the Power The main power switch is on the right side of the machine. Turning off this switch makes the main power indicator on the right side of the control panel go off. When this is done, machine power is off. When the fax unit is installed, fax files in memory may be lost if you turn this switch off.
  • Page 93 2. Getting Started • Before unplugging the power cord plug, turn off the main power switch and make sure the main power switch indicator turns off. Not doing so may result in damage to the hard disk or memory, leading to malfunctions. •...
  • Page 94: When The Authentication Screen Is Displayed

    When the Authentication Screen is Displayed When the Authentication Screen is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 95: Logging Out Using The Control Panel

    2. Getting Started Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging Out Using the Control Panel This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 96: Placing Originals

    Placing Originals Placing Originals Placing Originals on the Exposure Glass (mainly Europe) • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF or the exposure glass cover. Place the original face down on the exposure glass. The original should be aligned to the rear left corner.
  • Page 97: Placing Originals On The Exposure Glass (Mainly North America)

    2. Getting Started CMS001 1. Positioning mark Lower the ADF. Placing Originals on the Exposure Glass (mainly North America) • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF. Place the original face down on the exposure glass.
  • Page 98: Placing Originals In The Auto Document Feeder

    Placing Originals Placing Originals in the Auto Document Feeder Be sure not to load the original untidily. Doing so may cause the machine to display a paper misfeed message. Also, be sure not to place originals or other objects on the top cover. Doing so may cause a malfunction.
  • Page 99 2. Getting Started...
  • Page 100: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 101 3. Copy Make sure no previous settings remain. When there are previous settings remaining, press the [Reset] key. Select the paper tray containing the paper that is the same size and orientation as the originals. Make sure that [Use Paper Tray Settg] is selected. When [Use Paper Tray Settg] is selected, the paper size and orientation of the tray you have selected will appear in [Orig.].
  • Page 102: Auto Reduce/Enlarge

    Auto Reduce/Enlarge Auto Reduce/Enlarge The machine automatically calculates the reproduction ratio based on the sizes of the originals and the paper you have specified. The machine will rotate, enlarge, or reduce the image of the originals to fit them to the paper. CKN008 •...
  • Page 103 3. Copy Select the original orientation, and then press [OK]. Press [Original's Size]. Specify the original size, and then press [OK] twice. Press [Auto Reduce/Enlarge]. Select the paper tray. Place the originals, and then press the [Start] key.
  • Page 104: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 • You cannot use the bypass tray with this function. There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page.
  • Page 105 3. Copy Orig.'s Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Other Func.]. Press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output. To change the original or copy orientation, press [Orientation].
  • Page 106: Specifying The Original And Copy Orientation

    Duplex Copying Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper. • Top to Top CKN011 • Top to Bottom CKN012 Press [Orientation].
  • Page 107: Combined Copying

    3. Copy Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 108: One-Sided Combine

    Combined Copying CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 • You cannot use the bypass tray with this function. There are four types of One-Sided Combine. 1 Sided 2 Originals Cmb.
  • Page 109: Two-Sided Combine

    3. Copy 2 Sided 4 Pages Cmb. 1 Side Copies two 2-sided originals to one side of a sheet. Press [Orig.]. Press [Original's Size]. Specify the original size, and then press [OK] twice. Press [Other Func.]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original]. If you selected [2 Sided], you can change the orientation by pressing [Orientation].
  • Page 110 Combined Copying CKN074 • You cannot use the bypass tray with this function. There are four types of Two-Sided Combine. 1 Sided 4 Originals Cmb. 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Cmb.
  • Page 111 3. Copy Press [Cmb. 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original] and/or [Copy], and then press [OK]. Select the number of originals to combine. Press [OK] twice. Select the paper tray. Place the originals, and then press the [Start] key.
  • Page 112: Copying Onto Custom Size Paper From The Bypass Tray

    Copying onto Custom Size Paper from the Bypass Tray Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 139.0–600.0 mm (5.48–23.62 inches) and a vertical length of 76.2–216.0 mm (3.00–8.50 inches) can be fed in from the bypass tray. Note however that the limitation on the horizontal and vertical length range will vary depending on which options are installed.
  • Page 113: Copying Onto Envelopes

    3. Copy Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Envelopes should be fed from the bypass tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see p.135 "Recommended Paper Sizes and Types".
  • Page 114 Copying onto Envelopes Place the original face down on the exposure glass. The original should be aligned to the rear left corner. CMS001 1. Positioning mark Load the envelopes face down in the bypass tray. The bypass tray ( ) is automatically selected. Press the [ ] key.
  • Page 115: Sort

    3. Copy Sort The machine assembles copies as sets in sequential order. CKN018 Depending on which options are installed on your machine, this function might not be available. For details, see "Functions Requiring Optional Configurations", Getting Started Press [Other Func.]. Press [Sort], and then press [OK].
  • Page 116 Sort Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 117: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents from the Document Server screen. For details about the Document Server, see p.117 "Storing Data".
  • Page 118: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 119: Sending Originals Using The Exposure Glass (Memory Transmission)

    4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Configure the scan and transmission settings in "Send Settings". Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 120: Registering A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) Press the [ ] key. The machine dials the destination and starts transmission. Registering a Fax Destination Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Press [New Program]. Press [Names]. Press [Name]. The name entry display appears. Enter the name, and then press [OK].
  • Page 121: Deleting A Fax Destination

    4. Fax Press [Fax Destination]. Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". To specify [SUB Code], [SEP Code], or [Sub-add./UUI], press [Adv. Features]. Press [OK].
  • Page 122 Basic Procedure for Transmissions (Memory Transmission) Press [Clear], and then press [OK]. Press [OK]. Press [Exit]. Press [OK]. Press the [User Tools/Counter] key.
  • Page 123: Transmitting While Checking Connection To Destination (Immediate Transmission)

    4. Fax Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 124: Sending Originals Using The Exposure Glass (Immediate Transmission)

    Transmitting while Checking Connection to Destination (Immediate Transmission) Sending Originals Using the Exposure Glass (Immediate Transmission) Press [Immed. TX]. Place the first page face down on the exposure glass. Specify a destination. Make the scan settings you require. Press the [Start] key. Place the next original on the exposure glass within 10 seconds when you send multiple originals, and then repeat steps 4 and 5.
  • Page 125: Canceling A Transmission

    4. Fax Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Press the [Reset] key. CMK001 Canceling a Transmission While the Original Is Being Scanned Use this procedure to cancel scanning or transmitting of the original while it is being scanned.
  • Page 126: Canceling A Transmission After The Original Is Scanned (While A Transmission Is In Progress)

    Canceling a Transmission Canceling a Transmission After the Original Is Scanned (While a Transmission Is in Progress) Use this procedure to delete a file that is being sent after the original is scanned. All the scanned data is deleted from memory. Press the [Stop] key.
  • Page 127 4. Fax Press [Comm. Status/Print]. Press [Check/Stop Transmission File]. Press [Display File List]. Select the file you want to cancel. If the desired file is not shown, press [ ] or [ ] to find it. Press [Cancel TX]. To cancel another file, repeat steps 4 through 5. Press [OK].
  • Page 128: Sending At A Specific Time (Send Later)

    Sending at a Specific Time (Send Later) Sending at a Specific Time (Send Later) Using this function, you can instruct the machine to delay transmission of your fax document until a specified later time. This allows you to take advantage of off-peak telephone charges without having to be by the machine at the time.
  • Page 129: Storing A Document

    4. Fax Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 130: Sending Stored Documents

    Storing a Document Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 131 4. Fax Press [Send Settings]. Press [ ] four times, and then press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [File Name] to place the documents in alphabetical order. •...
  • Page 132: Printing The Journal Manually

    Printing the Journal Manually Printing the Journal Manually To print the Journal manually, select the printing method: "All", "Print per File No.", or "Print per User". Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 133 4. Fax...
  • Page 134: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 135: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 136: Standard Printing

    Standard Printing Standard Printing • The default setting is duplex printing. If you want to print on only one side, select [Off] for the duplex setting. • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete.
  • Page 137: Locked Print

    5. Print Locked Print Sending a Locked Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 138 Locked Print Press the [Print Jobs] tab. Press [Locked Jobs]. Select the files you want to print. You can select all the Locked Print files at once by pressing [All Jobs] after selecting a file. Press [Print]. Enter the password using the number keys, and then press [OK]. To change the print settings of the document, press [Det.Settings].
  • Page 139: Hold Print

    5. Print Hold Print Sending a Hold Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 140 Hold Print Press the [Print Jobs] tab. Press [Hold Jobs]. Select the files you want to print. You can select all the Hold Print files at once by pressing [All Jobs] after selecting a file. Press [Print]. To change the print settings of the document, press [Det.Settings]. Enter the number of copies using the number keys if necessary, and then press [Resume Prt.].
  • Page 141: Stored Print

    5. Print Stored Print Sending a Stored Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 142: Printing A Stored Print File Using The Control Panel

    Stored Print Printing a Stored Print File Using the Control Panel • The stored documents are not deleted even after the printing has been completed. For the procedure to delete the documents, see "Deleting Stored Print files", Print Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 143: Direct Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing Files from an External Memory Device Direct Printing from a Removable Memory Device • Using the Media Slot • Printable File Formats • Printing from a Removable Memory Device • Screen for Direct Printing Direct Printing from a Digital Camera (PictBridge) •...
  • Page 144 Printing Files from an External Memory Device Using the Media Slot • USB flash memory devices and SD cards are supported for direct printing. However, certain types of USB flash memory devices and SD cards cannot be used. For details, contact your sales or service representative.
  • Page 145: Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing from a Removable Memory Device Insert a removable memory device into the media slot. For details about inserting a removable memory device, see "Inserting/Removing a Memory Storage Device", Getting Started. Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 146 Printing Files from an External Memory Device • Depending on the security setting, [Prt. From Dev.] may not appear. For details, see Security Guide • You cannot select multiple files of different formats at the same time. • Files or groups of files larger than 1 GB cannot be printed. •...
  • Page 147: Screen For Direct Printing

    Printing Files from an External Memory Device Screen for Direct Printing To display this screen, press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen, and then press [Prt. From Dev.]. You can view files either as a list or as thumbnails.
  • Page 148 Printing Files from an External Memory Device Press to display the print image of the 1st page of the selected document. You can change the scale factor and display position of the print image. [Start Printing] Press to print the selected file. List/Thumbnail Press to switch between list view and thumbnail view.
  • Page 149: Using Pictbridge

    Printing Files from an External Memory Device Direct Printing from a Digital Camera (PictBridge) You can connect a PictBridge-compatible digital camera to this machine using a USB cable. This allows you to print photographs taken using the digital camera directly by operating the digital camera.
  • Page 150: Exiting Pictbridge

    Printing Files from an External Memory Device • Some digital cameras require settings for manual PictBridge operation. For details, see your digital camera's manual. Exiting PictBridge • Do not disconnect the USB cable while data is being sent to the machine. If you do, printing will fail.
  • Page 151 5. Print...
  • Page 152: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 153: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan • Press [Original], and then press [2 Sided]. • Press [Send Settings]. Select [Type of Original], and then press [Full Colour]. • Press [Send Settings]. Select [File Type], and then press [PDF]. Specify the destination. You can specify multiple destinations. Press the [Start] key.
  • Page 154 Basic Procedure When Using Scan to Folder • If "Everyone" is left selected in step 6, the created shared folder will be accessible by all users. This is a security risk, so we recommend that you give access rights only to specific users. Use the following procedure to remove "Everyone"...
  • Page 155: Registering An Smb Folder

    6. Scan In the [Select Users or Groups] window, click [OK]. In the [Groups or user names:] list, select a group or user, and then, in the [Allow] column of the permissions list, select either the [Full Control] or [Change] check box. Press [OK] twice.
  • Page 156 Basic Procedure When Using Scan to Folder Press [Auth. Info]. Press [Folder Authentication]. Press [Specify Other Auth. Info]. When [Do not Specify] is selected, the SMB User Name and SMB Password that you have specified in [Default User Name/Password (Send)] of File Transfer settings are applied. Press [Change] under "Login User Name".
  • Page 157 6. Scan Press [OK] three times. Press the [User Tools/Counter] key. Locating the SMB folder manually Press [Enter] under "Path". Enter the path where the folder is located. For example: if the name of the destination computer is "User", and the folder name is "Share", the path will be \\User\Share.
  • Page 158: Deleting An Smb Registered Folder

    Basic Procedure When Using Scan to Folder You can press [Up One Level] to switch between levels. Select the folder you want to register. Press [OK] four times. Deleting an SMB Registered Folder Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Press [Change].
  • Page 159 6. Scan Press [SMB]. Press [Enter] in [Destination]. Press [Enter] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 160: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E- mail Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen. CMR612 Make sure that no previous settings remain. If a previous setting remains, press the [Reset] key.
  • Page 161: Registering An E-Mail Destination

    6. Scan To use the Message Disposition Notification function, select [Send Settings], press [ ] four times, and then press [Reception Notice]. If you select [Reception Notice], the selected e-mail sender will receive e-mail notification when the e-mail recipient has opened the e-mail. Press the [Start] key.
  • Page 162: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail Press [Email Address]. Enter the e-mail address. Press [OK]. Press [Use Email Address for], and then select [Email/Internet Fax Dest.] or [Internet Fax Destination Only]. If [Email/Internet Fax Dest.] is specified, registered e-mail addresses appear in both the internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 163: Entering An E-Mail Address Manually

    6. Scan Press [Email]. Select the name whose e-mail address you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP-Fax destination. Press [Email].
  • Page 164: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 165: Checking A Stored File Selected From The List

    6. Scan Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. • File Name Press [File Name], enter a file name, and then press [OK]. •...
  • Page 166: Specifying The File Type

    Specifying the File Type Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a removable memory device.
  • Page 167: Specifying Send Settings

    6. Scan Specifying Send Settings Press [Send Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 168: Basic Procedure For Saving Scan Files On A Removable Memory Device

    Storing the Scanned Documents to a USB Flash Memory or SC Card Storing the Scanned Documents to a USB Flash Memory or SD Card This section explains how to save data on external media using the scanner function. • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately.
  • Page 169 Storing the Scanned Documents to a USB Flash Memory or SC Card Insert a removable memory device in the media slot. You can connect only one removable memory device at a time. The media slot cannot be used if both an SD card and a USB flash memory are inserted into it at the same time. Make sure that no previous settings remain.
  • Page 170 Storing the Scanned Documents to a USB Flash Memory or SC Card Remove the memory device from the media slot. Remove the media from the media slot only after data has been written completely. Removing the media while data is being written will result in corrupted data. •...
  • Page 171 Storing the Scanned Documents to a USB Flash Memory or SC Card 116D...
  • Page 172: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 173 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. CMR612 Press [To Scanning Scrn.]. Press [User Name]. Specify a user name, and then press [OK]. The user names shown are names that were registered in the Address Book.
  • Page 174: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [2 Sided: Top to Top], [2 Sided: Top to Bottom] •...
  • Page 175 7. Document Server...
  • Page 176: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 177 8. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 178: Viewing Received Fax Documents Using Web Image Monitor

    Viewing Received Fax Documents Using Web Image Monitor Viewing Received Fax Documents Using Web Image Monitor Start Web Image Monitor. Click [Fax Received File] on the [Print Job/Stored File] menu in the left pane. If you have programmed a user code for the stored reception file, enter the code, and then press [OK].
  • Page 179 8. Web Image Monitor...
  • Page 180: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Loading Paper into Paper Trays Every paper tray is loaded in the same way. In the following example procedure, paper is loaded into tray 1. •...
  • Page 181 9. Adding Paper and Toner • Various sizes of paper can be loaded in the paper trays by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in the Paper Trays", Paper Specifications and Adding Paper...
  • Page 182: Loading Paper Into The Bypass Tray

    Loading Paper into the Bypass Tray Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Do not load paper over the limit mark.
  • Page 183: Settings To Use The Bypass Tray Under The Printer Function

    9. Adding Paper and Toner • Certain types of paper might not be detected properly when placed on the bypass tray. If this happens, remove the paper and place it on the bypass tray again. • Pull the extender out when loading A4 , 8 ×...
  • Page 184 Loading Paper into the Bypass Tray Setting the paper size using the control panel Press the [User Tools/Counter] key. CMR633 Press [Tray Paper Settings]. Press [ ]. Press [Printer Bypass Paper Size]. Select the paper size. Press [OK]. Press the [User Tools/Counter] key. •...
  • Page 185 9. Adding Paper and Toner Press [Custom Size]. If a custom size is already specified, press [Change]. Press [Vertical]. Enter the size of the paper using the number keys, and then press the [ ] key. Press [Horizontal]. Enter the size of the paper using the number keys, and then press the [ ] key. Press [OK] twice.
  • Page 186 Loading Paper into the Bypass Tray Press [Paper Type]. Select the paper type, and then press [OK]. To load thick paper, make sure that [Plain Paper] is selected. Press [OHP (Transparency)] when loading OHP transparencies. When printing onto thick paper, press [Paper Thickness]. When printing onto OHP transparencies, proceed to step 11.
  • Page 187: Loading Orientation-Fixed Paper Or Two-Sided Paper

    9. Adding Paper and Toner Loading Orientation-Fixed Paper or Two-Sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not print correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 188 Loading Orientation-Fixed Paper or Two-Sided Paper Original orientation Exposure glass Landscape ( ) • Copy • Scanner • Paper orientation • Copier mode Copy side Paper trays Bypass tray One-sided Two-sided Unavailable • Printer mode Print side Paper trays Bypass tray One-sided Two-sided Unavailable...
  • Page 189 9. Adding Paper and Toner • If a print job is changed partway through printing from one-sided to two-sided printing, one- sided output after the first copy may be printed facing a different direction. To ensure all paper is output facing the same direction, specify different input trays for one-sided and two- sided printing.
  • Page 190: Recommended Paper Sizes And Types

