Ricoh Aficio MP W3600 Operating Instructions Manual
Ricoh Aficio MP W3600 Operating Instructions Manual

Ricoh Aficio MP W3600 Operating Instructions Manual

Hide thumbs Also See for Aficio MP W3600:
Table of Contents

Advertisement

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in this manual before using the machine.
Getting Started
1
2
Entering Text
Appendix
3
Operating Instructions
About This Machine

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Aficio MP W3600

  • Page 1 Operating Instructions About This Machine Getting Started Entering Text Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine.
  • Page 2 Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400 • Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600 Certain types might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
  • Page 3 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒...
  • Page 4 ❖ Other manuals • PostScript 3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite • DeskTopBinder Lite Setup Guide • DeskTopBinder Introduction Guide • Auto Document Link Guide Note ❒ Manuals provided are specific to machine types. ❒ For “UNIX Supplement”, please visit our Web site or consult an authorized dealer.
  • Page 5: What You Can Do With This Machine

    What You Can Do with This Machine This section introduces the features of this machine. Note ❒ For details about options, see “Options”. ❒ For functions of printer (Printer Controller RW-3600) and scanner (RW-3600 Scanner Option), see manuals that come with those options. ❒...
  • Page 6: Utilizing Stored Documents

    Utilizing Stored Documents You can store files scanned in copier, printer, or scanner mode on the machine's hard disk. With DeskTopBinder (optional) or Web Image Monitor, you can use your computer to search for, view, print, delete, and send stored files via the net- work.
  • Page 7: Using The Scanner In A Network Environment

    Using the Scanner in a Network Environment You can use a scanner over the network. ATZ004S • You can send scan files to a specified destination using e-mail (Sending scan file by e-mail). See “Sending Scan Files by E-mail”, Scanner Reference. •...
  • Page 8: Administrating The Machine/Protecting Documents (Security Functions)

    Administrating the Machine/Protecting Documents (Security Functions) You can prevent information leakage by managing the machine and protecting documents. ATZ005S • You can protect documents from unauthorized access and stop them from be- ing copied without permission. See Security Reference. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 9: Monitoring The Machine Via Computer

    Monitoring the Machine Via Computer You can change the machine's settings and monitor its status from a connected computer. ATZ006S Web Image Monitor lets you configure and operate the machine using a Web browser on a computer. You can also install SmartDeviceMonitor for Admin on a computer to configure and operate the machine.
  • Page 10: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ..................i What You Can Do with This Machine..............iii Copier, Printer, and Scanner Functions ..............iii Utilizing Stored Documents..................iv Using the Scanner in a Network Environment ............v Administrating the Machine/Protecting Documents (Security Functions) ....vi Monitoring the Machine Via Computer..............
  • Page 11 2. Entering Text Entering Text ......................41 Available Characters ....................41 Keys .........................41 How to Enter Text ....................42 3. Appendix Dos and Don'ts.....................45 Software and Utilities Included on the CD-ROM ..........47 Viewing the Contents of the CD-ROM ..............47 Printer Drivers for This Machine................48 TWAIN Driver ......................49 DeskTopBinder Lite....................50 SmartDeviceMonitor for Admin ................51...
  • Page 13: Notice

    Notice Important Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, pass- ports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 14 This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must ac- cept any interference received, including interference that may cause undesired operation.
  • Page 15: For Users In The State Of California

    Remarque concernant les utilisateurs au Canada Avertissement: Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit être prêt à...
  • Page 16: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the “Safety Information” section of this manual. Indicates important safety notes.
  • Page 17: Names Of Major Options

    Names of Major Options This section explains the names of the major options described in this manual. Major options for this machine are referred to as follows: • Roll Feeder Type 240A → Paper roll tray 1 • Roll Feeder Type 240B → Paper roll tray 2 •...
  • Page 18: Safety Information

    Safety Information When using this machine, the following safety precautions should always be followed. Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property.
  • Page 19 R CAUTION: • Protect the machine from dampness or wet weather, such as rain and snow. • Contact your service representative if you need to lift the machine (such as when relocating it to another floor). Do not attempt to lift the machine without the assistance of your service representative.
  • Page 20 R CAUTION: • Avoid getting toner on your clothes or skin when removing paper jam or re- placing toner. If your skin comes into contact with toner, wash the affected area thoroughly with soap and water. • If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and may make removing the stain impossible.
  • Page 21: Positions Of Rwarning And Rcaution Labels