    Recommended Paper Sizes and Types Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use damp or curled paper, a paper jam may occur. • Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed.
  • Page 191 9. Adding Paper and Toner Trays 2 and 3 Paper type and weight Paper size Paper capacity 60–163 g/m (16 lb. Bond–90 Select the paper size using the 500 sheets lb. Index) System Settings menu: Plain Paper 1–Thick Paper 2 A4 , A5 , B5 JIS , ×...
  • Page 192 Recommended Paper Sizes and Types Paper type and Paper size Paper capacity weight 60–220 g/m Custom size • Plain Paper 1–Plain lb. Bond–80 lb. Paper 2: 100 sheets Cover) • Middle Thick–Thick Vertical: 76.2–216.0 mm Plain Paper 1–Thick Paper 3: Horizontal: 139.0–600.0 mm Paper 3 Vertical: 3.00–8.50 inches...
  • Page 193 9. Adding Paper and Toner *1 Print quality will decrease if the paper you are using is close to the minimum or maximum weight. Change the paper weight setting to thinner or thicker. • Certain types of paper produce noise when delivered. This noise does not indicate a problem and print quality is unaffected.
  • Page 194: Thick Paper

    Recommended Paper Sizes and Types • When printing on OHP transparencies from the computer, see p.130 "Setting thick paper or OHP transparencies using the control panel". • Fan OHP transparencies thoroughly whenever you use them. This prevents OHP transparencies from sticking together, and from feeding incorrectly. •...
  • Page 195: Envelopes

    9. Adding Paper and Toner Direction of paper Paper trays Bypass tray grain Not recommended • When copying or printing onto thick paper, the copy/print speed is slower than usual. • Select [Thick Paper 1], [Thick Paper 2], or [Thick Paper 3] in [Tray Paper Settings] under the System Settings menu.
  • Page 196 Recommended Paper Sizes and Types How to load envelopes Orientation of Exposure glass Bypass tray envelopes Side-opening envelopes • Flaps: closed • Flaps: closed • Side to be scanned: • Side to be printed: face down face down When loading envelopes, specify the envelope type and thickness. For details, see p.70 "Copying onto Envelopes".
  • Page 197 9. Adding Paper and Toner When loading envelopes, select "Envelope" as the paper types using both the User Tools and printer driver, and specify the thickness of envelopes. For details, see "Printing on Envelopes", Print To print on envelopes that are loaded with their bottom edge pointing toward the back of the machine, rotate the print image by 180 degrees using the printer driver.
  • Page 198: Adding Toner

    Adding Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 199: Sending Faxes Or Scanned Documents When Toner Has Run Out

    9. Adding Paper and Toner • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible. •...
  • Page 200: Disposing Of Used Toner

    Adding Toner • If number of communications executed after the toner has run out and not listed in the automatically output Journal exceeds 200, communication is not possible. Make sure the machine is in facsimile or scanner mode. Perform transmission operation. The error message disappears.
  • Page 201 9. Adding Paper and Toner...
  • Page 202: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. Indicators This section describes the indicators displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Indicator Status : Paper Misfeed indicator Appears when a paper misfeed occurs. For details about removing jammed paper, see "Removing Jammed Paper", Troubleshooting : Original Misfeed indicator...
  • Page 203: When An Indicator For The [Check Status] Key Is Lit

    10. Troubleshooting When an Indicator for the [Check Status] Key Is Lit If an indicator for the [Check Status] key lights up, press the [Check Status] key to display the [Check Status] screen. Check the status of each function in the [Check Status] screen. [Check Status] screen CNY002 1.
  • Page 204 When an Indicator for the [Check Status] Key Is Lit Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper.
  • Page 205: Panel Tone

    10. Troubleshooting Panel Tone The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep Panel/screen input A control panel or screen key was accepted.
  • Page 206: When You Have Problems Operating The Machine

    When You Have Problems Operating the Machine When You Have Problems Operating the Machine This section describes common problems and messages. If other messages appear, follow the instructions displayed. Problem Causes Solutions The [Facsimile] or [Scanner] Functions other than the Functions appear on the [Home] icon does not appear on the copier function are not yet...
  • Page 207 10. Troubleshooting Problem Causes Solutions "Please wait." appears. This message appears when • Wait until the message the machine is warming up. disappears. Do not turn off the main power switch while the message is displayed. • If the machine does not get ready in nine minutes, contact your service representative.
  • Page 208 When You Have Problems Operating the Machine Problem Causes Solutions The Authentication screen Basic Authentication, Enter your Login User Name and Login appears. Windows Authentication, Password. For details about the LDAP Authentication or Authentication screen, see "When the Integration Server Authentication Screen is Displayed", Authentication is set.
  • Page 209 10. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. The tray's side or end fences • Remove misfed paper. For details may not be set properly. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting • Check that the side or end fences are set properly.
  • Page 210 When You Have Problems Operating the Machine Problem Causes Solutions "Shutting down... Please The shut down procedure Follow the message that appears and wait. Main power will be has begun because the main wait until the machine has shut down. turned off automatically.
  • Page 211 10. Troubleshooting Problem Causes Solutions "The image data size is not The image data size is not For details about file size for shortcut valid. See the manual for valid. image, see "Customizing the [Home] required data." appears. Screen", Convenient Functions "The format of the image The file format of the shortcut The file format of shortcut images to be...
  • Page 212: When Messages Are Displayed On The Control Panel

    When Messages Are Displayed on the Control Panel When Messages Are Displayed on the Control Panel Messages Displayed When Using the Copy/Document Server Function This section describes the machine's main messages. If other messages appear, follow their instructions. • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper.
  • Page 213 10. Troubleshooting Message Causes Solutions "File being stored exceeded The scanned originals have Press [Exit], and then store again with max. number of pages per too many pages to store as an appropriate number of pages. file. Copying will be one document.
  • Page 214: Messages Displayed When Using The Facsimile Function

    When Messages Are Displayed on the Control Panel When the memory becomes full while using the copy/document server function Message Causes Solutions "Memory is full. nn originals The scanned originals • Press [Print] to copy scanned have been scanned. Press exceed the number of pages originals and cancel the scanning [Print] to copy scanned...
  • Page 215 10. Troubleshooting Message Causes Solutions "Check whether there are The alias telephone number • Check that the correct alias phone any network problems." you entered is already number is listed in [H.323 registered on the gatekeeper Settings] of [Facsimile Features]. [13-10] by another device.
  • Page 216 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are In [Effective Protocol], the IP • Check that "IPv4" in [Effective any network problems." address is not enabled, or an Protocol] is set to "Active" in incorrect IP address has been [System Settings].
  • Page 217 10. Troubleshooting Message Causes Solutions "Check whether there are The DNS server, SMTP • Check that the following settings any network problems." server, or folder specified for in [System Settings] are listed transfer to was not found, or correctly. [14-01] the destination for Internet •...
  • Page 218 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or login listed correctly.
  • Page 219 10. Troubleshooting Message Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3/IMAP4 Settings] of [15-01] [System Settings]. For details about POP3/IMAP4 Settings, see "File Transfer", Connecting the Machine/ System Settings •...
  • Page 220 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 221 10. Troubleshooting Message Causes Solutions "Connection with LDAP A network error has occurred Try the operation again. If the message server has failed. Check the and connection has failed. is still shown, the network may be busy. server status." Check the settings for LDAP server in [System Settings].
  • Page 222 When Messages Are Displayed on the Control Panel Message Causes Solutions "Functional problem The main power switch was Even if you turn the main power switch occurred. Stopped turned off while the machine back on immediately, depending on processing." was receiving a document by the mail server, the machine might not Internet Fax.
  • Page 223 10. Troubleshooting Message Causes Solutions "Some page(s) are almost The first page of the The original's blank side might have blank. To cancel press the document is almost blank. been scanned. Be sure to place your Stop key." originals correctly. For details about determining the cause of blank pages, see "Detecting Blank Pages", Fax "The selected file(s)
  • Page 224 When Messages Are Displayed on the Control Panel Message Causes Solutions "The program contains a The user certificate A new user certificate must be installed. destination(s) with a (destination certificate) has For details about the user certificate certificate that is not expired.
  • Page 225 10. Troubleshooting Message Causes Solutions "The program contains a There is no user certificate For details about the user certificate destination(s) that does not (destination certificate). (destination certificate), see Security have a certificate." Guide "The specified destination There is no user certificate For details about the user certificate for Email TX Result, which is (destination certificate).
  • Page 226 When Messages Are Displayed on the Control Panel Message Causes Solutions "XXX cannot be recalled There is no device certificate For details about the device certificate because there is a problem (S/MIME), or the certificate (S/MIME), see Security Guide with the device certificate is invalid.
  • Page 227: Messages Displayed When Using The Printer Function

    10. Troubleshooting • If "Check whether there are any network problems." appears, the machine is not correctly connected to the network or the settings of the machine are not correct. If you do not need to connect to a network, you can specify the setting so this message is not displayed, and then the [Check Status] key no longer lights.
  • Page 228 When Messages Are Displayed on the Control Panel Message Status "Offline" The machine is offline. "Please wait." This message might appear for a second or two while the machine is preparing, performing initial adjustments, or adding toner. Wait a while. "Printing..."...
  • Page 229 10. Troubleshooting Message Causes Solutions "Cannot connect with the • The Bluetooth interface Turn off the main power switch, and Bluetooth interface. Check unit was installed while then confirm that the Bluetooth the Bluetooth interface." the machine was turned interface unit was installed correctly. And then, turn on the main power switch again.
  • Page 230 When Messages Are Displayed on the Control Panel Message Causes Solutions "Hardware Problem: • The Bluetooth interface Turn off the main power switch, and Wireless Card" unit was connected then confirm the Bluetooth interface unit while the machine was is inserted correctly. And then, turn on (A "wireless LAN board"...
  • Page 231 10. Troubleshooting Message Causes Solutions "Problems with the wireless The machine has detected a Check that the Bluetooth unit is installed board. Please call service." Bluetooth failure, or it could properly, or contact your service not detect a Bluetooth unit. It representative.
  • Page 232: Other Messages

    When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded the limit value for • The size of the selected Files or groups of files larger than 1 GB total data size of the file exceeds 1 GB. cannot be printed.
  • Page 233 10. Troubleshooting Message Causes Solutions "Address Book is currently in The machine currently Wait a while, and then retry the use by another function. cannot perform operation. Authentication has failed." authentication because the Address Book is being used by another function. "Unauthorized Copy You tried to store a file in the Only when using PCL 6 / PostScript...
  • Page 234 When Messages Are Displayed on the Control Panel Message Causes Solutions "Classification Code is The classification code has Enter the correct classification code. incorrect." not been entered, or the classification code has been entered incorrectly. "Classification Code is The classification code is not Select Optional for classification code.
  • Page 235 10. Troubleshooting Message Causes Solutions "Document Server is not You cannot use the • For details about using Document available to use. Cannot Document Server function. Server function, contact your store." administrator. • For details about how to set permissions, see Security Guide "Duplex has been Duplex printing was •...
  • Page 236 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. number of While using the error job Delete Hold Print files (automatic) or files. (Auto)" store function to store unneeded files stored in the machine. Normal Print jobs as Hold Print files, the maximum file capacity for file storage or Hold Print file management...
  • Page 237 10. Troubleshooting Message Causes Solutions "HDD is full." The hard disk became full • Delete unneeded files stored in while printing a Sample the machine. Print, Locked Print, Hold • Reduce the data size of the Print, or Stored Print file. Sample Print, Locked Print, Hold Print, or Stored Print file.
  • Page 238 When Messages Are Displayed on the Control Panel Message Causes Solutions "Insufficient Memory" A memory allocation error PCL 5c occurred. Select a lower resolution on the printer driver. For details about how to change the resolution setting, see the printer driver Help. PCL 6 Select a lower resolution on the printer driver.
  • Page 239 10. Troubleshooting Message Causes Solutions "Print overrun." Images were discarded PCL 5c while printing. Select a lower resolution on the printer driver. For details about how to change the resolution setting, see the printer driver Help. PCL 6 Select a lower resolution on the printer driver.
  • Page 240 When Messages Are Displayed on the Control Panel Message Causes Solutions "The print job has been The maximum page Delete some of the files stored in the cancelled because capture capacity of the Document Document Server or reduce the number file(s) could not be stored: Server was exceeded.
  • Page 241: Messages Displayed When Using The Scanner Function

    10. Troubleshooting Messages Displayed When Using the Scanner Function This section describes likely causes of and possible solutions for the error messages that appear on the control panel. If a message not described here appears, act according to the message. Message Causes Solutions...
  • Page 242 When Messages Are Displayed on the Control Panel Message Causes Solutions "Connection with the An antivirus program or a Antivirus programs and firewalls can destination has failed. Check firewall is preventing the prevent client computers from the settings. Entered path machine connecting to your establishing connection with this name might be incorrect, or...
  • Page 243 10. Troubleshooting Message Causes Solutions "Cannot write on the The memory device is faulty, • Check to see if the memory device memory storage device. or the file name contains a is defective. Check the memory storage character that cannot be •...
  • Page 244 When Messages Are Displayed on the Control Panel Message Causes Solutions "The data could not be sent A time out occurred when • Reduce the number of originals, because the PC timed out using WSD Scanner. Time and then scan again. before it was sent."...
  • Page 245 10. Troubleshooting Message Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity. Check the maximum data capacity. again. Note that it may not be possible scanning resolution, then to scan very large originals at a high press the Start key again."...
  • Page 246 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. number of The file being stored has Specify whether to store the data or pages per file. Do you want exceeded the maximum not. Scan the pages that were not to store the scanned pages number of pages for one file.
  • Page 247 10. Troubleshooting Message Causes Solutions "Exceeded time limit for A network error has • Try the operation again. If the LDAP server search. Check occurred and connection message is still shown, the the server status." has failed. network may be busy. •...
  • Page 248 When Messages Are Displayed on the Control Panel Message Causes Solutions "Memory is full. Press [Write] The scan could not be Select whether or not to save the to write the current scanned completed because there scanned document to the memory data to the memory storage was insufficient hard disk device.
  • Page 249 10. Troubleshooting Message Causes Solutions "Scanner journal full. Cannot "Print & Delete Scanner Print or delete Scanner Journal. For send data. Delete Journal" in [Scanner details about printing or deleting scan.journals in Features] is set to [Do not Scanner Journal, see "General Scan.Features."...
  • Page 250 When Messages Are Displayed on the Control Panel Message Causes Solutions "Some invalid destination(s) The specified group contains In the message that appears at each contained. Do you want to e-mail destinations and Scan transmission, press [Select]. select only valid to Folder destinations, either destination(s)?"...
  • Page 251 10. Troubleshooting Message Causes Solutions "The number of destinations The e-mail has too many Split the destinations into two or more that can be specified at the destinations. groups. same time is as shown above." "The selected file(s) You have tried to delete files To check your access permission for contained file(s) without without the authority to do...
  • Page 252 When Messages Are Displayed on the Control Panel Message Causes Solutions "Updating the destination list A network error has • Check whether the server is has failed. Try again?" occurred. connected. • Antivirus programs and firewalls can prevent client computers from establishing connection with this machine.
  • Page 253 10. Troubleshooting Message Causes Solutions "You do not have the The logged in user name For details about how to set privileges to use this does not have permission for permissions, see Security Guide function." the selected function. "Exceeded max. data The data being scanned is Reduce the resolution or [Specify Size] capacity.
  • Page 254 When Messages Are Displayed on the Control Panel Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the Digital with digital signature) has digital signature) must be installed. For Signature's device certificate expired.
  • Page 255 10. Troubleshooting Message Causes Solutions "Transmission cannot be The device certificate (S/ A new device certificate (S/MIME) performed because the MIME) has expired. must be installed. For details about certificate used for the S/ how to install a device certificate (S/ MIME signature is not MIME), see Security Guide currently valid."...
  • Page 256: When Messages Are Displayed On Your Computer Screen

    When Messages Are Displayed on Your Computer Screen When Messages Are Displayed on Your Computer Screen Messages Displayed When Using the Scanner Function This section describes likely causes of and possible solutions for the main error messages displayed on the client computer when using the TWAIN driver. If a message not described here appears, act according to the message.
  • Page 257 10. Troubleshooting Message Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly. network correctly. ("XXX"...
  • Page 258 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Error has occurred in the An error has occurred in the • Check whether the network cable scanner driver." driver. is connected correctly to the client computer. • Check whether the Ethernet board of the client computer is recognized correctly by Windows.
  • Page 259 10. Troubleshooting Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help. The problem may also be due to the following causes: •...
  • Page 260 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such •...
  • Page 261 10. Troubleshooting Message Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool. For the WIA not be obtained from the driver, check the [Network host name.
  • Page 262 The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license. Microsoft, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries.
  • Page 263 11. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 264 INDEX Envelope............70, 140 Error message. 157, 159, 172, 173, 177, 186, 201 2 Sided Print............. Exposure glass......25, 28, 30, 53, 54 Exposure glass cover........25, 33 Extender..........26, 28, 29, 31 Address book 11, 77, 78, 104, 106, 107, 110, 111 External options..........
  • Page 265 Login key..............Login/Logout key..........Quick install............Logout key.............. Lower right cover........26, 28, 31 Region A..............Region B..............Main power indicator........... Registering destinations......... Main power switch......26, 28, 30, 49 Reset key..............Media access lamp..........Right cover..........26, 28, 31 Media slots............
  • Page 266 Two-Sided Combine..........Two-sided paper..........Unauthorized copy prevention......Used toner............User code authentication........User Tools key............User Tools/Counter key........Ventilation holes....26, 27, 28, 29, 30, 32 Web Image Monitor......23, 121, 123...
  • Page 267 MEMO D118...
  • Page 268 © 2011...
  • Page 269 D118-7500...
  • Page 270 Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 272 TABLE OF CONTENTS 1. Introduction Start Installer................................3 Software and Utilities Included on the CD-ROM.....................5 Printer Drivers..............................5 TWAIN Driver..............................7 LAN-Fax Driver...............................8 Font Manager..............................9 For Mac OS X Users............................10 2. Installing the Printer Driver Confirming the Connection Method.......................11 Network Connection...........................11 Local Connection............................12 Quick Install..............................13 Installing the Printer Driver for a Network Connection..................14 Installing the Printer Driver for the Selected Port..................14...
  • Page 273 Installing the LAN-FAX driver in "Add Printer"...................45 Setting LAN-Fax Driver Properties........................47 Setting Print Properties..........................47 Configuring Option Settings for the Facsimile...................48 5. Troubleshooting Messages Displayed When Installing the Printer Driver................49 If USB Connection Fails...........................51 6. Installing the Printer Driver Under Mac OS X Installing the PPD Files............................53 Registering the Printer............................54 USB Connection............................54...
  • Page 274: Introduction