    Positions of RWARNING and RCAUTION labels This machine has labels for RWARNING and RCAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. ATZ008S ATZ035D Do not touch the parts a label indicates. The inside of the machine could be very hot.
  • Page 22 ATZ009S ATZ040D The inside of the machine could be very hot. Do not touch the parts a label indi- cates. Otherwise, an injury might occur. ATZ038S The inside of the machine could be very hot. Do not touch the parts which a label is put on.
  • Page 23 ATZ041S The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATZ033S ATZ042D The inside of the machine could be very hot. Do not touch the parts which a label is put on.
  • Page 24 ATZ046S The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. ATZ034S ATZ047S When replacing or loading the paper, or clearing paper jams, pull out the cut pa- per tray slowly with both hands.
  • Page 25: Energy Star Program

    ENERGY STAR Program ® ENERGY STAR Program ® The ENERGY STAR Program encourages energy conservation by promoting energy efficient computers and other office equipment. The program backs the development and dissemination of products that feature energy saving functions. It is an open program in which manufacturers participate voluntarily. Targeted products are computers, monitors, printers, facsimiles, copiers, scanners, and multi- function devices.
  • Page 26: Specifications

    Specifications Low power mode Power consumption 130 W Default interval 7 minutes Recovery time 83 seconds Sleep mode Power consumption 29 W Default interval 14 minutes Recovery time 120 seconds Note ❒ For details about changing how long the machine waits before switching to Low power mode, see “Timer Settings”, General Settings Guide.
  • Page 27: Machine Types

    Machine Types This machine comes in two models which vary in copy/print speed. To ascertain which model you have, see the inside front cover. Type 1 Type 2 Copy/print speed 2 sheets/minute (A0 (E)K), 3 sheets/minute (A0 (E)K), 4 sheets/minute (A1 (D)L) 6 sheets/minute (A1 (D)L)
  • Page 29: Getting Started

    1. Getting Started This section describes how to start using this machine. Guide to Components This section introduces the names and functions of the components. Important ❒ Do not leave the main unit open for more than 10 minutes, otherwise image quality may deteriorate.
  • Page 30 Getting Started ❖ Front ATY040S Original switching lever Main power switch Use to copy or scan folded originals. Use to turn the main power on or off. If you will not use the machine for a long Upper output stacker time, disconnect the power cord.
  • Page 31 Guide to Components Control panel Bypass tray See “Control Panel”. Use to feed paper in manually. Load pa- per print side up. {Scanner Stop} key Bypass tray's paper guide Use if originals are feeding in slanted, or to cancel scanning while an original is Set to the width of the paper for bypass feeding in.
  • Page 32 Getting Started ❖ Rear ATZ011S Upper output guide Upper output exit Takes delivered paper to the upper out- When the upper output is selected, out- put stacker. put paper is delivered here with the print side facing the user. Original exit switching lever Original output guide Takes originals to the original output guide, and switches delivery to the rear...
  • Page 33 Guide to Components Note ❒ Use the lower output guides if A0K or A1K sheets are being delivered to the lower output exit. Reference p.22 “Options” p.25 “Control Panel” p.39 “Anti-humidity Heater Switch” “Original Output Locations”, Copy/Document Server Reference “Copy Output Locations”, Copy/Document Server Reference “Setting Folded Originals (the Original Switching Lever)”, Copy/Document Server Reference...
  • Page 34: Options

    Getting Started Options This section introduces the names and functions of main optional parts. External Options This section provides explanations about external options. ATY015S Paper roll tray 1 Folding finisher You can load one paper roll. Automatically folds paper like fans or accordion. Paper roll tray 2 Rear stacker You can load two paper rolls.
  • Page 35 Guide to Components ❖ Paper roll tray This illustration shows the paper roll tray 2. ATZ068S Paper roll 1 Paper holder The two paper holders grip the paper Paper roll 2 roll and are mounted on the paper roll Cutter knob tray's roll holder.
  • Page 36 Getting Started • USB host board (For Type W3600) Allows you to connect a variety of external devices. • IEEE 802.11b wireless LAN board (For Type W3600) Allows you to install a wireless LAN interface. • Gigabit Ethernet (1000BASE-TX) (For Type W3600) Allows you to communicate with 1000BASE-TX.
  • Page 37: Control Panel

    Control Panel Control Panel This section introduces the names and functions of the components on the con- trol panel. This illustration shows the control panel of the machine with options fully installed. ATY041S {Program} key (copier, document Screen contrast knob server, and scanner mode) Adjusts display panel brightness.
  • Page 38 Getting Started {Login/Logout} key {Clear/Stop} key Press this to log in or log out. • Clear Press to delete a number entered. {Simplified Display} key • Stop Press this to switch to the Simplified Display. Press to stop a job in progress, such as {Sample Copy} key scanning, or printing.
  • Page 39: Display Panel

    Display Panel Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing them. When you select or specify an item on the display panel, it is highlighted like .
  • Page 40: Simplified Display

    Getting Started Simplified Display This section explains how to switch to the simplified display. When you press the {Simplified Display} key, the screen changes from the initial display to the simplified display. Letters and keys are displayed at a larger size, making operations easier. ATY042S ❖...
  • Page 41: When The Authentication Screen Is Displayed

    When the Authentication Screen is Displayed When the Authentication Screen is Displayed When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is enabled, the authentication screen appears on the screen. The machine only becomes operable after entering your own login user name and login password.
  • Page 42: User Code Authentication (Using A Printer Driver)

    Getting Started User Code Authentication (Using a Printer Driver) When user authentication is set, specify the user code in the printer properties of the printer driver. For details, see the printer driver Help. Note ❒ When logged in through User Code Authentication, you do not have to log out.
  • Page 43: Logout (Using The Control Panel)

    When the Authentication Screen is Displayed Note ❒ If authentication fails, the “ ” message ap- Authentication has failed. pears. Check that the login user name and login password are correct. ❒ If user code authentication has been specified, a different screen appears. See “Authentication Information”, General Settings Guide.
  • Page 44: Login (Using A Printer Driver)

    Getting Started Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set, make encryption settings in the printer properties of the printer driver, and then specify a login user name and pass- word.
  • Page 45: Changing Modes

    Changing Modes Changing Modes This section explains how to change modes. ATY045S Note ❒ You cannot switch modes in any of the following situations: • When accessing User Tools / Counter / Inquiry • During interrupt copying • While scanning an original ❒...
  • Page 46: System Reset

    Getting Started System Reset The machine returns automatically to its initial condition when the job is fin- ished, after a certain period of time has elapsed. This function is called “System Reset”. See “System Settings”, General Settings Guide. You can change the System Reset time. See “Timer Settings”, General Settings Guide.
  • Page 47: Turning On The Power

    Turning On the Power Turning On the Power This section discusses how to turn on/off the power. ❖ Operation switch This machine has two power switches: operation switch and main power switch. • Operation switch (right side of the control panel) Press to activate the machine.
  • Page 48: Turning On The Power

    Getting Started Note ❒ To start using the folding finisher, turn its main power switch on before turning on the main unit's main power switch. ❒ After you switch the main power on, a screen may appear to indicate that the machine is initializing.
  • Page 49: Turning Off The Main Power

    Turning On the Power Note ❒ Even if you press the operation switch, the operation switch indicator does not go out, but blinks in the following cases: • During communication with external equipment. • When the hard disk is active. Turning Off the Main Power Turn off the main power as follows: Important...
  • Page 50: Saving Energy

    Getting Started Saving Energy This machine has the following energy saving functions. ❖ Energy Saver If you do not use the machine for a certain period after an operation, or when you press the {Energy Saver} key, the display disappears and the machine goes into Energy Saver mode.
  • Page 51: Anti-Humidity Heater Switch

    Turning On the Power Anti-humidity Heater Switch This section explains the anti-humidity heater switch. During winter or humid periods when there can be sudden changes in temper- ature and humidity, the paper in the paper roll tray, or the cut paper tray can ab- sorb moisture.
  • Page 52 Getting Started...
  • Page 53: Entering Text

    2. Entering Text This section describes how to enter characters. Entering Text When you enter a character, it appears at the position of the cursor. If there is a character already at the cursor position, the entered character appears before that.
  • Page 54: How To Enter Text