    1. Introduction This chapter explains the software included on the supplied CD-ROM. Start Installer To connect this machine to a client computer and use its printer, scanner, and fax functions, the software included on the provided CD-ROM must be installed on the client computer. The installer starts automatically when you insert the provided CD-ROM into the CD-ROM drive of a client computer running under Windows or Windows Server.
  • Page 275 1. Introduction Select Language Change the interface language. Browse This CD-ROM Browse the contents of this CD-ROM. Exit Quit Installer. • Manage Printers permission is required to install the driver. Log on as an Administrators group member. • Auto Run might not work automatically with certain OS settings. If this is the case, double-click "SETUP.EXE", located on the CD-ROM root directory, or click [Run SETUP.EXE] in the [AutoPlay] dialog box.
  • Page 276: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD-ROM This section explains the software and utilities CD-ROM provided with this machine. • For the latest information on the corresponding operating system, see "Readme.txt" file in the DRIVERS folder.
  • Page 277 1. Introduction *7 Mac OS X 10.2 or later (native mode). Any versions higher than Mac OS X 10.6 are not supported. PCL printer drivers Two kinds of PCL printer driver (PCL 5c and PCL 6) are included. These drivers allow your computer to communicate with this machine via a printer language.
  • Page 278: Twain Driver

    Software and Utilities Included on the CD-ROM Printer Language Supported languages PCL 5c PCL 6 PostScript 3 PPD (Mac OS X) Czech Polish Portuguese Russian Catalan Turkish Brazilian Portuguese Greek : Supported : Supported, but the printer language is displayed in English *1 The PCL 5c printer driver does not support Brazilian Portuguese and Greek.
  • Page 279: Lan-Fax Driver

    1. Introduction *1 Operates in 32-bit compatibility mode on 64-bit operating systems • Display resolution 800 × 600 pixels, 256 colors or higher Supported languages The TWAIN driver uses the same interface language as the one specified by your operating system.
  • Page 280: Font Manager

    Software and Utilities Included on the CD-ROM Font Manager For installing new screen fonts, or organizing and managing fonts already in the system. For details about Font Manager, see the manual on the CD-ROM. File path The software is included in the following folder on the CD-ROM: \FONTMAN\DISK1 •...
  • Page 281: For Mac Os X Users

    1. Introduction For Mac OS X Users If you are using Mac OS X, the following limitations apply to each function: • When using the scanner function, the TWAIN driver cannot be used. • When using the fax function, the LAN-Fax driver cannot be used. •...
  • Page 282: Installing The Printer Driver

    2. Installing the Printer Driver This chapter explains how to install and configure the printer drivers for use on the Windows operating system. Confirming the Connection Method This machine supports network and local connection. Before installing the printer driver, check how the machine is connected. Follow the driver installation procedure that is appropriate to the connection method.
  • Page 283: Local Connection

    2. Installing the Printer Driver • For details about how to install the printer driver for each type of port, see p.14 "Installing the Printer Driver for the Selected Port". Using as a network printer This machine can be used as a remote printer using the Windows or NetWare print server function. Client OS Using Server •...
  • Page 284: Quick Install

    Quick Install Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set. When the machine is connected to a client computer via parallel connection, the printer port is set to [LPT1].
  • Page 285: Installing The Printer Driver For A Network Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Network Connection This section describes the installation procedure of the printer drivers for network connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 286 Click [Next]. Enter the machine name or IP address, and then click [Next]. When the device type selection appears, select "RICOH Network Printer C model". Click [Finish]. Check that the port of the selected printer is displayed in [Port :].
  • Page 287 2. Installing the Printer Driver • Installation of the certificate is especially necessary for users who want to print via IPP-SSL from Windows Vista/7 or Windows Server 2008/2008 R2. For details, consult your administrator. • If a certificate authority issues a certificate that must be authenticated by an intermediate certificate authority, and the certificate is installed on this machine, an intermediate certificate must be installed on the client computer.
  • Page 288 Installing the Printer Driver for a Network Connection Select the manufacturer and model name of the machine you want to use, and then click [Next]. The installation starts. Follow the instructions that appear. Modify settings such as printer name and default printer configuration, as necessary.
  • Page 289 2. Installing the Printer Driver Using the WSD port • The WSD port can be used under Windows Vista/7, or Windows Server 2008/2008 R2. • You can connect to the printer only if both the printer and computer are on the same network segment, or "Network discovery"...
  • Page 290 Installing the Printer Driver for a Network Connection • To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the printer's icon in the [Network] window, and then click [Uninstall]. Windows 7, Windows Server 2008 R2 Quit all applications.
  • Page 291 2. Installing the Printer Driver Click [Finish]. If installation is successful, the icon of the printer connected to the WSD port will appear in the window for configuring printers. • To stop installation of the selected driver, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the machine's icon in the [Network] window, and then click [Uninstall].
  • Page 292 Installing the Printer Driver for a Network Connection In the [Printer URL] box, enter "http://machine's IP address/printer" as the machine's address. If the server authentication is issued, enter "https://machine's IP address/printer" to enable SSL (a protocol for encrypted communication). Example IP address: 192.168.15.16 http://192.168.15.16/printer https://192.168.15.16/printer You can enter "http://machine's IP address/ipp"...
  • Page 293: Using As A Network Printer

    2. Installing the Printer Driver Click the [Ports] tab, and then click [Configure Port]. The [Port Configuration:] window appears. Windows 7, Windows Server 2008 R2: On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to use, and then click [Printer Properties]. Click the [Ports] tab, and then click [Configure Port].
  • Page 294 Installing the Printer Driver for a Network Connection The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. If installing the PostScript 3 printer driver, proceed to step 7. Select a printer driver you want to use, and then click [Next].
  • Page 295 2. Installing the Printer Driver Select a printer driver you want to use, and then click [Next]. Select the check box of the machine model you want to use. Double-click the machine name to display the printer settings. Click [Port :], and then click [Add] in the [Change settings for 'Port'] box. Click [Network Printer], and then click [OK].
  • Page 296 Installing the Printer Driver for a Network Connection • The protocol is set to inactive as default. Enable the protocol on the control panel, using Web Image Monitor, SmartDeviceMonitor or telnet. Notes when using NetWare Form Feed Do not use NetWare to configure form feed. Form feed is controlled by the printer driver on Windows.
  • Page 297 2. Installing the Printer Driver 5. Click [OK]. Printing after Resetting the Printer Printer to print server connection requires 30 - 40 seconds to resume after the printer is reset. During this period, jobs may be accepted (depending on NetWare specifications) but not printed. To print after resetting the printer as the remote printer, check on the print server that the remote printer is disconnected, or wait for two minutes before trying to print.
  • Page 298: Installing The Printer Driver For A Local Connection

    Installing the Printer Driver for a Local Connection Installing the Printer Driver for a Local Connection This section describes the installation procedure of the printer drivers for USB, parallel, or Bluetooth connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 299 2. Installing the Printer Driver Connect the machine and computer using the USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Select [No, not this time], and then click [Next]. Click [Install from a list or specific location [Advanced]], and then click [Next].
  • Page 300 Installing the Printer Driver for a Local Connection Check that the power of the machine is off. Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. In the [Found New Hardware] window, click [Locate and install driver software (recommended)].
  • Page 301 2. Installing the Printer Driver Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Click [Devices and Printers] from the [Start] menu. Double-Click the icon of machine you want to use in the [Unspecified] category.
  • Page 302: Parallel Connection

    Installing the Printer Driver for a Local Connection Parallel Connection To use a printer connected using a parallel interface, click [LPT1] when installing the printer driver. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Run AUTORUN.EXE].
  • Page 303 2. Installing the Printer Driver Restrictions on SPP, HCRP • A maximum of two Bluetooth adaptor or Bluetooth-equipped computers can be connected at the same time using the Bluetooth interface: one by SPP, one by HCRP. • When connecting more than one Bluetooth adaptor or Bluetooth-equipped computer at the same time, the first device that establishes connection is selected.
  • Page 304 Installing the Printer Driver for a Local Connection Click [Bluetooth Printer], and then click [Next]. The computer begins searching for available Bluetooth printers. If a new printer is discovered, the [Found New Hardware Wizard] window appears. To ignore a discovered device and continue searching, click [Cancel]. The computer resumes searching for other available Bluetooth printers.
  • Page 305 2. Installing the Printer Driver In the [Found New Hardware] window, select the printer driver you want to use, and then click [Next]. The installation starts. If the [Windows Security] window appears, click [Install this driver software anyway]. Click [Close]. If you want to change the printer name, enter the new name in the [Printer Name Settings] window.
  • Page 306: Configuring Option Settings For The Printer

    Configuring Option Settings for the Printer Configuring Option Settings for the Printer When bidirectional communication works correctly, your computer obtains information about option, paper size and paper feed direction settings from the machine automatically. Bidirectional communication also allows you to monitor machine status. When bidirectional communication is disabled, you have to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 307: If Bidirectional Communication Is Disabled

    2. Installing the Printer Driver If Bidirectional Communication is Disabled This section describes how to set up option, paper size and paper feed direction settings on your computer manually. • Manage Printers permission is required to change the printer properties. Log on as an Administrators group member.
  • Page 308: Installing Font Manager

    Installing Font Manager Installing Font Manager • Manage Printers permission is required to install Font Manager. Log on as an Administrators group member. • The operating systems compatible with Font Manager are Windows XP/Vista. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 309 2. Installing the Printer Driver...
  • Page 310: Installing The Scanner Driver

    3. Installing the Scanner Driver This chapter explains how to install the TWAIN driver on a client computer. Installing the TWAIN Driver To use the network TWAIN scanner, you must install the TWAIN driver on a client computer. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 311 3. Installing the Scanner Driver...
  • Page 312: Installing The Facsimile Driver

    4. Installing the Facsimile Driver This chapter explains how to install and configure the LAN-Fax driver on a client computer. Installing the LAN-Fax Driver Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps you edit LAN-Fax transmission destinations. LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover sheets.
  • Page 313: Specifying The Port When Installing The Lan-Fax Driver

    4. Installing the Facsimile Driver Click [LAN-Fax Driver]. The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. Click [Next]. Double-click [Printer Name : <LAN-Fax M(number)>]. Click [Port:].
  • Page 314 Installing the LAN-Fax Driver Procedure/description in the Procedure/description in the Items to be replaced printer driver LAN-Fax driver • Select the check box of the machine model you want to use. The procedures in the [Install Double-click [Printer Name : Printer Driver] dialog box <LAN-Fax M(number)>].
  • Page 315: Enabling The Function To Prevent Transmission To The Wrong Destination

    4. Installing the Facsimile Driver Enabling the Function to Prevent Transmission to the Wrong Destination To enable the function to prevent transmission to the wrong destination, edit the configuration file before you install the driver. This section explains how to edit the configuration file and install the LAN-Fax driver using the edited configuration file.
  • Page 316: Installing The Lan-Fax Driver In "Add Printer

    Enabling the Function to Prevent Transmission to the Wrong Destination Save the configuration file that has been edited. Installing the LAN-FAX driver in "Add Printer" Install the LAN-FAX driver after the configuration file has been edited. Open the printer window. •...
  • Page 317 4. Installing the Facsimile Driver Click [Finish]. When you are prompted to restart your computer, restart it by following the instructions that appear.
  • Page 318: Setting Lan-Fax Driver Properties

    Setting LAN-Fax Driver Properties Setting LAN-Fax Driver Properties • Manage Printers permission is required to set the properties for the LAN-Fax driver. Log on as an Administrators group member. • The method for selecting the LAN-Fax driver will vary according to your operating system. For details, see Windows Help.
  • Page 319: Configuring Option Settings For The Facsimile

    4. Installing the Facsimile Driver Configuring Option Settings for the Facsimile Open the printer windows. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Printers and Faxes]. • Windows Vista, Windows Server 2008: On the [Start] menu, select [Control Panel], and then click [Printers] in [Hardware and Sound] category.
  • Page 320: Troubleshooting

    5. Troubleshooting This chapter provides solutions for driver installation and USB connection problems. Messages Displayed When Installing the Printer Driver This section describes what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using Add Printer Wizard.
  • Page 321 5. Troubleshooting • Available ports vary according to your Windows operating system or the type of interface. For details, see p.11 "Confirming the Connection Method".
  • Page 322: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section describes how to troubleshoot a problem related to USB connections. Problem Causes Solutions The machine is not The USB cable is not Disconnect the USB cable, and then automatically recognized. connected properly.
  • Page 323 5. Troubleshooting...
  • Page 324: Installing The Printer Driver Under Mac Os

    6. Installing the Printer Driver Under Mac OS X This chapter explains how to install and configure the printer drivers for use on the Mac OS X operating system. Installing the PPD Files To print using the printer specific features under Mac OS X, install the PPD files. •...
  • Page 325: Registering The Printer

    6. Installing the Printer Driver Under Mac OS X Registering the Printer To use the machine, the printer must be registered in the printer list. Make sure the machine and computer are connected and turned on, and perform the following procedure.
  • Page 326: Network Connection

    Registering the Printer Click [Choose]. Click [Add]. If the option settings need to be configured, see p.57 "Configuring Option Settings for the Printer Under Mac OS X". Quit Print Center or Printer Setup Utility. Mac OS X 10.4 - 10.6 Start System Preferences.
  • Page 327 6. Installing the Printer Driver Under Mac OS X Select the machine you are using from the [Printer Model:] pop-up menu. If the machine you are using is not selected in [Printer Model:], select its manufacturer or [Other...] in the pop-up menu, and then select the PPD file of the machine. For the location of the PPD files, see p.53 "Installing the PPD Files".
  • Page 328: Configuring Option Settings For The Printer Under Mac Os X

    Configuring Option Settings for the Printer Under Mac OS X Configuring Option Settings for the Printer Under Mac OS X This section explains how to configure the printer driver. Mac OS X 10.2 - 10.3 Start Print Center or Printer Setup Utility in Applications\Utilities. Click [Set Up Printers...].
  • Page 329 6. Installing the Printer Driver Under Mac OS X...
  • Page 330: Appendix

    7. Appendix Updating or Deleting the Driver • Administrator permission is required to update or delete the driver in use. Log on as an Administrators group member. • If the [User Account Control] dialog box appears, click [Yes] or [Continue]. •...
  • Page 331: Deleting The Driver

    7. Appendix Click [OK]. Select the machine model, and then click [Next]. The driver update starts. Click [Finish]. Click [OK] to close the printer properties window. Restart the computer. TWAIN driver You can download the most recent version of the TWAIN driver from the manufacturer's Web site. Delete the old version of the TWAIN driver first, and then install the new TWAIN driver.
  • Page 332 Updating or Deleting the Driver Click [Delete]. Click [OK]. Click [Close] to close the print server properties window. Windows 7, Windows Server 2008 R2 On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to delete, and then click [Remove Device]. Click [Yes].
  • Page 333 7. Appendix Quit uninstaller.
  • Page 334: Trademarks

    Trademarks Trademarks Adobe, PageMaker, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or countries. Macintosh, and Mac OS are registered trademarks of Apple Inc, registered in the U.S. and other countries. IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States or other countries.
  • Page 335 7. Appendix ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition •...
  • Page 336: Index

    INDEX Network printer..........12, 22 Bidirectional communication........ BIP................Option settings.......... 35, 48, 57 Bluetooth..............Bluetooth printer............ Parallel connection......... 13, 31 PCL............5, 13, 14, 22 CD-ROM..............PostScript 3..........5, 14, 22 Confirming the connection method...... PPD................Connection fails............. Prevent Transmission to the Wrong Destination. . Printer driver..........
  • Page 337 MEMO...
  • Page 338 MEMO...
  • Page 339 MEMO D118-7518...
  • Page 341 D118-7518 © 2011...
  • Page 342 Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 344 TABLE OF CONTENTS Functions That Require Options.........................8 Main Software Products.............................9 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators..............................14 Configuring Administrator Authentication......................15 Specifying Administrator Privileges......................16 Registering and Changing Administrators....................18 Using Web Image Monitor to Configure Administrator Authentication..........21 Administrator Login Method..........................22 Logging in Using the Control Panel......................22 Logging in Using Web Image Monitor......................23...
  • Page 345 Creating the Server Certificate........................49 If the Fax Number Cannot be Obtained....................50 LDAP Authentication............................51 Specifying LDAP Authentication.........................52 Integration Server Authentication........................57 Specifying Integration Server Authentication....................57 Printer Job Authentication..........................63 Printer Job Authentication Levels.........................63 Printer Job Types............................63 "authfree" Command...........................66 Auto Registration to the Address Book......................67 Data Carry-over Setting for Address Book Auto-program...............67 User Lockout Function............................69 Specifying the User Lockout Function......................70...
  • Page 346 Clearing Print Volume Use Counters......................90 Configuring the Auto-Reset Function......................91 4. Preventing Leakage of Information from Machines Protecting the Address Book...........................93 Specifying Address Book Access Permissions...................93 Encrypting Data in the Address Book......................95 Encrypting Data on the Hard Disk........................98 Enabling the Encryption Settings......................100 Backing Up the Encryption Key........................102 Updating the Encryption Key........................103 Canceling Data Encryption........................104...
  • Page 347 User Setting for SSL/TLS...........................134 Setting the SSL/TLS Encryption Mode.....................135 Enabling SSL for SMTP Connections.......................136 Configuring S/MIME............................138 E-mail Encryption............................138 Attaching an Electronic Signature......................140 Specifying Checking of the Certificate Valid Period................142 Configuring PDFs with Electronic Signatures....................144 Selecting the Device Certificate.......................144 Configuring IPsec............................145 Encryption and Authentication by IPsec....................145 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings........146 IPsec Settings.............................147...
  • Page 348 Unauthorized Copy Prevention / Data Security for Copying..............191 Enabling Pattern Printing...........................191 Enabling Data Security for Copying......................193 Printing User Information on Paper.......................194 Managing Locked Print Files.........................197 Deleting Locked Print Files........................197 Changing the Password of a Locked Print File..................199 Unlocking a Locked Print File........................200 Enforced Storage of Documents to be Printed on a Printer................202 7.
  • Page 349 Extended Security Function Settings......................260 Other Security Functions..........................267 Fax Function...............................267 Scanner Function............................268 System Status.............................268 Confirming Firmware Validity........................268 Limiting Machine Operations to Customers Only..................269 Settings...............................269 Additional Information for Enhanced Security....................270 Settings You Can Configure Using the Control Panel................270 Settings You Can Configure Using Web Image Monitor...............272 Settings You Can Configure When IPsec Is Available/Unavailable............273 8.
  • Page 350 Web Image Monitor: Fax..........................346 Web Image Monitor: Scanner........................348 Web Image Monitor: Interface........................351 Web Image Monitor: Network........................353 Web Image Monitor: Security........................357 Web Image Monitor: @Remote........................358 Web Image Monitor: Webpage........................359 Web Image Monitor: Extended Feature Settings..................360 Web Image Monitor: Address Book......................361 Web Image Monitor: Reset Printer Job......................362 Web Image Monitor: Reset the Machine....................363 Web Image Monitor: Device Home Management..................364 Web Image Monitor: Customize Screen per User..................365...
  • Page 351: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Data security for copying function Copy Data Security Unit...
  • Page 352: Main Software Products