    Entering Text Note ❒ When entering uppercase or lowercase letters continuously, use [Shift Lock] to lock the case. ❒ You can also use the number keys to enter numbers, regardless of mode. Reference p.43 “Adding user text” How to Enter Text This section explains text entry more specifically.
  • Page 55 Entering Text Adding user text You can select and use a User Text that is registered in [Program / Change / Delete User Text]. For details about registering User Texts, see “System Settings”, General Settings Guide. Press [User Text]. Select the User Text you want to use. Reference “System Settings”, General Settings Guide...
  • Page 56 Entering Text...
  • Page 57: Appendix

    3. Appendix This section describes Dos and Don'ts, the provided CD-ROMs, specifications, and copy paper. Dos and Don'ts The following items should be followed during use of this machine. R CAUTION: • Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock might occur.
  • Page 58 Appendix ❒ Depending on the ambient temperature and humidity, steam may come from the exhaust vent behind the control panel during printing. This is water va- pour from the paper, not a sign of malfunction. ❒ Do not open the main unit cover, the paper roll tray, or the cut paper tray when the machine is in operation.
  • Page 59: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD- Three CD-ROMs come with this machine: “Printer Drivers and Utilities”, “Scan- ner Driver and Utilities”, and “Manuals”. In “Manuals”, operating instructions are stored in PDF format and HTML format. The following are included in the three separate CD-ROMs: ❖...
  • Page 60: Printer Drivers For This Machine

    Appendix Printer Drivers for This Machine Printing requires installation of a printer driver for your operating system. The following drivers are included on the CD-ROM labeled “Printer Drivers and Utilities”. Printer Language RPCS PostScript 3 HDI driver Windows 95 Windows 98 Windows Me Windows 2000 Windows XP...
  • Page 61: Twain Driver

    Software and Utilities Included on the CD-ROM ❖ HDI driver The HDI driver for the AutoCAD 2000 series is provided to work specifically with the AutoCAD 2000 series of CAD applications. Using the HDI driver reduces data size during print out, enabling faster print out.
  • Page 62: Desktopbinder Lite

    Appendix DeskTopBinder Lite This section explains the file path and system requirements of DeskTopBinder Lite. DeskTopBinder is to be installed on the client computers for integration and management of various kinds of files such as scan files, files created with appli- cations, and existing scan files.
  • Page 63: Smartdevicemonitor For Admin

    Software and Utilities Included on the CD-ROM SmartDeviceMonitor for Admin SmartDeviceMonitor for Admin is an application that uses TCP/IP and IPX/SPX to monitor network printers. It can monitor multiple network printers using IPv4 address. We recommend that network administrators use this application. ❖...
  • Page 64: Desktopbinder-Smartdevicemonitor For Client

    Appendix DeskTopBinder-SmartDeviceMonitor for Client DeskTopBinder-SmartDeviceMonitor for Client allows you to manage and print various data such as files created with an application, images scanned with a scanner, and existing images as one document. ❖ File path DeskTopBinder-SmartDeviceMonitor for Client is stored in the following folder on the CD-ROM labeled “Printer Drivers and Utilities”: NETWORK\DEVMON\CLIENT\DISK1 ❖...
  • Page 65: Installing The Operating Instructions

    Installing the Operating Instructions Installing the Operating Instructions The supplied “Manuals” CD-ROM contains HTML format manuals. Install the manuals you want to use. Important ❒ The system requirements for installing the manuals are as follows: • Operating System: Windows 95/98/Me, Windows 2000/XP, Windows Server 2003, or Windows NT4.0 •...
  • Page 66: Pdf Manuals

    Appendix PDF Manuals The supplied “Manuals” CD-ROM contains PDF versions of the HTML user manuals. ❖ File path The PDF manuals are in the following folder on the CD-ROM: MANUAL_PDF\ENGLISH Note ❒ To view the PDF manuals, you need to have Adobe Acrobat or Adobe Reader installed on your computer.
  • Page 67: Opening The Installed Operating Instructions

    Opening the Installed Operating Instructions Opening the Installed Operating Instructions This section explains how to open installed manuals. Opening from the Icon This section explains how to open a manual using its desktop icon. Double-click the icon on your desktop. The browser opens and the manual appears.
  • Page 68: Opening From The Cd-Rom