    Main Software Products Product name Names in the text DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise Remote Communication Gate S Pro for @Remote Enterprise and Remote Communication Gate S Remote Communication Gate S *1 This product is no longer sold.
  • Page 354: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. 1.
  • Page 355: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. Press the [User Tools/Counter] key.
  • Page 356 Before Using This Machine Enable SSL/TLS. For details about enabling SSL/TLS, see p.132 "Configuring SSL/TLS". Change the administrator's user name and password. For details about specifying administrators' user names and passwords, see p.21 "Using Web Image Monitor to Configure Administrator Authentication". Log out and then close Web Image Monitor.
  • Page 357: Administrators

    1. Getting Started Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 358: Configuring Administrator Authentication

    Configuring Administrator Authentication Configuring Administrator Authentication Administrator authentication is a mechanism by which an administrator ID is confirmed via a login user name and password when an administrator starts to make the various settings of this machine or when accessing the machine from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book.
  • Page 359: Specifying Administrator Privileges

    1. Getting Started A user administrator can register/delete users in the Address Book or change users' personal information. Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again.
  • Page 360 Configuring Administrator Authentication • Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will have to return the machine to its default state. This will result in all data in the machine being lost.
  • Page 361: Registering And Changing Administrators

    1. Getting Started Select the settings to manage. The selected settings will be unavailable to users. The available settings (settings that can be made) differ for each administrator. To specify administrator authentication for more than one category, repeat steps 6 to 8. Press [OK].
  • Page 362 Configuring Administrator Authentication Select a category so that administrator settings can be specified from User Administrator, Machine Administrator, Network Administrator and File Administrator. Select the number of the administrator and press [OK]. When assigning privileges to each administrator individually, specify administrator numbers in each category separately.
  • Page 363 1. Getting Started Press [Change] for "Login User Name". Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy and how to specify it, see p.259 "Specifying the Extended Security Functions".
  • Page 364: Using Web Image Monitor To Configure Administrator Authentication

    Configuring Administrator Authentication Usable characters for user names and passwords The following characters can be used for login user names and passwords. Names and passwords are case sensitive. • Upper case letters: A to Z (26 characters) • Lower case letters: a to z (26 characters) •...
  • Page 365: Administrator Login Method

    1. Getting Started Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Press the [User Tools/Counter] key. Press the [Login/Logout] key. CMR636 The login screen appears.
  • Page 366: Logging In Using Web Image Monitor

    Administrator Login Method • If you log in using administrator privilege, the name of the administrator logging in appears. When you log in with a user name that has multiple administrator privileges, one of the administrator privileges associated with that name is displayed. •...
  • Page 367: Administrator Logout Method

    1. Getting Started Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the [Login/Logout] key. Press [Yes]. • You can log out using the following procedures also. •...
  • Page 368: Supervisor

    Supervisor Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If logged in using the supervisor's user name and password, you cannot use normal functions or specify defaults.
  • Page 369 1. Getting Started Press [Program/Change Administrator]. Select the administrator number you want to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [Change] for "Encryption Password". Re-enter the encryption password for confirmation, and then press [OK].
  • Page 370: Changing The Supervisor

    Supervisor Changing the Supervisor This section describes how to change the supervisor's login name and password. To do this, you must enable the user administrator's privileges through the settings under "Administrator Authentication Management". For details, see p.16 "Specifying Administrator Privileges". The supervisor logs in from the control panel.
  • Page 371 1. Getting Started...
  • Page 372: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the personal information in the machine's Address Book, and can use only the functions they are permitted to access by administrators.
  • Page 373: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a process by which the user's ID is confirmed via a login user name and password when the user starts to use this machine or when accessing the machine from a network. CJC010 1.
  • Page 374: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication To control users' access to the machine, perform user authentication using login user names and passwords. There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 375 2. Configuring User Authentication authentication, or Integration Server authentication. In this case, since the User Code authentication does not have a password, the login password is set as blank. • When authentication switches to an external authentication method (Windows authentication, LDAP authentication, or Integration Server authentication), authentication will not occur, unless the external authentication device has the carried over user code account previously registered.
  • Page 376: User Code Authentication

    User Code Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Authentication Information", Connecting the Machine/ System Settings.
  • Page 377 2. Configuring User Authentication Select a function from [Restrict Copier Functions], [Restrict Printer Functions], and [Restrict Other Functions], so that user restriction can be enabled. Select which of the machine's functions you want to limit. If the function you want to select is not displayed, press [ ]. The selected functions are subject to User Code authentication.
  • Page 378 User Code Authentication If you select [Entire] or [Simple (All)], proceed to step 16. If you select [Simple (Limitation)], proceed to step 13. Press [Change Limitation Range]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". Pressing [ ] allows you to display all items.
  • Page 379: Basic Authentication

    2. Configuring User Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the personal data in the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 380 Basic Authentication Select a function from [Available Copier Functions], [Available Functions], and [Available Other Functions], so that user operations for the selected function can be authorized. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book.
  • Page 381: Authentication Information Stored In The Address Book

    2. Configuring User Authentication Press [Change Limitation Range]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". Pressing [ ] allows you to display all items. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces.
  • Page 382: Specifying Login User Names And Passwords

    Basic Authentication Specifying Login User Names and Passwords In "Address Book Management", specify the login user name and login password to be used for "User Authentication Management". For the characters that can be used for login user names and passwords, see p.21 "Usable characters for user names and passwords".
  • Page 383: Specifying Login Details

    2. Configuring User Authentication Press [Change] for "Login User Name". Enter a login user name, and then press [OK]. Press [Change] for "Login Password". Enter a login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK].
  • Page 384 Basic Authentication Select the conditions for displaying the address book. Select the user. Press [Auth. Info]. Press [SMTP Authentication]. For folder authentication, press [Folder Authentication]. For LDAP authentication, press [LDAP Authentication]. Select [Use Auth. Info at Login]. Press [OK]. Press [Exit]. Press [OK].
  • Page 385: Windows Authentication

    2. Configuring User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 386 Windows Authentication • During Windows Authentication, data registered in the directory server, such as the user's e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. •...
  • Page 387: Specifying Windows Authentication

    2. Configuring User Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ ] three times.
  • Page 388 Windows Authentication Select [On], and then press [Realm Name]. If you want to use NTLM authentication, proceed to step 11. Select Kerberos authentication realm. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters. For details about registering a realm, see "Programming the Realm", Connecting the Machine/ System Settings.
  • Page 389 2. Configuring User Authentication Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 18. If you select [Simple (Limitation)], proceed to step 15. Press [Change Limitation Range].
  • Page 390 Windows Authentication Press [On], and then press [OK]. If you are not using secure sockets layer (SSL) for authentication, press [Off]. If you have not registered a global group, proceed to step 29. If you have registered a global group, proceed to step 21. If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 391: Installing Internet Information Services (Iis) And Certificate Services

    2. Configuring User Authentication Press [Group Name], and then enter the group name. Press [OK]. Select the function(s) to allow groups to use from among [Available Copier Functions], [Available Printer Functions] and [Available Other Functions]. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ].
  • Page 392: Creating The Server Certificate

    Windows Authentication Install the components, and then create the server certificate. If they are not installed, install them as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrator Tools], and then click [Server Manager]. Click [Roles] in the left column, click [Add Roles] from the [Action] menu.
  • Page 393: If The Fax Number Cannot Be Obtained

    2. Configuring User Authentication In the right column, click [Create Certificate Request...]. Enter all the information, and then click [Next]. In "Cryptographic service provider:", select a provider, and then click [Next]. Click [...], and then specify a file name for the certificate request. Specify a location in which to store the file, and then click [Open].
  • Page 394: Ldap Authentication

    LDAP Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 395: Specifying Ldap Authentication

    2. Configuring User Authentication Select either Kerberos, DIGEST, or Cleartext authentication. • User Name You do not have to enter the user name if the LDAP server supports "Anonymous Authentication". • Password You do not have to enter the password if the LDAP server supports "Anonymous Authentication".
  • Page 396 LDAP Authentication The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ ] three times. Press [User Authentication Management]. Press [ ]. Select [LDAP Authentication], and then press [Authentication Info] next to it. If you do not want to use user authentication management, select [Off].
  • Page 397 2. Configuring User Authentication Select the LDAP server to be used for LDAP authentication, and then press [OK]. Press [Printer Job Authentication]. Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 15.
  • Page 398 LDAP Authentication Pressing [ ] allows you to display all items. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit]. Press [OK].
  • Page 399 2. Configuring User Authentication If the function you want to select is not displayed, press [ ]. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. LDAP authentication will be applied to the selected functions.
  • Page 400: Integration Server Authentication

    Integration Server Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server authentication, single sign-on is possible using DeskTopBinder.
  • Page 401 2. Configuring User Authentication Press [ ]. Select [Integration Server Authentication], and then press [Authentication Info] next to it. If you do not want to use user authentication management, select [Off]. Press [Server Name]. Specify the name of the server for external authentication. Enter the server name, and then press [OK].
  • Page 402 Integration Server Authentication Press [Domain Name]. Enter the domain name, and then press [OK]. You cannot specify a domain name under an authentication system that does not support domain login. Press [Obtain URL]. The machine obtains the URL of the server specified in "Server Name". If "Server Name"...
  • Page 403 2. Configuring User Authentication Press [Program/Change Group], and then press [* Not Programmed]. Press [Group Name]. Enter the group name, and then press [OK]. Select the function(s) to allow groups to use from among [Available Copier Functions], [Available Printer Functions] and [Available Other Functions]. Select which of the machine's functions you want to permit.
  • Page 404 Integration Server Authentication Press [Printer Job Authentication]. Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 30. If you select [Simple (Limitation)], proceed to step 27. Press [Change Limitation Range].
  • Page 405 2. Configuring User Authentication You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit]. Press [OK]. Press [Use Secure Connection (SSL)]. Press [On], and then press [OK].
  • Page 406: Printer Job Authentication

    Printer Job Authentication Printer Job Authentication Printer job authentication refers to the function of authenticating the user for printer jobs. The drivers that handle user authentication are PCL or PostScript3. PostScript3 only handles User Code authentication. Printer Job Authentication Levels •...
  • Page 407 2. Configuring User Authentication Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver. 2. The [User Authentication] and [With Encryption] check boxes are selected in the PCL mini- driver * The authentication function cannot be used with IA-64 OS.
  • Page 408 Printer Job Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 409: Authfree" Command

    2. Configuring User Authentication "authfree" Command When [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command makes it possible to specify objects to be excluded from printer job authentication. The default user name for logging in to telnet is "admin". No password is configured. For details on how to login to and use telnet, see "Using telnet", Connecting the Machine/ System Settings.
  • Page 410: Auto Registration To The Address Book

    Auto Registration to the Address Book Auto Registration to the Address Book If a user logs in via Windows, LDAP or Integration Server authentication, their personal information is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 411 2. Configuring User Authentication Press [Carry-over Data]. Press [Change]. Use the number keys to enter the registration number of the Address Book that will use the setting content and press [ ]. Press [OK]. Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 412: User Lockout Function

    User Lockout Function User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 413: Specifying The User Lockout Function

    2. Configuring User Authentication Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 414: Auto Logout

    Auto Logout Auto Logout When using Basic authentication, Windows authentication, LDAP authentication or Integration Server authentication, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 415 2. Configuring User Authentication • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function.
  • Page 416: Authentication Using An External Device

    Authentication Using an External Device Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 417 2. Configuring User Authentication...
  • Page 418: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The destination of faxes and scanned documents can be restricted to addresses that are registered in the Address Book.
  • Page 419 3. Restricting Machine Usage Press [ ]. Press [Restrict Use of Destinations (Fax)] or [Restrict Use of Destinations (Scanner)]. Press [On]. Press [OK]. Press [Exit]. Log out. • If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear.
  • Page 420: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 421: Menu Protect

    3. Restricting Machine Usage Menu Protect In addition to the System Settings, Menu Protect limits user permission to access the initial settings menu for each function. This function is also effective when management is not based on user authentication. To change the menu protect setting, first enable administrator authentication. For details on how to set administrator authentication, see p.15 "Configuring Administrator Authentication".
  • Page 422 Menu Protect Printer Function The machine administrator logs in from the control panel. Press [Printer Features]. Press [Maintenance]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function The machine administrator logs in from the control panel. Press [Scanner Features].
  • Page 423: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Available functions Specify the available functions from the copier, Document Server, fax, scanner, printer, and browser functions. Specifying Which Functions are Available Specify the functions available to registered users.
  • Page 424 Limiting Available Functions Press [Auth. Info]. Press [ ]. Select the function(s) to allow users to use from among [Available Copier Functions], [Available Printer Functions] and [Available Other Functions]. Select the functions you want to specify. If the function you want to select is not displayed, press [ ]. Press [OK].
  • Page 425: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 426: Managing Print Volume Per User

    Managing Print Volume per User Managing Print Volume per User This function limits how much each user can print. When a user reaches their printing limit, their print job is canceled and/or a message indicating so is displayed. Either the user administrator or the machine administrator can specify the print volume available to a user.
  • Page 427: Specifying Limitations For Print Volume

    3. Restricting Machine Usage • The login user name or user code registered in the Address Book is changed while the user is logged in and authenticated. If the following occurs, print volume management will not function correctly: • Under Windows or LDAP authentication, a user logs in to the same user account by using multiple login user names, and these multiple login names are registered in the Address Book as separate users.
  • Page 428 Managing Print Volume per User Press [Print Volume Use Limitation: Unit Count Setting]. For each print condition, use the number keys to enter a per-page unit count between "0" and "200", and then press [ ]. If you specify "0" for a print condition, no volume restriction is applied to jobs matching that condition.
  • Page 429: Specifying The Default Maximum Use Count

    3. Restricting Machine Usage • Depending on the settings configured for User Code authentication, users might be able to make prints before logging in, regardless of the print volume limitation set by the administrator. Restrict all functions in [User Code Authentication] in [User Authentication Management]. Specifying the Default Maximum Use Count The machine administrator logs in from the control panel.
  • Page 430 Managing Print Volume per User Press [Change]. Select the conditions for displaying the address book. Select the user whose maximum available print volume you want to specify. Press [Auth. Info]. Press [ ]. Press [Print Volum. Use Limit.]. Press [Limit]. "Print Volum.
  • Page 431: Checking Print Volume Per User

    3. Restricting Machine Usage If you do not want to limit user's print volume, press [Do not Limit]. Press [Change], and then use the number keys to enter a value between "0" and "999,999" as the maximum available print volume, and then press [ ]. A user whose maximum print volume is set to "0"...
  • Page 432: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User Press [Display/Clear/Print Counter per User]. Press [Print Volume Use Cntr.]. Each user's print volume limit and print volume used to date are displayed. After confirming the settings, log out. • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters.
  • Page 433: Clearing Print Volume Use Counters

    3. Restricting Machine Usage To print a list of the volume use counters of every user, press [Print List] under "All Users". To print a list of the volume use counters of selected users only, select the users whose counters you want to print, and then press [Print List] under "Per User". Select the counter you want to print in the list, and then press [Print].
  • Page 434: Configuring The Auto-Reset Function

    Managing Print Volume per User To clear the print volume use counters of every user, press [Clear] under "All Users". To clear the print volume use counters of selected users only, select the users whose counters you want to clear, and then press [Clear] under "Per User". Select [Prt Volum Use], and then press [OK].
  • Page 435 3. Restricting Machine Usage Press [Administrator Tools]. Press [ ] three times. Press [Volm Use Cntr:Scheduld/Specfid Rst Stng]. Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions. Press [OK]. Log out. • If the machine is off at the specified time, the volume is reset when the power is turned on. •...
  • Page 436: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 437 4. Preventing Leakage of Information from Machines Press [Protection]. Press [Protect Destination]. Press [Permissions for Users/Groups: Program/Change/Delete]. Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK].
  • Page 438: Encrypting Data In The Address Book

    Protecting the Address Book Select the user to whom you want to assign access permission, and then select the permission. Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control]. Press [OK]. Press [Exit] twice. Log out. • The "Edit", "Edit/Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 439 4. Preventing Leakage of Information from Machines Press [On], and then press [Change Encryption Key]. Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt/Decrypt]. Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the Address Book may take a long time.
  • Page 440 Protecting the Address Book • The backup copy of the address book data stored in the SD card is encrypted. For details about backing up and then restoring the address book using an SD card, see "Administrator Tools", Connecting the Machine/ System Settings.
  • Page 441: Encrypting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Encrypting Data on the Hard Disk • Keep SD cards out of reach of children. If a child accidentally swallows an SD card, consult a doctor immediately. Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written.
  • Page 442 Encrypting Data on the Hard Disk Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approximately 2 Only Architecture (stored documents in hours applications' Document Server, program/log Locked Print files / Sample Print files / •...
  • Page 443: Enabling The Encryption Settings

    4. Preventing Leakage of Information from Machines Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 444 Encrypting Data on the Hard Disk Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 445: Backing Up The Encryption Key

    4. Preventing Leakage of Information from Machines If you have selected [Print on Ppr], press the [Start] key and print out the machine's data encryption key. Press [OK]. Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine.
  • Page 446: Updating The Encryption Key

    Encrypting Data on the Hard Disk Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally. • The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption key safely for retrieving backup data.
  • Page 447: Canceling Data Encryption

    4. Preventing Leakage of Information from Machines Canceling Data Encryption Use the following procedure to cancel the encryption settings when encryption is no longer necessary. • After completing this procedure on the machine's control panel, turn off the power and restart the machine to enable the new settings.
  • Page 448: Deleting Data On The Hard Disk

    Deleting Data on the Hard Disk Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 449 4. Preventing Leakage of Information from Machines Overwriting starts automatically once the job is completed. The copier, fax and printer functions take priority over the Auto Erase Memory function. If a copy, fax or print job is in progress, overwriting will only be done after the job is completed. Checking the Auto Erase Memory status If Auto Erase Memory is enabled, you can use the "Check Status"...
  • Page 450 Deleting Data on the Hard Disk Icon Icon name Explanation This icon is lit when there is temporary data to be overwritten, Dirty and blinks during overwriting. Clear This icon is lit when there is no temporary data to be overwritten. •...
  • Page 451 4. Preventing Leakage of Information from Machines Using Auto Erase Memory • When Auto Erase Memory is set to [On], temporary data that remained on the hard disk when Auto Erase Memory was set to [Off] might not be overwritten. •...
  • Page 452 Deleting Data on the Hard Disk Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ]. Press [OK]. Auto Erase Memory is set. Log out. • If you specify to both overwrite and encrypt the data, the data will all be encrypted. Canceling Auto Erase Memory Follow steps 1 to 5 in "Using Auto Erase Memory".
  • Page 453: Erase All Memory

    4. Preventing Leakage of Information from Machines • Scanned files sent by e-mail • Files sent by Scan to Folder • Documents sent using DeskTopBinder, the ScanRouter delivery software or Web Image Monitor • Network TWAIN scanner Data scanned with network TWAIN scanner will not be overwritten by Auto Erase Memory. However, If the "ADF(Read-ahead)"...
  • Page 454 Deleting Data on the Hard Disk • The "Erase All Memory" function also clears the machine's security settings, with the result that afterward, neither machine nor user administration will be effective. Ensure that users do not save any data on the machine after "Erase All Memory" has completed. Using Erase All Memory Disconnect communication cables connected to the machine.
  • Page 455 4. Preventing Leakage of Information from Machines Press [Yes]. When overwriting is completed, press [Exit], and then turn off the main power. Before turning the power off, see "Turning On/Off the Power", Getting Started. • Should the main power switch be turned off before "Erase All Memory" is completed, overwriting will continue once the main power switch is turned back on.
  • Page 456: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 457: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel, or using Web Image Monitor, telnet, SmartDeviceMonitor for Admin or Remote Communication Gate S.
  • Page 458 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require FTP cannot be used. • Web Image Monitor You can restrict • telnet personal information • SmartDeviceMonitor TCP:21 from being displayed for Admin by making settings on •...
  • Page 459 5. Enhanced Network Security Protocol Port Setting method When disabled Functions that require HTTPS cannot be used. @Remote cannot be • Web Image Monitor used. • telnet HTTPS TCP:443 You can also make • SmartDeviceMonitor settings to require SSL for Admin transmission using the control panel or Web Image Monitor.
  • Page 460 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require SNMPv3 cannot be used. • Web Image Monitor You can also make • telnet settings to require • SmartDeviceMonitor SNMPv3 encrypted SNMPv3 UDP:161 for Admin transmission and restrict the use of other •...
  • Page 461 5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet IPP functions cannot be • SmartDeviceMonitor TCP:631 used. for Admin • Remote Communication Gate S TCP:1720 (H.323) UDP:1719 (Gatekeeper) • Control panel TCP/UDP:5060 • Web Image Monitor IP-Fax connecting (SIP) functions using H.323,...
  • Page 462 Enabling and Disabling Protocols Protocol Port Setting method When disabled • Web Image Monitor • telnet DIPRINT functions • SmartDeviceMonitor DIPRINT TCP:9100 cannot be used. for Admin • Remote Communication Gate S You can attempt to • Control panel TCP:10021 update firmware via •...
  • Page 463: Enabling And Disabling Protocols Using The Control Panel

    5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet WSD (Scanner) TCP-53002 • SmartDeviceMonitor WSD (Scanner) functions cannot be (variable) for Admin used. • Remote Communication Gate S WSD (Device, Printer, • telnet Scanner) search WS-Discovery UDP/TCP:3702...
  • Page 464: Enabling And Disabling Protocols Using Web Image Monitor

    Enabling and Disabling Protocols Press [Effective Protocol]. Set the desired protocols to active/inactive. If the protocol you want to select is not displayed, press [ ]. Press [OK]. Press [Exit]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor.
  • Page 465: Specifying Network Security Level

    5. Enhanced Network Security Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 466: Specifying Network Security Level Using Web Image Monitor

    Specifying Network Security Level Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 467: Status Of Functions Under Each Network Security Level

    5. Enhanced Network Security Status of Functions under Each Network Security Level TCP/IP Function Level 0 Level 1 FIPS 140 Level 2 TCP/IP Active Active Active Active HTTP > Port 80 Open Open Open Open IPP > Port 80 Open Open Open Open...
  • Page 468 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 SSDP Active Active Inactive Inactive Active Active Inactive Inactive NetBIOS over TCP/IPv4 Active Active Inactive Inactive WSD (Device) Active Active Active Active WSD (Printer) Active Active Active Active WSD (Scanner) Active...
  • Page 469 5. Enhanced Network Security TCP/IP Encryption Strength Setting Function Level 0 Level 1 FIPS 140 Level 2 ssh > Encryption Algorithm DES/ 3DES/ 3DES/ 3DES/ 3DES/ AES-128/ AES-128/ AES-128/ AES-128/ AES-192/ AES-192/ AES-192/ AES-192/ AES-256/ AES-256 AES-256 AES-256/ Arcfour Blowfish/ Arcfour S/MIME >...
  • Page 470: Protecting The Communication Path Via A Device Certificate

    Protecting the Communication Path via a Device Certificate Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. To use these protocols, it is necessary to create and install a device certificate for the machine in advance.
  • Page 471: Creating And Installing A Device Certificate From Web Image Monitor (Self-Signed Certificate)

    5. Enhanced Network Security Press [Program]. Select [Delete] to delete the device certificate from the machine. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. Press [ ] to flip through pages. To use S/MIME, specify the e-mail address of the administrator of the machine in the mail address setting.
  • Page 472: Creating The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Make the necessary settings. To use S/MIME, set up the e-mail address of the administrator of the machine in the mail address setting. Click [OK]. The setting is changed. Click [OK]. If a security warning dialog box appears, check the details, and then click [OK]. "Installed"...
  • Page 473: Installing The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security For the application, click Web Image Monitor Details icon and use the information that appears in "Certificate Details". • The issuing location may not be displayed if you request two certificates at the same time. When you install a certificate, be sure to check the certificate destination and installation procedure.
  • Page 474: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority. If you do not have the intermediate certificate issued by the certificate authority, a warning message will appear during communication.
  • Page 475: Configuring Ssl/Tls

    5. Enhanced Network Security Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so makes it possible to prevent data from being intercepted during transmission, and its content from being analyzed or tampered with. Flow of SSL/TLS encrypted communications 1.
  • Page 476: Enabling Ssl/Tls

    Configuring SSL/TLS Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 477: User Setting For Ssl/Tls

    5. Enhanced Network Security Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 478: Setting The Ssl/Tls Encryption Mode

    Configuring SSL/TLS • Select [Trusted Root Certification Authorities] for the certificate store location when accessing the machine by IPP. • If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store location with the certificate authority. •...
  • Page 479: Enabling Ssl For Smtp Connections

    5. Enhanced Network Security Press [Permit SSL/TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 480 Configuring SSL/TLS In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out. •...
  • Page 481: Configuring S/Mime

    5. Enhanced Network Security Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 482 Configuring S/MIME 2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the certificate is specified in the Address Book.) 3. Specify the encryption algorithm using Web Image Monitor. 4. Using the shared key, encrypt the e-mail message. 5.
  • Page 483: Attaching An Electronic Signature

    5. Enhanced Network Security Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 484 Configuring S/MIME 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 485: Specifying Checking Of The Certificate Valid Period

    5. Enhanced Network Security Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending Email by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax"...
  • Page 486 Configuring S/MIME Operation mode Description Performance Priority Performing (c) and (d) are omitted. If it takes a long time to verify the validity period when the address is selected or when the [Start] key is pressed, operation can be completed quicker by selecting "Performance Priority".
  • Page 487: Configuring Pdfs With Electronic Signatures

    5. Enhanced Network Security Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 488: Configuring Ipsec

    Configuring IPsec Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine has two methods that you can use to specify the shared encryption key for both parties: encryption key auto exchange and encryption key manual settings.
  • Page 489: Encryption Key Auto Exchange Settings And Encryption Key Manual Settings

    5. Enhanced Network Security • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 490: Ipsec Settings

    Configuring IPsec Settings 1-4 and default setting Using either the manual or auto exchange method, you can configure four separate sets of SA details (such as different shared keys and IPsec algorithms). In the default settings of these sets, you can include settings that the fields of sets 1 to 4 cannot contain.
  • Page 491 5. Enhanced Network Security Security level Security level features Select this level if you want to authenticate the transmission partner and prevent unauthorized data tampering, but not perform data packet encryption. Authentication Only Since the data is sent in cleartext, data packets are vulnerable to eavesdropping attacks.
  • Page 492 Configuring IPsec Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption Phase 1 Diffie- Hellman Group Phase 2 Security Protocol HMAC- HMAC- SHA512-256/ SHA512-256/ Phase 2 HMAC- HMAC- HMAC-SHA512-256/ Authentication SHA384-192/ SHA384-192/ HMAC-SHA384-192/ Algorithm HMAC- HMAC- HMAC-SHA256-128 SHA256-128/ SHA256-128/...
  • Page 493 5. Enhanced Network Security Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 494 Configuring IPsec Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners. a PSK password using up to (auto setting) 32 ASCII characters.
  • Page 495 5. Enhanced Network Security Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 496 Configuring IPsec Encryption key manual settings items Setting Description Setting value • Inactive Specify the address • IPv4 Address Type type for which IPsec • IPv6 transmission is used. • IPv4/IPv6 (Default Settings only) Specify the machine's The machine's IPv4 or IPv6 address. address.
  • Page 497 5. Enhanced Network Security Setting Description Setting value To apply both encryption and authentication to sent • ESP data, specify "ESP" or Security Protocol • AH "ESP+AH". • ESP+AH To apply authentication data only, specify "AH". • HMAC-MD5-96 • HMAC-SHA1-96 Specify the Authentication authentication...
  • Page 498 Configuring IPsec Setting Description Setting value • Cleartext (NULL encryption) • DES • 3DES Specify the Encryption Algorithm encryption algorithm. • AES-128 • AES-192 • AES-256 Specify a value within the ranges shown below, according to the encryption algorithm. hexadecimal value 0-9, a-f, A-F •...
  • Page 499: Encryption Key Auto Exchange Settings Configuration Flow

    5. Enhanced Network Security Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings...
  • Page 500 Configuring IPsec Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission. Click [OK]. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], click the web browser's [Reload] button.
  • Page 501 5. Enhanced Network Security On the [Start] menu, click [Control Panel], click [System and Security], and then click [Administrative Tools]. If you are using Windows XP, on the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then click [Administrative Tools]. Double-click [Local Security Policy].
  • Page 502 Configuring IPsec Select "A specific IP Address or Subnet" in "Destination address", enter the machine's IP address, and then click [Next]. Select the protocol type for IPsec, and then click [Next]. If you are using IPsec with IPv6, select "58" as the protocol number for the "Other" target protocol type.
  • Page 503: Encryption Key Manual Settings Configuration Flow

    5. Enhanced Network Security Select the security policy that was just created, right click, and then click [Assign]. IPsec settings on the computer are enabled. • To disable the computer's IPsec settings, select the security policy, right click, and then click [Un- assign].
  • Page 504: Telnet Setting Commands

    Configuring IPsec Specifying Encryption Key Manual Settings Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPsec] under "Security". Select [Active] for "Encryption Key Manual Settings". Click [Edit] under "Encryption Key Manual Settings". Set items for encryption key manual settings in [Settings 1].
  • Page 505 5. Enhanced Network Security • Encryption key manual settings, SA setting 1-4 values • Encryption key manual settings, default setting values • Encryption key auto exchange settings, IKE setting 1-4 values • Encryption key auto exchange settings, IKE default setting values Display current settings portions msh>...
  • Page 506 Configuring IPsec • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the setting number [1-4]. • To disable the default settings, specify [default]. Specify the local/remote address for settings 1-4 msh>...
  • Page 507 5. Enhanced Network Security Tunnel end point setting msh> ipsec manual {1|2|3|4|default} tunneladdar "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address. • Not specifying either the beginning or ending address displays the current settings. Authentication algorithm and authentication key settings msh>...
  • Page 508 Configuring IPsec • To display the settings 1-4, specify the number [1-4]. • To display the default setting, specify [default]. • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the number [1-4]. •...
  • Page 509 5. Enhanced Network Security • If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify [use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec transmission is performed. •...
  • Page 510 Configuring IPsec ISAKMP SA (phase 1) encryption algorithm setting msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des|aes128|aes192|aes256} • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) encryption algorithm. • Not specifying an encryption algorithm displays the current setting. ISAKMP SA (phase 1) Diffie-Hellman group setting msh>...
  • Page 511 5. Enhanced Network Security • Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) Diffie- Hellman group number. • Specify the group number to be used. • Not specifying a group number displays the current setting. IPsec SA (phase 2) validity period setting msh>...
  • Page 512: Configuring Ieee 802.1X Authentication

    Configuring IEEE 802.1X Authentication Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 513: Selecting The Device Certificate

    5. Enhanced Network Security Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see p.127 "Protecting the Communication Path via a Device Certificate".
  • Page 514 Configuring IEEE 802.1X Authentication • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 515: Setting Items Of Ieee 802.1X For Wireless Lan

    5. Enhanced Network Security • If there is a problem with settings, you might not be able to communicate with the machine. To identify the problem, print a network summary. • If you cannot identify the problem, reset the machine interface to normal, and then repeat the procedure from the beginning.
  • Page 516 Configuring IEEE 802.1X Authentication • Click [Change] in "Password", and then enter the password set in the RADIUS server. If [TLS] is selected for "Phase 2 Method", you do not need to specify a password. • Click [Change] on "Phase 2 User Name", and then enter the user name set in the RADIUS server.
  • Page 517: Snmpv3 Encryption

    5. Enhanced Network Security SNMPv3 Encryption When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. The network administrator logs in from the control panel. Press [System Settings].
  • Page 518 SNMPv3 Encryption • If network administrator's [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent. For details about specifying the network administrator's [Encryption Password] setting, see p.18 "Registering and Changing Administrators".
  • Page 519: Encrypting Transmitted Passwords

    5. Enhanced Network Security Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security of passwords against analysis. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together.
  • Page 520: Specifying An Ipp Authentication Password

    Encrypting Transmitted Passwords Press [Extended Security]. Press [Driver Encryption Key]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 521 5. Enhanced Network Security Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password" box. Click [OK]. IPP authentication is specified. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], click the web browser's [Reload] button.
  • Page 522: Kerberos Authentication Encryption Setting

    Kerberos Authentication Encryption Setting Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 523 5. Enhanced Network Security...
  • Page 524: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Configuring Access Permissions for Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server.
  • Page 525: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents • The default access permission for the file creator (owner) is "Read-only". You can also specify the access permission. • The document administrator not only configures access permissions, but can also delete stored files. For details on the methods of deleting documents, see "Deleting Stored Documents", Copy/ Document Server.
  • Page 526 Configuring Access Permissions for Stored Files Select the file. Press [Confirm/Change]. Press [Change File Info.]. Press [Change Access Privilege].
  • Page 527 6. Preventing the Leaking of Documents Press [Program/Change/Delete] for "Permissions for Users/Groups". Press [New Program]. Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK].
  • Page 528: Changing The Owner Of A Document

    Configuring Access Permissions for Stored Files Press [Exit]. Press [OK]. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. • The "Edit", "Edit/Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 529 6. Preventing the Leaking of Documents • If files become inaccessible, be sure to enable the user administrator, so that the user administrator can reset the access permission for the files in question. The user administrator or the file creator (owner) logs in from the control panel. Press [Address Book Mangmnt].
  • Page 530 Configuring Access Permissions for Stored Files Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK]. Select the user to whom you want to assign access permission, and then select the permission.
  • Page 531: Specifying Passwords For Stored Files

    6. Preventing the Leaking of Documents Specifying Passwords for Stored Files This can be specified by the file administrator or file creator (owner). The file administrator or the file creator (owner) logs in from the control panel. Press the [User Tools/Counter] key to switch to the normal screen. If the message "You do not have the privileges to use this function."...
  • Page 532: Unlocking Stored Files