    Appendix Opening from the CD-ROM This section explains how to open a manual from the supplied “Manuals” CD- ROM. Click [Read manuals]. Click the title of the manual you want to view. The browser opens, and then the manual appears.
  • Page 69: Specifications For The Main Unit

    Specifications for the Main Unit Specifications for the Main Unit ❖ Configuration: Desktop ❖ Photosensitivity type: OPC drum ❖ Original scanning: Original feed image scanning over fixed contact image sensor ❖ Copy process: Dry electrostatic transfer system ❖ Development: Dry two-component magnetic brush development system ❖...
  • Page 70 Appendix ❖ Paper size (W × L): • Metric version: Paper roll: 210 × 279 mm-914 × 15000 mm Bypass tray: 210 × 257 mm-914 × 2000 mm Cut paper: A3K, B4 JIS (Japanese Industrial Standard)K, A4K • Inch version: EK-AK "...
  • Page 71 Specifications for the Main Unit ❖ Reproduction ratio: • Metric version: Full-size: 100% Reduce: 25.0%, 35.4%, 50.0%, 70.7% Enlarge: 141.4%, 200.0%, 282.8%, 400.0% Zoom: 25.0-400.0% (0.1% increments) • Inch version (Engineering): Full-size: 100% Reduce: 25.0%, 32.4%, 50.0%, 64.7% Enlarge: 129.4%, 200.0%, 258.8%, 400.0% Zoom: 25.0-400.0% (0.1% increments) •...
  • Page 72 Appendix ❖ Noise emission: Sound power level: Stand-by Less than 40 dB(A) Copying Less than 68 dB(A) Sound pressure level: Stand-by Less than 30 dB(A) Copying Less than 57 dB(A) • Sound power level and sound pressure level are actual values measured in accordance with ISO 7779.
  • Page 73: Specifications For Options

    Specifications for Options Specifications for Options Roll Feeder Type 240 A or 240 B ❖ Paper sizes: Width: 210 – 914 mm, length: 150 m (diameter: 175 mm) ❖ Paper widths: • Metric version 210 mm, 257 mm, 297 mm, 364 mm, 420 mm, 440 mm, 490 mm, 515 mm, 594 mm, 620 mm, 625 mm, 660 mm, 680 mm, 707 mm, 728 mm, 800 mm, 841 mm, 880 mm, 914 mm •...
  • Page 74: Carrier Sheet

    Appendix Table Type 240 ❖ Dimensions (W × D × H): 1080 × 700 × 720 mm, 43" × 27" × 28" ❖ Weight: Approx. 34 kg Carrier Sheet Allows you to load bent, folded, creased, thin, or pasted originals using this sheet.
  • Page 75: Usb Host Interface Unit Type 7300

    Specifications for Options USB Host Interface Unit Type 7300 ❖ Interface Connector: USB 1.1 host interface A type ❖ Data Transmission Speed: 12 Mbps (Full speed) ❖ Distance Between Devices: 2.5 m Gigabit Ethernet Board Type A ❖ Interface Connector: •...
  • Page 76: Copy Paper

    Appendix Copy Paper This section describes recommended paper sizes and types, unusable paper, pa- per storage, and handling paper. Recommended Paper Sizes and Types The following limitations apply to each tray: Important ❒ If you use damp or curled paper, a paper jam may occur. ❖...
  • Page 77 Copy Paper Where paper is Paper type Paper size Number of placed sheets that can be placed Cut paper tray Plain paper A3K, B4 JISK, A4K 250 sheets (optional) 52.3-110 g/m (13.9-29.3 lb) Cut paper tray Recycled paper A3K, B4 JISK, A4K 250 sheets (optional) Bypass tray...
  • Page 78 Appendix ❖ Inch version Where paper is Paper type Paper size Number of placed sheets that can be placed Paper roll tray Plain paper Paper roll – (optional) Diameter: 6.7" or less 52.3 – 110 g/m (13.9 – 29.3 lb) Internal diameter: 2.98"...
  • Page 79 Copy Paper Where paper is Paper type Paper size Number of placed sheets that can be placed Bypass tray Translucent paper • Engineering 1 sheet (vellum) E (34"×44")K, D (22"×34")KL, C (17"×22")KL, B (11"×17")KL, A (8 "×11")K • Architecture E (36"×48")K, D (24"×36")KL, C (18"×24")KL, B (12"×18")KL,...
  • Page 80: Unusable Paper