    Specifying Passwords for Stored Files Press [Change File Info.]. Press [Change Password]. Enter the password using the number keys. You can use 4 to 8 numbers as the password for the stored file. Press [OK]. Confirm the password by re-entering it using the number keys. Press [OK] twice.
  • Page 533 6. Preventing the Leaking of Documents Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. If the message ""You do not have the privileges to use this function."" appears, press [Exit]. Select the file.
  • Page 534: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying In Printer Features, using the printer driver, you can embed a pattern in the printed copy to discourage or prevent unauthorized copying. The unauthorized copy prevention function prevents unauthorized copies of documents by embedding a text pattern (for instance, a warning such as "No Copying") that you can set on the print driver (which will appear on printed copies).
  • Page 535 6. Preventing the Leaking of Documents Press [Unauthd. Copy Prevention]. Press [Unauthorized Copy Prevention Stg.]. Press [On], and then press [OK]. Press [Setting Priority (Drvr/Cmnd/Mach)]. Select the range within which the user can specify the pattern to be printed using the printer driver.
  • Page 536: Enabling Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying • For details of the settings when specifying the pattern using the machine, see "Printer Features", Print. Enabling Data Security for Copying To use this function, the Copy Data Security Unit must be installed. If a document printed is copied, faxed, scanned, or stored in the Document Server, the copy is grayed out.
  • Page 537: Printing User Information On Paper

    6. Preventing the Leaking of Documents Printing User Information on Paper Information such as the start time of a job, information on the person who outputs it (name or login user name), machine number or IP address of the machine can be forced to be printed on paper. This function is called Compulsory Security Stamp.
  • Page 538 Printing User Information on Paper • Date/Time The time a job starts is printed. • Printout User Name If "Stamp User Name" is selected, the "Name" in the "Names" in the Address Book is printed. If "Stamp Login User Name" is selected, the "Login User Name" in the "Auth. Info" in the Address Book is printed.
  • Page 539 6. Preventing the Leaking of Documents Set the stamp position. Press [OK] twice. Log out. • [Adjust Stamp Position] settings are not possible if [Compulsory Security Stamp:Printer] is set.
  • Page 540: Managing Locked Print Files

    Managing Locked Print Files Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function. Locked Print •...
  • Page 541 6. Preventing the Leaking of Documents Press [Print Jobs]. Press [Locked Jobs]. Select the file. Press [Delete]. If a password entry screen appears, enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 542: Changing The Password Of A Locked Print File

    Managing Locked Print Files • You can configure this machine to delete stored files automatically by setting the "Auto Delete Temporary Print Jobs" option to [On]. For details about "Auto Delete Temporary Print Jobs", see "Maintenance", Print. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. Changing the Password of a Locked Print File This can be specified by the file administrator or file creator (owner).
  • Page 543: Unlocking A Locked Print File

    6. Preventing the Leaking of Documents Press [Change Passwd]. If a password entry screen appears, enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK].
  • Page 544 Managing Locked Print Files Select the file. icon appears next to a file locked by the Enhance File Protection function. Press [Unlock File]. Press [Yes]. icon disappears. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 545: Enforced Storage Of Documents To Be Printed On A Printer

    6. Preventing the Leaking of Documents Enforced Storage of Documents to be Printed on a Printer Enforced storage of documents to be printed on a printer prevents information leakage due to users failing to collect prints or leaving prints unattended. With respect to printer output, the following print jobs are subject to compulsory storage.
  • Page 546: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 547 7. Managing the Machine Disabling log transfer to the log collection server Use the following procedure to disable log transfer from the machine to the log collection server. Note that you can change the log transfer setting to [Off] only if it is already set to [On]. For details about the log collection server, contact your sales representative.
  • Page 548: Managing Logs From The Log Collection Server

    Managing Log Files Press [Yes]. Press [Exit]. Log out. • Deleting all logs from the machine as a batch can be achieved by either using the log collection server or via Web Image Monitor if the collection setting of one of the logs — job log, access log or eco-friendly log is enabled.
  • Page 549 7. Managing the Machine Select [Active] for each function: "Collect Job Logs", "Collect Access Logs" and "Collect Eco-friendly Logs". Specify the collection level for each function, "Job Log Collect Level", "Access Log Collect Level", and "Eco-friendly Log Collect Level". When a level is changed, the selection status of log details changes according to the level. To change individual items of the log details, configure the setting for each item.
  • Page 550: Downloading Logs

    Managing Log Files Click [OK]. A confirmation message appears. Click [OK]. Log out. • To encrypt the logs, it is necessary to make the collection setting active for each of the job logs, access logs, and/or eco-friendly log. • If the data stored in the machine has been encrypted, the log files will still be encrypted, regardless of this setting.
  • Page 551 7. Managing the Machine Log out. • Downloaded logs contain data recorded up till the time you click the [Download] button. Any logs recorded after the [Download] button is clicked will not be downloaded. The "Result" field of the log entry for uncompleted jobs will be blank. •...
  • Page 552 Managing Log Files Estimated number of logs created per day Job logs Access logs Eco-friendly logs 100 (per day) 100 (per day) This figure is based on 100 operations such as initialization and access operations over the Web and 200 access log entries (two entries per job: one login and one logout).
  • Page 553 7. Managing the Machine If logs are downloaded without overwriting CJD006 1. Access log 2. Job log 3. Download 4. Downloaded logs If logs are downloaded during overwriting CJD007...
  • Page 554 Managing Log Files 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs. •...
  • Page 555: Logs That Can Be Managed Using Web Image Monitor

    7. Managing the Machine Print job flowchart ID: 0x00000000000022c5 ID: 0x00000000000022c6 ID: 0x00000000000022c5 ID: 0x00000000000022c5 ID: 0x00000000000022c7 CJD008 1. Print job data is received. 2. Authentication (login) data is received. 3. Print job is processed. 4. Print job is output. 5.
  • Page 556 Managing Log Files Job log information items Job Log Item Log Type Attribute Content Copier: Copying Copier: Copying Details of normal and Sample Copy jobs. Copier: Copying and Copier: Copying and Details of files stored in Document Server that Storing Storing were also copied at the time of storage.
  • Page 557 7. Managing the Machine Job Log Item Log Type Attribute Content Printer: Locked Print Printer: Locked Print Log showing Locked Print documents temporarily stored on the machine and then printed from the control panel or through Web Image Monitor. Printer: Sample Print Printer: Sample Print Log showing Sample Print documents (Incomplete)
  • Page 558 Managing Log Files Job Log Item Log Type Attribute Content Printer: Hold Print File Printer: Hold Print File When a document is held for printing and Printing Printing stored temporarily on the machine, this logs the time a user specifies it be printed via the control panel or Web Image Monitor.
  • Page 559 7. Managing the Machine Access Log Item Log Type Attribute Content Unauthorized Unauthorized Details of documents scanned with "Data Copying Copying Security for Copying". All Logs Deletion All Logs Deletion Details of deletions of all logs. Log Setting Change Log Setting Change Details of changes made to log settings.
  • Page 560 Managing Log Files Access Log Item Log Type Attribute Content Password Change Password Change Details of changes made to the login password. Administrator Change Administrator Change Details of changes of administrator. Address Book Change Address Book Change Details of changes made to address book entries.
  • Page 561: Attributes Of Logs You Can Download

    7. Managing the Machine Eco-friendly log information items Eco-friendly Log Item Log Type Attribute Content Main Power On Main Power On Log of when the main power switch is turned Main Power Off Main Power Off Log of when the main power switch is turned off.
  • Page 562 Managing Log Files • Output Format: CSV (Comma-Separated Values) • File Names of Job Logs and Access Logs: "machine name +_log.csv" • File names for Eco-friendly Logs: "machine name+_ecolog.csv" Order of log entries Log entries are printed in ascending order according to Log ID. File structure The data title is printed in the first line (header line) of the file.
  • Page 563 7. Managing the Machine Job and access log information items Item Content Start Date/Time For a job log entry, indicates the start date and time of the operation. If the job has not been completed, this is blank. For an access log entry, indicates the same date and time as shown by "End Date/Time".
  • Page 564 Managing Log Files Item Content Status Indicates the status of an operation or event: • If "Completed" is displayed for a job log entry, the operation completed successfully; "Failed" indicates the operation was unsuccessful; "Processing" indicates the operation is still in progress. •...
  • Page 565 7. Managing the Machine Item Content Status The status of an operation or event is recorded. (For importing and exporting If importing or exporting is executed by another user, device information) "Importing/Exporting by Other User" is recorded. If a connection to an output destination fails, "Connection Failed with Remote Machine"...
  • Page 566 Managing Log Files Item Content Status Supplement If the status of a log is abnormal termination (Failed), the status is recorded. If it does not terminate abnormally, nothing is recorded. If a user cancels an operation, "Cancelled by User" is recorded.
  • Page 567 7. Managing the Machine Item Content Status Supplement If the number of pages that can be captured is exceeded, "Exceed Max. Stored Page (Image Area)" is recorded. (If the Source is a Stored File) If the hard disk capacity for capture is exceeded, "Hard Disk Full (Image Area)"...
  • Page 568 Managing Log Files Item Content Status Supplement If the number of jobs that can be received is exceeded, "Over Job Limit" is recorded. (If the Source is a Printer) If an illegal address or an address with 41 or more digits is specified, "Specifying Destination Error"...
  • Page 569 7. Managing the Machine Item Content Status Supplement If the accounting device is unplugged during operation, "External Charge Unit Disconnected" is recorded. (If the Target is Store) If the logged in user exceeds their paper usage limit, "Exceeded Print Volume Use Limitation" is recorded. If a time-out occurs, "Timeout"...
  • Page 570 Managing Log Files Item Content Status Supplement If a time-out occurs, "Timeout" is recorded. (If the Target is Send 1) If a document is deleted or an undelivered document exceeds its wait time and is deleted, "Transmission Failed (Data Deleted)" is recorded. If the user does not have permission to use a document or function, "No Privilege"...
  • Page 571 7. Managing the Machine Item Content User Entry ID Indicates the user's entry ID. This is a hexadecimal ID that identifies users who performed job or access log-related operations: For supervisors, only 0xffffff86 is available; for administrators, 0xffffff87, 0xffffff88, 0xffffff89, and 0xffffff8a are available. For general users, any value between 0x00000001 and 0xfffffeff is available.
  • Page 572 Managing Log Files Stored File Sending", "Printer: Stored File Printing", and "Fax: Stored File Downloading" (Job logs) and "File Storing" and "Stored File Deletion" (Access logs). Access log information items Item Content Access Log Type Indicates the type of access: "Authentication"...
  • Page 573 7. Managing the Machine Item Content Login User Type Indicates the type of login user: "User" indicates the logged in user was a registered general user. "Guest" indicates the logged in user was a guest user. "File Administrator" indicates the logged in user was a registered file administrator.
  • Page 574 Managing Log Files Item Content Lockout/Release The mode of operation access. "Lockout" indicates activation of password lockout; "Release" indicates deactivation of password lockout. Lockout Release Method "Manual" is recorded if the machine is unlocked manually. "Auto" is recorded if the machine is unlocked by the lockout release timer.
  • Page 575 7. Managing the Machine Item Content Collect Access Logs Indicates the status of the access log collection setting: "Active" indicates access log collection is enabled. "Inactive" indicates access log collection is disabled. "Not Changed" indicates no changes have been made to the access log collection setting.
  • Page 576 Managing Log Files Item Content Log Collect Level Indicates the level of log collection: "Level 1", "Level 2", or "User Settings". Encryption/Cleartext Indicates whether communication encryption is enabled or disabled: "Encryption Communication" indicates encryption is enabled; "Cleartext Communication" indicates encryption is not disabled.
  • Page 577 7. Managing the Machine Item Content Network Attack Status Indicates the attack status of the network: "Violation Detected" indicates an attack on the network was detected. "Recovered from Violation" indicates the network recovered from an attack. "Max. Host Capacity Reached" indicates the machine became inoperable due to the volume of incoming data reaching the maximum host capacity.
  • Page 578 Managing Log Files Item Content Parts Number Firmware module part number. Version Firmware version. Machine Data Encryption Key Indicates the type of encryption key operation performed: Operation "Back Up Machine Data Encryption Key" indicates an encryption key backup was performed. "Restore Machine Data Encryption Key"...
  • Page 579 7. Managing the Machine Item Content Access Result Indicates the results of logged operations: "Completed" indicates an operation completed successfully; "Failed" indicates an operation completed unsuccessfully. Job log information items Input information Item Content Source Indicates the source of the job file: "Scan File"...
  • Page 580 Managing Log Files Item Content Stored File ID Indicates the ID of data that is output as a store file. This is a decimal ID that identifies the stored file. Stored File Name If the Target Type is "Store", the file name of the stored file is recorded.
  • Page 581 7. Managing the Machine Item Content Power Mode (After) The power status of the machine (after state transition) is logged. When in standby, "Standby" is recorded. When in a silent state, "Silent" is recorded. When the hard disk is running, "HDD On" is recorded. When the engine is stopped, "Engine Off"...
  • Page 582 Managing Log Files Item Content Detected Power The power consumption status of the machine is measured and registered in the log while the machine is being used. "Controller Standby" indicates controller standby mode. "STR" indicates Suspend to RAM (STR) mode. "Main Power Off"...
  • Page 583 7. Managing the Machine Category Attribute Description Device Certificate 1. Operation Mode 1. The type of operation is recorded. 2. Certificate No. "Create" is recorded when a 3. Certificate No. (XXX) certificate is created. (XXX) is replaced by one of the "Delete"...
  • Page 584 Managing Log Files Category Attribute Description IPsec 1. IPsec 1. Whether IPsec is active (Active) or inactive (Inactive) is 2. Encryption Key Auto recorded. Exchange / Encryption Key Manual Exchange: Setting1-4: 2. The remote address is Remote Address recorded. 3. Encryption Key Auto Exchange: 3.
  • Page 585 7. Managing the Machine Category Attribute Description S/MIME 1. Operation Mode 1. The mode of operation is recorded. 2. When Sending E-mail by Scanner 2. The signature is recorded when the scanner is used for sending 3. When Transferring by Fax e-mail.
  • Page 586: Customizing The Control Panel

    Customizing the Control Panel Customizing the Control Panel Configurations of settings such as arrangement of icons on the home screen or allocation of function keys to functions can be made to suit the user. Configuring the Home Screen for Individual Users This allows each user to use their own home screen.
  • Page 587 7. Managing the Machine Warnings about using user's own home screens Consider these warnings before using this function. • When a user is registered in the Address Book, a home screen is created for that user. At that time, their user's own home screen is configured with the default settings (arrangement of icons). •...
  • Page 588: Configuring The Browser Functions

    Configuring the Browser Functions Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 589 7. Managing the Machine Press [Browser Default Setting]. Press the setting you want to change, and change the setting. Press [OK]. Press [Exit] twice. Log out. Browser default settings Home Screen Specify the URL of your home screen. Cache File Specify whether or not to enable cache files.
  • Page 590: Restricting User Browser Functions

    Configuring the Browser Functions When using a proxy server, specify "Proxy Server Name", "Proxy Port", "Proxy User Name", "Proxy Password", and "Exceptional Addresses". Default: [Off] User Agent Specify the user agent. Enter the user agent's name using the keyboard. Default HTTP Request Method Specify the type of HTTP request method.
  • Page 591: Checking The Usage Status Of The Browser Functions

    7. Managing the Machine Bookmark Specify whether or not to enable the use of bookmarks. Default: [Allow] Use Proxy Server Specify whether or not to enable a proxy server. Default: [Allow] Keep the History Specify whether or not to enable the history to be kept. Default: [Allow] Screen Settings Specify whether or not to enable the size of the window displayed on the control panel.
  • Page 592 Configuring the Browser Functions • "This site has a security problem. Verification of the server to connect to cannot be performed." • "This site has a security problem. The http subcontents are included in the https site." *1 The connected Web site contains non-encrypted data.
  • Page 593: Managing Device Information

    7. Managing the Machine Managing Device Information • Keep SD cards out of reach of children. If a child accidentally swallows an SD card, consult a doctor immediately. This can be set by an administrator with privileges to manage everything — devices, users, networks and files.
  • Page 594: Exporting Device Information

    Managing Device Information • The device configurations of the device setting information file to be imported from the control panel must be the same as those of the device setting information file that is exported. If not, the device setting information file cannot be imported. •...
  • Page 595: Importing Device Information

    7. Managing the Machine • If data export fails, the details of the error can be viewed in the log. Importing Device Information Import device information saved on an SD card. Insert an SD card into the media slot on the side of the control panel. Log in from the control panel as an administrator with all privileges.
  • Page 596: Periodically Importing Device Information

    Managing Device Information • If data import fails, the details of the error can be viewed in the log. Periodically Importing Device Information This setting enables automatic importing of device information stored on a server. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 597: Manually Importing The Device Setting Information File Of A Server

    7. Managing the Machine Log out. • If data import fails, the details of the error can be viewed in the log. Manually Importing the Device Setting Information File of a Server Manually import the device setting information file specified with [Device Setting Information: Import Setting (Server)].
  • Page 598: Managing Eco-Friendly Counter

    Managing Eco-friendly Counter Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter is the ratio of use of color, two-sided and multi-page printing to the total number of output pages. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 599: Clearing A Machine's Eco-Friendly Counter

    7. Managing the Machine Change the settings. Press [OK]. Press [Exit]. Log out. Eco-friendly counter settings Count Period Set up the period for collecting data for the eco-friendly counter. When [Specify Days] is selected, data for the eco-friendly counter is collected for the number of days specified.
  • Page 600: Clearing The Eco-Friendly Counter By User

    Managing Eco-friendly Counter Press [Display/Clear Eco-friendly Counter]. Press [Clear Current Value] or [Clear Crnt. & Prev. Val.]. Press [OK]. Press [Exit]. Log out. Clearing the Eco-friendly Counter by User The eco-friendly counter can be cleared according to the user. The machine administrator logs in from the control panel. Press [System Settings].
  • Page 601 7. Managing the Machine Press the counter item to clear. Press [Clear Current Value] or [Clear Crnt. & Prev. Val.]. Press [OK]. Press [Exit]. Log out. • The eco-friendly counter for all users is cleared. The eco-friendly counter for individual users cannot be cleared.
  • Page 602: Specifying The Extended Security Functions

    Specifying the Extended Security Functions Specifying the Extended Security Functions In addition to providing basic security through user authentication and administrator specified access limits on the machine, security can also be increased by encrypting transmitted data and data in the Address Book.
  • Page 603: Extended Security Function Settings