    Appendix Paper roll • If humidity is high, and the paper roll has expanded due to moisture, be sure to cut off approximately 1000 mm (40"), before making copies or printing. • Use a paper roll that has a black core. •...
  • Page 81 Copy Paper Important ❒ To prevent faults, do not use any of the following kinds of treated paper: • Paper for inkjet printers • Thermal fax paper • Art paper • Aluminum foil • Carbon paper • Conductive paper • OHP transparencies for color copying •...
  • Page 82: Paper Storage

    Appendix Paper Storage This section describes how to store paper. • When storing paper, the following precautions should always be followed: • Do not store paper where it will be exposed to direct sunlight. • Avoid storing paper in humid areas (humidity: 70% or less). •...
  • Page 83: Index

    INDEX Alert indicator File Format Converter Anti-humidity heater switch Folding finisher Authentication Screen Function keys Auto Off Available Characters Gigabit Ethernet (1000BASE-TX) Bypass tray Bypass tray's paper guide Handling paper HDI driver How to Enter Text Carrier sheet CAUTION Changing Modes IEEE 802.11b wireless LAN board Clear Modes key Installing the Operating Instructions...
  • Page 84 Opening from the CD-ROM Sample Copy key Opening from the Icon Scanner Opening from the Start Menu Scanner Stop key Opening the Installed Operating Scanner unit Instructions Screen contrast knob Operation switch Simplified Display Options Simplified Display key Original cover Sleep mode Original exit SmartDeviceMonitor for Admin...
  • Page 85 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater switch: a means POWER ON.
  • Page 86 Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7787...
  • Page 87 Operating Instructions General Settings Guide Connecting the Machine System Settings Copier / Document Server Features Printer Features Scanner Features Registering Addresses and Users for Scanner Functions Other User Tools Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 88 Type 1: 2404WD/GWD2004/LW324/Aficio MP W2400 • Type 2: 2406WD/GWD2006/LW326/Aficio MP W3600 Certain types might not be available in some countries. For details, please contact your local dealer. Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
  • Page 89 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒...
  • Page 90 ❖ Network Guide Explains how to configure and operate the machine in a network environ- ment, and use the software provided. ❖ Other manuals • PostScript3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite DeskTopBinder Lite Setup Guide DeskTopBinder Introduction Guide Auto Document Link Guide Note ❒...
  • Page 91 TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 Symbols ........................1 Display Panel......................2 Accessing User Tools ...................3 Changing Default Settings ..................3 Quitting User Tools ....................4 Menu Protect......................4 1. Connecting the Machine Connecting to the Interfaces ................5 Connecting to the Ethernet Interface .................6 Connecting to the USB Interface................8 Connecting to the IEEE 802.11b (Wireless LAN) Interface........9...
  • Page 92 3. Copier / Document Server Features General Features....................75 Reproduction Ratio....................78 Edit ........................81 Stamp ........................86 Background Numbering ...................86 Preset Stamp ......................86 User Stamp ......................88 Date Stamp ......................89 Page Numbering ......................90 Input/Output ......................92 Program / Delete Overlay Format ...............93 Programming an Overlay Format................93 Overwriting a Stored format ..................94 Deleting a Stored format ..................95 Settings for the Document Server..............96...
  • Page 93 Authentication Information ................122 Registering a User Code..................123 Changing a User Code...................124 Deleting a User Code.....................126 Displaying the Counter for Each User..............127 Printing the Counter for Each User ................128 Printing the Counter for All Users................129 Clearing the Number of Prints................130 E-mail Destination....................
  • Page 94 8. Appendix Copyrights ......................181 expat ........................181 NetBSD ........................182 Sablotron........................184 JPEG LIBRARY .....................184 SASL ........................185 MD4........................186 MD5........................186 Samba(Ver 3.0.4)....................187 ® RSA BSAFE ......................187 Open SSL.......................188 Open LDAP ......................193 LibTIFF........................195 INDEX....................... 196...
  • Page 95: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Ma- chine.
  • Page 96: Display Panel

    Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing them. When you select or specify an item on the display panel, it is highlighted like .
  • Page 97: Accessing User Tools