    7. Managing the Machine Extended Security Function Settings Driver Encryption Key This can be specified by the network administrator. When user authentication is ON, specify the string of text for the key used for encrypting the login passwords or document passwords that are sent from each kind of driver. To specify the driver encryption key, register the encryption key specified using the machine in the driver.
  • Page 604 Specifying the Extended Security Functions Enhance File Protection This can be specified by the file administrator. By specifying a password, you can limit operations such as printing, deleting, and sending files, and can prevent unauthorized people from accessing the files. However, it is still possible for the password to be cracked.
  • Page 605 7. Managing the Machine If you use [Forwarding] or [Transfer Box] under the fax function, files stored in the machine can be transferred or delivered. To prevent stored files being transferred by mistake, select [Prohibit] for this setting. Default: [Do not Prohibit] If you select [Prohibit] for this setting, the following functions are disabled: •...
  • Page 606 Specifying the Extended Security Functions Specify whether to allow firmware updates on the machine. Firmware update means having the service representative update the firmware or updating the firmware via the network. If you select [Prohibit], firmware on the machine cannot be updated. If you select [Do not Prohibit], there are no restrictions on firmware updates.
  • Page 607 7. Managing the Machine Default: [Do not Prohibit] Security Setting for Access Violation This can be specified by the machine administrator. When logging in to the machine via a network application, a user may be locked out erroneously because the number of authentication attempts of the user does not match the number of attempts logged internally.
  • Page 608 Specifying the Extended Security Functions If the number of authentication requests exceeds the setting, the system classifies the access session as a password attack. The access session is recorded in the Access Log and the log data is sent to the machine administrator by e-mail.
  • Page 609 7. Managing the Machine Use the number keys to enter the number between "10" and "30", and then press [ ]. Default: [10] • Authentication Delay Time Specify the authentication delay time when an access violation is detected. Use the number keys to enter the number between "0" and "9", and then press [ ]. Default: [3] •...
  • Page 610: Other Security Functions

    Other Security Functions Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 611: Scanner Function

    7. Managing the Machine Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 612: Limiting Machine Operations To Customers Only

    Limiting Machine Operations to Customers Only Limiting Machine Operations to Customers Only The machine can be set so that operation is impossible without administrator authentication. The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the Address Book by a service representative. We maintain strict security when handling customers' data.
  • Page 613: Additional Information For Enhanced Security

    7. Managing the Machine Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 614 Additional Information for Enhanced Security Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See p.259 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See p.259 "Specifying the Extended Security Strength Functions". Administrator Extended Security Access Privilege Tools Authenticate Current Job...
  • Page 615: Settings You Can Configure Using Web Image Monitor

    7. Managing the Machine Scanner Features Item Setting Initial Settings Menu Protect Level 2 See p.78 "Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 616: Settings You Can Configure When Ipsec Is Available/Unavailable

    Additional Information for Enhanced Security Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see p.69 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 617 7. Managing the Machine Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network. Control panel settings System Settings Item Setting Interface Settings IPsec...
  • Page 618 Additional Information for Enhanced Security Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. • Sending and receiving faxes without using IP-Fax When sending faxes, specify destinations by fax number, Internet Fax destination, e-mail address, or folder destination.
  • Page 619 7. Managing the Machine...
  • Page 620: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If Authentication Fails This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 621 8. Troubleshooting Messages Cause Solutions "Authentication has failed." The entered login user name or Ask the user administrator for login password is incorrect. the correct login user name and login password. See the error codes below for possible solutions: B, W, L, I 0104-000 B, W, L, I 0206-003 W, L, I 0406-003 "Authentication has failed."...
  • Page 622: If Authentication Fails

    If Authentication Fails Messages Cause Solutions "Failed to obtain URL." The machine is connected to the Make sure the UA service is server, but the UA service is not specified correctly. responding properly. "Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication the server.
  • Page 623 8. Troubleshooting Basic authentication Error Code Cause Solution B0103-000 A TWAIN operation occurred Make sure no other user is logged during authentication. on to the machine, and then try again. B0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly.
  • Page 624 If Authentication Fails Error Code Cause Solution B0207-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. B0208-000 The account is locked because you Ask the user administrator to unlock have reached the maximum number the account.
  • Page 625 8. Troubleshooting Error Code Cause Solution W0206-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log in again.
  • Page 626 If Authentication Fails Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Specify the IP address in the domain name and confirm that authentication is successful. If authentication was successful: 1. If the top-level domain name is specified in the domain name (such as domainname.xxx.com), make sure that DNS is specified in "Interface Settings".
  • Page 627 8. Troubleshooting Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Under Windows 7, if the Windows firewall is activated, create a firewall rule in the "Advanced settings" on the "System and security" control panel, and then authorize ports 137 and 139. Under Windows XP, if the Windows firewall is activated, open the properties for "Network...
  • Page 628 If Authentication Fails Error Code Cause Solution W0406-104 5. Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name and corresponding domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 629 8. Troubleshooting Error Code Cause Solution W0400-105 2. Current settings do not allow Make sure the user group's group group retrieval. scope is set to "Global Group" and the group type is set to "Security" in group properties. Make sure the account has been added to user group.
  • Page 630 If Authentication Fails Error Code Cause Solution W0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log on again.
  • Page 631 8. Troubleshooting Error Code Cause Solution L0104-000 Failed to encrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key:Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 632 If Authentication Fails Error Code Cause Solution L0307-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. L0406-200 Authentication cannot be completed Wait a few minutes and then try because of the high number of again.
  • Page 633 8. Troubleshooting Error Code Cause Solution L0406-202 2. A login user name or password 1. Make sure the login user name error occurred. and password are entered correctly. L0406-203 2. Make sure a usable login name is registered on the machine. Authentication will fail in the following cases: If the login user name contains a...
  • Page 634 If Authentication Fails Error Code Cause Solution L0406-204 Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name, and supporting domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 635 8. Troubleshooting Error Code Cause Solution L0511-000 The authentication server login name 1. Delete the old, duplicated name is the same as a user name already or change the login name. registered on the machine. (Names 2. If the authentication server has just are distinguished by the unique been changed, delete the old name attribute specified in the LDAP...
  • Page 636 If Authentication Fails Error Code Cause Solution I0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key:Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 637 8. Troubleshooting Error Code Cause Solution I0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If account name was entered incorrectly, enter it correctly and log in again.
  • Page 638: If The Machine Cannot Be Operated

    If Authentication Fails Error Code Cause Solution I0606-004 Authentication failed because the Do not use "other", "admin", user name contains language that "supervisor" or "HIDE*" in general cannot be used by general users. user accounts. I0612-005 Authentication failed because no Ask the user administrator to delete more users can be registered.
  • Page 639 8. Troubleshooting Condition Cause Solution Cannot connect with the The SNMPv3 account, Specify the account, password TWAIN driver. password, and encryption and the encryption algorithm of algorithm do not match settings SNMPv3 registered in the specified on this machine. machine using network connection tools.
  • Page 640 If Authentication Fails Condition Cause Solution Cannot access the machine "Driver Encryption Set "Driver Encryption using ScanRouter EX Key:Encryption Strength" is not Key:Encryption Strength" to Professional V3 / ScanRouter set correctly. Alternatively, [Simple Encryption]. EX Enterprise V2. "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", although the required certificate install the server certificate in the...
  • Page 641 8. Troubleshooting Condition Cause Solution Cannot send e-mail from the The following are possible • Install a user certificate scanner. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 642 If Authentication Fails Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination • Cannot select an address. certificate) has expired.
  • Page 643 8. Troubleshooting Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet destinations specified using been disabled without "All and select [All Users] as the the machine do not appear. Users" being selected for access permission setting of the "Protect Destination".
  • Page 644: Checking Operation Privileges

    9. Checking Operation Privileges This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. List of Operation Privileges for Settings Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 645 9. Checking Operation Privileges • When [Menu Protect] is set to [Off], users can execute, change and read all of the settings of each function.
  • Page 646: System Settings

    System Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. General Features Settings User Mach N/W File Unset Program/Change/Delete User Text Panel Key Sound Warm-up Beeper Copy Count Display Function Priority...
  • Page 647 9. Checking Operation Privileges Tray Paper Settings Settings User Mach N/W File Unset Paper Tray Priority: Copier Paper Tray Priority: Facsimile Paper Tray Priority: Printer Tray Paper Size: Tray 1-3 Printer Bypass Paper Size Paper Type: Bypass Tray Paper Type: Tray 1-3 Timer Settings Settings User...
  • Page 648 System Settings Interface Settings Network Settings User Mach N/W File Unset Machine IPv4 Address IPv4 Gateway Address Machine IPv6 Address IPv6 Gateway Address IPv6 Stateless Address Autoconfiguration DHCPv6 Configuration DNS Configuration DDNS Configuration IPsec Domain Name WINS Configuration Effective Protocol NCP Delivery Protocol NW Frame Type SMB Computer Name...
  • Page 649 9. Checking Operation Privileges Settings User Mach N/W File Unset IEEE 802.1X Authentication for Ethernet Restore IEEE 802.1X Authentication to – – – – Defaults *1 When auto-obtain is set, the data is read-only. *2 All administrators and users can run a test of connections. Parallel Interface Settings User...
  • Page 650 System Settings Settings User Mach N/W File Unset Capture Server IPv4 Address Fax RX File Transmission SMTP Server SMTP Authentication POP before SMTP Reception Protocol POP3/IMAP4 Settings Administrator's Email Address Email Communication Port Email Reception Interval Max. Reception Email Size Email Storage in Server Default User Name/Password (Send) Program/Change/Delete Email Message...
  • Page 651 9. Checking Operation Privileges Settings User Mach N/W File Unset Address Book: Program/Change/Delete Group Address Book: Change Order – – – – Print Address Book: Destination List – – – Address Book: Edit Title – – – – Address Book: Switch Title –...
  • Page 652 System Settings Settings User Mach N/W File Unset Program/Change Administrator – – Key Counter Management External Charge Unit Management Enhanced External Charge Unit Management Driver Encryption Key – – – – Driver Encryption Key:Encryption Strength Restrict Display of User Information Encrypt User Cstm.
  • Page 653 9. Checking Operation Privileges Settings User Mach N/W File Unset Auto Delete File in Document Server Delete All Files in Document Server – – – – Capture Priority – – – Capture: Delete All Unsent Files – – – – Capture: Ownership –...
  • Page 654 System Settings Settings User Mach N/W File Unset Device Setting Information: Import Setting – – – – – – (Server) Device Setting Information: Run Import – – – – – – (Server) Device Setting Information: Export (Memry – – – –...
  • Page 655 9. Checking Operation Privileges Print List Settings User Mach N/W File Unset Print List – – – –...
  • Page 656: Edit Home

    Edit Home Edit Home When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Edit Home Settings User Mach N/W File Unset Edit Icons – – – –...
  • Page 657: Maintenance

    9. Checking Operation Privileges Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Maintenance Settings User Mach N/W File Unset Auto Colour Calibration – – –...
  • Page 658: Copier / Document Server Features

    Copier / Document Server Features Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Features Settings User Mach N/W File Lv.1 Lv.2 Auto Dens. Prio. (Full Clr./Two-clr.) Auto Dens.
  • Page 659 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Reduce/Enlarge Ratio Priority Ratio for Create Margin Edit Settings User Mach N/W File Lv.1 Lv.2 Front Margin: Left/Right Back Margin: Left/Right Front Margin: Top/Bottom Back Margin: Top/Bottom 1 Sided 2 Sided Auto Margin: TtoT 1 Sided 2 Sided Auto Margin: TtoB...
  • Page 660 Copier / Document Server Features Administrator Tools Settings User Mach N/W File Lv.1 Lv.2 Menu Protect...
  • Page 661: Facsimile Features

    9. Checking Operation Privileges Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Quick Operation Key 1-3 Switch Title Search Destination Communication Page Count Adjust Sound Volume Box Setting...
  • Page 662 Facsimile Features Settings User Mach N/W File Lv.1 Lv.2 Memory File Transfer – – – – – Backup File TX Setting Reception Settings Settings User Mach N/W File Lv.1 Lv.2 Reception File Settings Switch Reception Mode Program Special Sender – –...
  • Page 663 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Program Memory Lock ID – – – – Internet Fax Setting Select Dial/Push Phone Program Fax Information Enable H.323 Enable SIP H.323 Settings SIP Settings Program/Change Gateway Delete Gateway Menu Protect Email Setting Folder Setting...
  • Page 664: Printer Functions

    Printer Functions Printer Functions This section lists the printer function items that appear if [Printer] on the Home screen is pressed. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Printer Functions Settings User Mach N/W...
  • Page 665: Printer Features

    9. Checking Operation Privileges Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. List / Test Print Settings User Mach N/W File Lv.1 Lv.2 Multiple Lists – – – Configuration Page –...
  • Page 666 Printer Features Settings User Mach N/W File Lv.1 Lv.2 Auto Continue Store and Skip Errored Job Memory Overflow Rotate by 180 Degrees Print Compressed Data Duplex Copies Blank Page Print Reserved Job Waiting Time Printer Language Sub Paper Size Page Size Letterhead Setting Tray Setting Priority Edge to Edge Print...
  • Page 667 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 I/O Timeout PCL Menu Settings User Mach N/W File Lv.1 Lv.2 Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution PS Menu...
  • Page 668 Printer Features Settings User Mach N/W File Lv.1 Lv.2 Colour Profile Process Colour Model Orientation Auto Detect Gray Reproduction PDF Menu Settings User Mach N/W File Lv.1 Lv.2 Change PDF Password PDF Group Password Reverse Order Printing Resolution Toner Saving Colour Setting Colour Profile Process Colour Model...
  • Page 669: Scanner Features

    9. Checking Operation Privileges Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title Update Delivery Server Destination List – –...
  • Page 670 Scanner Features Send Settings Settings User Mach N/W File Lv.1 Lv.2 Compression (Black & White) Compression Method (Black & White) Compression (Grey Scale/Full Colour) Compression Method for High Compress. High Compression PDF Level Max. Email Size Divide & Send Email Insert Additional Email Info No.
  • Page 671: Browser Features

    9. Checking Operation Privileges Browser Features Settings User Mach File Unset Browser Default Settings – – – Settings per Users – – – View Logs – – –...
  • Page 672: Extended Feature Settings

    Extended Feature Settings Extended Feature Settings Extended Feature Settings Settings User Mach N/W File Unset Startup Setting Install Uninstall Extended Feature Info Administrator Tools – – – – – Add. Program Startup Setting Install Add. Program Uninstall Add. Program Add. Program Info...
  • Page 673: Web Image Monitor: Display Eco-Friendly Counter

    9. Checking Operation Privileges Web Image Monitor: Display Eco-friendly Counter These settings are in [Status/Information]. Each user can only view his or her own counter. Settings User Mach File Unset Device Total Counter – – – – – Counter per User –...
  • Page 674: Web Image Monitor: Job

    Web Image Monitor: Job Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. Job List Settings User Mach N/W File Unset Current/Waiting Jobs: Change Order – – – – – Current/Waiting Jobs: Suspend Printing/ –...
  • Page 675 9. Checking Operation Privileges Settings User Mach N/W File Unset Fax Remote Send History – – – Scanner Remote Send History – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 676: Web Image Monitor: Device Settings

    Web Image Monitor: Device Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. System Settings User...
  • Page 677 9. Checking Operation Privileges Settings User Mach N/W File Unset Function Priority Paper Settings User Mach N/W File Unset Tray 1-3 Bypass Tray Date/Time Settings User Mach N/W File Unset Set Date Set Time SNTP Server Name SNTP Polling Interval Time Zone Timer Settings...
  • Page 678 Web Image Monitor: Device Settings Logs Settings User Mach N/W File Unset Job Log Access Log Eco-friendly Logs Transfer Logs Encrypt Logs Classification Code Delete All Logs – – – – *1 Can only be changed to [Inactive]. Download Logs Settings User Mach N/W...
  • Page 679 9. Checking Operation Privileges Settings User Mach N/W File Unset SMTP Auth. Email Address – – – SMTP Auth. User Name – – – – SMTP Auth. Password – – – – SMTP Auth. Encryption – – – POP before SMTP –...
  • Page 680 Web Image Monitor: Device Settings Auto Email Notification Settings User Mach N/W File Unset Notification Message Groups to Notify Select Groups/Items to Notify Detailed Settings of Each Item On-demand Email Notification Settings User Mach N/W File Unset Notification Subject Notification Message Access Restriction to Information Receivable Email Address/Domain Name Settings...
  • Page 681 9. Checking Operation Privileges Settings User Mach N/W File Unset Printer Job Authentication Settings User Code Authentication Settings Basic Authentication Settings Windows Authentication Settings Group Settings for Windows Authentication LDAP Authentication Settings Integration Server Authentication Settings Group Settings for Integration Server Authentication Administrator Authentication Management Settings...
  • Page 682 Web Image Monitor: Device Settings Settings User Mach N/W File Unset File Administrator – – Login User Name – – Login Password – – Encryption Password – – *1 Administrators can only change their own accounts. Print Volume Use Limitation Settings User Mach N/W...
  • Page 683 9. Checking Operation Privileges Kerberos Authentication Settings User Mach N/W File Unset Encryption Algorithm – – – – – Realm 1-5 – – – – – Device Setting Information: Import Setting (Server) Settings User Mach N/W File Unset Import File From –...
  • Page 684 Web Image Monitor: Device Settings *1 R/W is the administrator with all privileges that include user administrator, machine administrator, network administrator, and file administrator privileges. Eco-friendly Counter Period/Administrator Message Settings User Mach N/W File Unset Display Information Screen Display Time Count Period Administrator Message Compulsory Security Stamp...
  • Page 685: Web Image Monitor: Printer

    9. Checking Operation Privileges Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Basic Settings Settings User Mach N/W File Lv.1 Lv.2 Print Error Report...
  • Page 686 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 Default Printer Language Tray Switching List/Test Print Lock Extended Auto Tray Switching Virtual Printer Restrict Direct Print Jobs Initial screen switch setting Host Interface PCL Menu PS Menu PDF Menu Unauthorized Copy Prevention Settings User...
  • Page 687 9. Checking Operation Privileges Tray Parameters (PS) Settings User Mach N/W File Lv.1 Lv.2 Tray Parameters (PS) – – – – – Virtual Printer Settings Settings User Mach N/W File Lv.1 Lv.2 Virtual Printer Name Protocol Print Error Report Rotate by 180 Degrees Memory Usage Duplex Copies...
  • Page 688 Web Image Monitor: Printer PDF Temporary Password Settings User Mach N/W File Lv.1 Lv.2 PDF Temporary Password – – – – PDF Group Password Settings User Mach N/W File Lv.1 Lv.2 PDF Group Password – – – – – PDF Fixed Password Settings User Mach N/W...
  • Page 689: Web Image Monitor: Fax