    Accessing User Tools This section describes how to access User Tools menu. User Tools allow you to change or set defaults. Note ❒ Operations for system settings differ from normal operations. Always quit User Tools when you have finished. ❒ Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the {Energy Saver} or {Clear Modes} key is pressed.
  • Page 98: Quitting User Tools

    Change settings by following instructions on the display, and then press [OK]. Note ❒ To cancel changes made to settings and return to the initial display, press the {User Tools/Counter} key. Reference p.35 “System Settings” p.75 “Copier / Document Server Features” p.97 “Printer Features”...
  • Page 99: Connecting The Machine

    1. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interfaces This section describes how to identify the machine’s interface and connect the machine according to the network environment. ATM001S 10BASE-T/100BASE-TX port Note...
  • Page 100: Connecting To The Ethernet Interface

    Connecting the Machine Connecting to the Ethernet Interface This section describes how to connect 10BASE-T or 100BASE-TX cable to the Eth- ernet interface. Important ❒ If the main power switch is on, turn it off. A ferrite core for the Ethernet cable is supplied with this machine. Make a loop in the cable about 4.5 cm (1.8") (1) from the machine end of the cable.
  • Page 101 Connecting to the Interfaces Turn on the main power switch of the machine. ATM002S Note ❒ For details about installing the printer driver, see "Preparing the Machine", Printer Reference. Reference "Turning On the Power", About This Machine "Preparing the Machine", Printer Reference...
  • Page 102: Connecting To The Usb Interface

    Connecting the Machine Connecting to the USB Interface This section describes how to connect the USB2.0 interface cable to the USB2.0 port. Connect the USB2.0 interface cable to the USB2.0 port. ATL013S Connect the other end to the USB2.0 port on the host computer. Note ❒...
  • Page 103: Connecting To The Ieee 802.11B (Wireless Lan) Interface

    Connecting to the Interfaces Connecting to the IEEE 802.11b (Wireless LAN) Interface This section describes how to connect to the IEEE 802.11b (wireless LAN) inter- face. Note ❒ Check the settings of the IPv4 address and subnet mask of this machine. ❒...
  • Page 104 Connecting the Machine Note ❒ Select [802.11 Ad-hoc Mode] mode when connecting Windows XP as a wireless LAN client using Windows XP standard driver or utilities, or when not using the infrastructure mode. ❒ You can specify either "WEP" or "WPA" to the Security Method. ❒...
  • Page 105 Connecting to the Interfaces ❖ When using in ad hoc mode / 802.11 ad hoc mode ATL008S 1. If the IEEE 802.11b interface unit is functioning, the LED lights up in orange. 2. If it is connected properly to the network, the LED is green when in ad hoc mode or 802.11 ad hoc mode.
  • Page 106: Network Settings

    Connecting the Machine Network Settings This section describes the network settings you can change with User Tools (Sys- tem Settings). Make settings according to functions you want to use and the in- terface to be connected. Important ❒ These settings should be made by the system administrator, or with the ad- vice of the system administrator.
  • Page 107 Network Settings Menu User Tool Setting Requirements Interface Settings/Network Machine Name As required Note ❒ IPv6 can be used only for the printer function. ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒...
  • Page 108 Connecting the Machine Menu User Tool Setting Requirements Interface Settings/ Communication Mode Necessary IEEE 802.11b Interface Settings/ SSID Setting As required IEEE 802.11b Interface Settings/ Channel As required IEEE 802.11b Note ❒ IPv6 can be used only for the printer function. ❒...
  • Page 109: Settings Required To Use E-Mail Function

    Network Settings Settings Required to Use E-mail Function This section lists the settings required for sending e-mail. Ethernet This section lists the settings required for sending e-mail with an Ethernet con- nection. For details about how to specify the settings, see "Interface Settings" and "File Transfer".
  • Page 110 Connecting the Machine Note ❒ For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. ❒ [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and wireless LAN (IEEE 802.11b) are connected, the selected in- terface takes precedence.
  • Page 111 Network Settings Menu User Tool Setting Requirements Interface Settings/ Transmission Speed As required IEEE 802.11b File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer...
  • Page 112: Settings Required To Use Scan To Folder Function

    Connecting the Machine Settings Required to Use Scan to Folder Function This section lists the settings required for sending files. Ethernet This section lists the settings required for sending files with an Ethernet connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer".
  • Page 113 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for sending files with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address...
  • Page 114: Settings Required To Use The Network Delivery Scanner