    9. Checking Operation Privileges Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Initial Settings Settings User Mach N/W File Lv.1 Lv.2 Closed Network Code...
  • Page 690 Web Image Monitor: Fax Settings User Mach N/W File Lv.1 Lv.2 Memory Lock Reception – – – – – Reception File Settings Settings User Mach N/W File Lv.1 Lv.2 Output Mode Switch Timer – – – – – Prohibit Auto Print –...
  • Page 691: Web Image Monitor: Scanner

    9. Checking Operation Privileges Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title...
  • Page 692 Web Image Monitor: Scanner Settings User Mach N/W File Lv.1 Lv.2 Compression Method for High Compression Max. Email Size Divide & Send Email Insert Additional Email Info No. of Digits for Single Page Files Stored File Email Method Default Email Subject *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user privilege becomes R/W.
  • Page 693 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Send File Type – – –...
  • Page 694: Web Image Monitor: Interface

    Web Image Monitor: Interface Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Interface Settings Settings User Mach N/W...
  • Page 695 9. Checking Operation Privileges Settings User Mach N/W File Unset Security Method WEP Authentication – – – – WEP Key Number WEP Key WPA Authentication Method WPA-PSK/WPA2-PSK...
  • Page 696: Web Image Monitor: Network

    Web Image Monitor: Network Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. IPv4 Settings User Mach N/W...
  • Page 697 9. Checking Operation Privileges Settings User Mach N/W File Unset Stateless Address Manual Configuration Address DHCPv6 DHCPv6 Address DDNS LLMNR Details NetWare Settings User Mach N/W File Unset NetWare NetWare Print Settings NCP Delivery Settings User Mach N/W File Unset Protocol Workgroup Name Computer Name...
  • Page 698 Web Image Monitor: Network SNMP Settings User Mach N/W File Unset SNMP – – – – – Protocol – – – – – SNMPv1,v2 Setting – – – – – Community – – – – – SNMPv3 Settings User Mach N/W File Unset SNMP...
  • Page 699 9. Checking Operation Privileges Settings User Mach N/W File Unset Local Hostname Details Print Order Priority System Log Settings User Mach N/W File Unset System Log –...
  • Page 700: Web Image Monitor: Security

    Web Image Monitor: Security Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Network Security – – – – – Access Control – – – – – IPP Authentication – – – –...
  • Page 701: Web Image Monitor: @Remote

    9. Checking Operation Privileges Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Setup RC Gate – – – – – Update RC Gate Firmware – – – – – RC Gate Proxy Server –...
  • Page 702: Web Image Monitor: Webpage

    Web Image Monitor: Webpage Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach File...
  • Page 703: Web Image Monitor: Extended Feature Settings

    9. Checking Operation Privileges Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Startup Setting – – – – – Extended Feature Info Install – – – – – Uninstall –...
  • Page 704: Web Image Monitor: Address Book

    Web Image Monitor: Address Book Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset Add User – – – Change – – – Delete – – – Add Group – – – Data Carry-over Setting for Address Book Auto- –...
  • Page 705: Web Image Monitor: Reset Printer Job

    9. Checking Operation Privileges Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset Reset Current Job – – – – – Reset All Jobs – – – – –...
  • Page 706: Web Image Monitor: Reset The Machine

    Web Image Monitor: Reset the Machine Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach...
  • Page 707: Web Image Monitor: Device Home Management

    9. Checking Operation Privileges Web Image Monitor: Device Home Management These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach File...
  • Page 708: Web Image Monitor: Customize Screen Per User

    Web Image Monitor: Customize Screen per User Web Image Monitor: Customize Screen per User Users can change only their own settings. Settings User Mach File Unset Edit Icons – – – – – Restore Default Icon Display – – – –...
  • Page 709: Web Image Monitor: Document Server

    9. Checking Operation Privileges Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see p.369 "List of Operation Privileges for Stored Files". Settings User Mach File...
  • Page 710: Web Image Monitor: Fax Received File

    Web Image Monitor: Fax Received File Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset Print – – – – Delete – – – – Download – – – – Edit detailed information –...
  • Page 711: Web Image Monitor: Printer: Print Jobs

    9. Checking Operation Privileges Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 712: List Of Operation Privileges For Stored Files

    List of Operation Privileges for Stored Files List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 713 9. Checking Operation Privileges Settings Read Edit Full Owner File Insert File – – – Delete Pages – – – Print specified page – Duplicate File – Delete File – – *1 The owner can change operation privileges.
  • Page 714: List Of Operation Privileges For Address Books

    List of Operation Privileges for Address Books List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 715 9. Checking Operation Privileges Settings Read Edit Full Entry User Login Password – – – – SMTP Authentication – – – – Folder Authentication – LDAP Authentication – – – – Available functions – – – – Print Volum. Use Limit. –...
  • Page 716 List of Operation Privileges for Address Books Fax Dest. Settings Read Edit Full Entry User Fax Destination Select Line Adv. Features International TX Mode Fax Header Label Insertion Email Settings Read Edit Full Entry User Email Address Use Email Address for Send via SMTP Server Folder Settings...
  • Page 717 9. Checking Operation Privileges • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 718: Trademarks

    Trademarks Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. LINUX is a registered trademark of Linus Torvalds.
  • Page 719 9. Checking Operation Privileges ® ® Microsoft Windows 7 Home Premium ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ®...
  • Page 720: Index

    INDEX Erase All Memory..........Error code............Access Control............. Error message............Access permission for stored files...... ESP Protocol............Address Book access permission......Extended security functions........ Administrator............Administrator privileges........Administrator registration........Firmware validity..........AH Protocol..........145, 146 AH Protocol + ESP Protocol....... 145, 146 IEEE 802.1X............
  • Page 721 Operational issues..........Windows authentication........Password for stored files........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax).. 75, 261 Restrict Adding of User Destinations (Scanner). Restrict Display of User Information....
  • Page 722 MEMO...
  • Page 723 MEMO D118-7519...
  • Page 725 D118-7519 © 2011...
  • Page 726 Operating Instructions UNIX Supplement For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 728 TABLE OF CONTENTS Notice..................................3 Important.................................3 How to Read This Manual..........................4 Symbols................................4 Notes................................4 Laws and Regulations............................5 Legal Prohibition.............................5 1. UNIX Configuration Before Setup................................7 Using the lp/lpr Commands..........................7 Using the rsh/rcp/ftp Commands........................7 Using the Installation Shell Script........................8 Assigning the IP Address..........................8 Executing the Installation Shell Script......................9 After Executing the Installation Shell Script....................12 Printing Method..............................17 Printing with lpr, lp............................17...
  • Page 729 Binding................................32 Orientation..............................33 Image Direction............................33 Resolution..............................34 Gradation Quality............................34 Billing Code..............................35 Usercode..............................36 Symbol Set..............................36 Trademarks...............................40 INDEX ................................43...
  • Page 730: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good output quality, the manufacturer recommends that you use genuine toner from the manufacturer.
  • Page 731: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 732: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 734: Unix Configuration

    1. UNIX Configuration This section explains how to set up a network printer and check print status using UNIX Before Setup • To print from a UNIX workstation, use a file that the printer supports. • Setup varies depending on the print command. Make sure to configure settings accordingly. Using the lp/lpr Commands Use the installation shell script to register the device option, as well as the printer host name and the IP address.
  • Page 735: Using The Installation Shell Script

    1. UNIX Configuration Using the Installation Shell Script The installation shell script helps with the setup process. The installation shell script automates some of the tasks in configuring/etc/hosts, /etc/printcap; creating the spool directory for BSD UNIX; and running the lpadmin command for System V UNIX. •...
  • Page 736: Executing The Installation Shell Script

    Using the Installation Shell Script • For details about how to make the above settings, see the manual that comes with this machine. Checking the IP address configuration Follow the procedure below to make sure that the IP address has been configured correctly. •...
  • Page 737 1. UNIX Configuration Insert a period and slash before the current directory. Enter a number to select the workstation operating system that you are using. Network printer install shell Select your workstation OS type 1. SunOS 4.x.x 2. Solaris 2.x, Solaris 7-9 (SunOS5.x) 3.
  • Page 738 Using the Installation Shell Script Enter remote printer name [default lp]:text You can enter up to 14 characters for HP-UX 11.0, 256 for Solaris 8 and Red Hat Linux 7.0, and 51 for Red Hat Linux 6.2. After setup with the installation shell script is complete, and if you entered the IP address in step 4, the following message appears: hosts file is modified Perform a test print to make sure that the settings are correct.
  • Page 739: After Executing The Installation Shell Script

    1. UNIX Configuration # /usr/sbin/lpadmin -x printer_name 3. Restart the scheduler. # /usr/lib/lpsched After Executing the Installation Shell Script The printing environment is set up automatically when the installation shell script is executed. This section describes setup contents when the installation shell script is executed under Red Hat Linux, Solaris, and HP-UX.
  • Page 740 Using the Installation Shell Script • The /etc/printcap file is used to register the name and attributes of a printer. You must make an entry for the network printer in the /etc/printcap file of all workstations using the network printer. •...
  • Page 741 1. UNIX Configuration • The spool directory is used to control data used for print jobs. For example, when a print job is created, a temporary copy of the data used is created in the spool directory. All workstations accessing the network printer need to have a spool directory for the network printer. •...
  • Page 742 Using the Installation Shell Script • The /etc/hosts file contains a list of IP addresses and host names of all hosts communicating on the network. Each entry is delimited with a space or a tab, and each line is separated with a return. •...
  • Page 743 1. UNIX Configuration Registering the printer The installation shell script registers the printer as a remote printer following the procedure below: 1. Stop the scheduler. /usr/lib/lpshut 2. Register the printer. /usr/lib/lpadmin -Pnp -v/dev/null -mrmodel -ormnphost -orpoption -ob3 • "np" is the printer name, "nphost" is the host name. For details about "option", see p.22 "Specifying the Device Option".
  • Page 744: Printing Method

    Printing Method Printing Method This section explains how to print documents using commands. Printing with lpr, lp Execute one of the following commands according to the type of workstation used: BSD UNIX workstation, Linux % lpr -Pprinter_name file_name [file_name...] For example: The printer name is np, file names are file1 and file2 % lpr -Pnp file1 file2 Solaris, HP-UX...
  • Page 745 1. UNIX Configuration • The message "print session full" appears when the maximum number of print requests is reached. • The maximum number of print sessions varies depending on the command. • When using the rsh or rcp command, the maximum number of print sessions is 5; when using the ftp command, the number is 3.
  • Page 746 Printing Method • File names cannot contain "=", ",", or ";". • You can use wild cards ( * or ? ) for the file name with the mput command. To print one file ftp> put file_name [Option] To print several files ftp>...
  • Page 747: Printer Status

    1. UNIX Configuration Printer Status You can use the following commands to have information and printer status displayed or copied to a file. Use the lpq or lpstat command to display the status of the printer or information about print jobs. Use the rsh, rcp or ftp commands to get more detailed information from the printer.
  • Page 748: Copying Information To A File

    Printer Status Parameter Information returned Status of the printer. stat Information about print jobs. Information about the paper tray, output tray and info printer language. prnlog Record of the last 10 jobs printed. Record of messages about the network interface syslog board.
  • Page 749: Specifying The Device Option

    1. UNIX Configuration Specifying the Device Option With the following options, you can print with specific printer functions. This manual covers all models, and therefore contains functions and settings that may not be available for your model. Configuring the Device Option •...
  • Page 750 Specifying the Device Option • Enter the option using the lp or lpr command, when the shell script is implemented. • The option settings made here are configured as default. You must create another printer if you want to change printer option settings. For details about changing the configured option, see p.11 "Deleting the printer".
  • Page 751 1. UNIX Configuration Device option Value Function summary plain, recycled, special, special2, special3, thick, thick2, thick3, transparency, letterhead, preprinted, labels, mediatype Specifies the paper type. bond, cardstock, color, middlethick, prepunched, plainorrecycled, envelope, coated, waterproof, auto outbin upper, inner Specifies the output tray. Specifies the number of copies copies Number of copies (1-999)
  • Page 752: Printer Language

    Specifying the Device Option Device option Value Function summary arabic8, desktop, greek8, hebrew7, hebrew8, iso4, iso6, iso11, iso15, iso17, iso21, iso60, iso69, isocyr, isogrk, isoheb, isol1, isol2, isol5, isol6, isol9, legal, math8, mctext, mspubl, pc8, pc775, pc850, Specifies the set of print symbol set pc851, pc852, pc858, pc862, characters.
  • Page 753: Text Printing

    1. UNIX Configuration • The value or actions that can be selected differ depending on the model you are using. For details about available printer languages, see the manual that comes with this machine. Text Printing Set this function when printing text files directly. filter=text The following sample shows how to print text files directly.
  • Page 754: Paper Size

    Specifying the Device Option • rcp % rcp file1 nphost:tray=tray2 • ftp ftp> put file1 tray=tray2 Paper Size Select the paper size. • Only the loaded paper sizes are available. paper=value of paper size Paper size Value B5JIS (Japanese Industrial Standard) jisb5 B6JIS jisb6...
  • Page 755: Paper Type

    1. UNIX Configuration Paper size Value monarch 7.68 10 .5 (195 267 mm) 8.25 14 governmentlg 8 10 engquatro 8.5 12 inch8d5x12 Custom size custom The following sample shows how to print using A4 size paper (host name: nphost, file name: file1): •...
  • Page 756 Specifying the Device Option Paper type Value special Special paper special2 special3 thick Thick paper thick2 thick3 OHP transparency transparency Letterhead letterhead Preprinted paper preprinted Labels labels Bond paper bond Cardstock cardstock Middle thick middlethick Envelope envelope Color Paper color Prepunched paper prepunched Coated Paper...
  • Page 757: Output Tray

    1. UNIX Configuration • The value or actions that can be selected differ depending on the model you are using. For details about available paper type, see the manual that comes with this machine. Output Tray Select the output tray. •...
  • Page 758: Collating

    Specifying the Device Option % rsh nphost print copies=10 < file1 • rcp % rcp file1 nphost:copies=10 • ftp ftp> put file1 copies=10 Collating Specify the number of collated sets. qty=number of collated sets (1 to 999) The following sample shows how to print 10 copies using the collate function (host name: nphost, file name: file1): •...
  • Page 759: Binding

    1. UNIX Configuration ftp> put file1 duplex=on,binding=longedge • Before selecting duplex, the binding option must be set to on. • Data and paper volume affect the completion of the print job. • For details about available paper size for duplex printing, see the manual that comes with this machine.
  • Page 760: Orientation

    Specifying the Device Option Orientation Select the paper feed orientation. orientation=feed direction (portrait or landscape) Orientation value Portrait portrait Landscape landscape The following sample shows how to print the paper vertically using the orientation function (host name : nphost, file name : file1): •...
  • Page 761: Resolution

    1. UNIX Configuration Resolution Select the printing resolution. resolution=value of resolution Resolution Value 1200 dpi 1200 600 dpi 400 dpi 300 dpi 200 dpi The following sample shows how to print with 600 dpi and better quality. (host name: nphost, file name: file1): •...
  • Page 762: Billing Code

    Specifying the Device Option Gradation quality Value Fine Standard The following sample shows how to print with 600 dpi and fine quality. (host name: nphost, file name: file1): • rsh % rsh nphost print filetype=postscript,resolution=600,bitsperdot=2 < file1 • rcp % rcp file1 nphost:filetype=postscript,resolution=600,bitsperdot=2 •...
  • Page 763: Usercode

    1. UNIX Configuration Usercode Specify the usercode. Usercode=\"value of usercode\" The usercode must be specified using up to eight digits. The usercode must be inside double quotation marks (" "). Some operating systems cannot forward the user code if it is inside double quotation marks. If this is the case, include escape characters such as back slashes (\) (0x5c) in place of double quotation marks.
  • Page 764 Specifying the Device Option Symbol Set Value ISO 11 iso11 ISO 15 iso15 ISO 17 iso17 ISO 21 iso21 ISO 60 iso60 ISO 69 iso69 ISO Cyrillic isocyr ISO Greek isogrk ISO Hebrew isoheb ISO L1 isol1 ISO L2 isol2 ISO L5 isol5 ISO L6...
  • Page 765 1. UNIX Configuration Symbol Set Value PC-864 pc864 PC-866 pc866 PC-866U pc866u PC-1004 pc1004 PC-8 D/N pc8dn PC-8 Greek pc8grk PC8-TK pc8tk Pifont pifont PS Math psmath PS Text pstext Roman-8 roman8 Roman-9 roman9 UCS-2 ucs2 Win 3.0 win30 Win Arabic winarb Win Baltic winbaltic...
  • Page 766 Specifying the Device Option % rcp file1 nphost:symset=iso4 • ftp ftp> put file1 symset=iso4...
  • Page 767: Trademarks

    1. UNIX Configuration Trademarks ® Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. ® ® ® ® Microsoft , Windows , Windows Server , and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Monotype is a registered trademark of Monotype Imaging, Inc.
  • Page 768 Trademarks • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition • The product names of Windows Server 2003 R2 are as follows: ®...
  • Page 769 1. UNIX Configuration...
  • Page 770: Index

    INDEX Before setup............. Note................Billing code............Notice............... Binding..............BSD UNIX workstation........17, 20 Orientation............. Output tray............. Collating..............Configuring the device option......Paper size............... Copies..............Paper type.............. Copying information..........Print job status............Printer language............ Deleting the printer..........Printer status............Device option............Printing method............
  • Page 771 MEMO D118-7521...
  • Page 773 D118-7521 © 2011...

This manual is also suitable for:

Mp c305spf

Table of Contents