    Connecting the Machine Settings Required to Use the Network Delivery Scanner This section lists the settings required for delivering data to network. Ethernet This section lists the settings required for delivering data to network with an Ethernet connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer".
  • Page 115 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for delivering data to network with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary...
  • Page 116: Settings Required To Use Network Twain Scanner

    Connecting the Machine Reference p.48 “Interface Settings” p.54 “File Transfer” Settings Required to Use Network TWAIN Scanner This section lists the settings required for using TWAIN Scanner under the net- work environment. Ethernet This section lists the settings required for using network TWAIN Scanner with an Ethernet connection.
  • Page 117 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for using network TWAIN Scanner with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address...
  • Page 118: Settings Required To Use Document Server

    Connecting the Machine Settings Required to Use Document Server This section lists the settings required for using Document Server function under the network environment. Ethernet This section lists the settings required for using Document Server function with the Ethernet connection. For details about how to specify the settings, see "Interface Settings".
  • Page 119 Network Settings IEEE 802.11b (wireless LAN) This section lists the settings required for using Document Server function with an IEEE 802.11b (wireless LAN) connection. For details about how to specify the settings, see "Interface Settings". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address...
  • Page 120: Using Utilities To Make Network Settings

    Connecting the Machine Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. Note ❒ For details about using Web Image Monitor, see "Using Web Image Monitor", Network Guide.
  • Page 121 Network Settings ❖ [Network] → [Machine IPv6 Address] → [Manual Configuration Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 122 Connecting the Machine ❖ [Network] → [WINS Configuration] → [On] → "Primary WINS Server" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 123 Network Settings ❖ [Network] → [Effective Protocol] → "AppleTalk" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 124 Connecting the Machine ❖ [Network] → [NW Frame Type] → [Ethernet 802.3] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 125 Network Settings ❖ [Network] → [Permit SNMPv3 Communication] → [Encryption Only] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 126 Connecting the Machine ❖ [IEEE 802.11b] → [Communication Mode] → [Ad-hoc Mode] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. ❖...
  • Page 127 Network Settings File Transfer Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. ❖ [File Transfer] → [SMTP Server] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. •...
  • Page 128 Connecting the Machine ❖ [File Transfer] → [Administrator's E-mail Address] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. ❖...
  • Page 129: System Settings

    2. System Settings This chapter describes user tools in the System Settings menu. For details on how to access System Settings, see "Accessing User Tools". General Features This section describes the user tools in the General Features menu under System Settings.
  • Page 130 System Settings ❖ Warm-up Beeper (copier/Document Server) You can have the beeper sound when the machine becomes ready to copy af- ter leaving Energy Saver mode, or when the power is turned on. The default setting is On. If the Panel Tone setting is [Off], the beeper does not sound, whatever the Warm Up Notice setting.
  • Page 131 General Features ❖ Original Feed Delay 1 Specify the duration of delay before an original is fed into the machine after being set. If originals frequently feed in slanted, or you are using special orig- inals, set the delay accordingly. The default setting is 1 second(s).
  • Page 132 System Settings To set the Fine Ratio setting, measure the length of the original and the copy image to calculate the ratio. ZEDG010E ❖ Fine Ratio Adjustment: Printer Specify the fine ratio when the optional printer is installed. Depending on pa- per type, environment, and humidity, copy paper can expand or shrink slightly.
  • Page 133 General Features ❖ Fold Width Fine Adjustment Adjusts the fan fold width. "Adjustment Value (Fan Folding Finisher)" adjusts the Fan Fold width (shown as A, B, and C in the figure below). This menu appears only when the folding finisher is installed. ATM008S The default setting is 0.0 mm (Metric version) / 0.00 inch (Inch version).
  • Page 134: Output Tray Settings

    System Settings ❖ Margin Fold Margin Adjustment Adjusts the margin width ((1) in the figure below) when [Fan Fold 8 inch (Mar- gin Fold)] is selected. ATL011S This menu appears only when the folding finisher is installed. The default setting is 40 mm (Metric version) / 1.50 inch (Inch version). Use the number keys to enter a value in 1 mm units in the ranging from 35 mm (1.00 inch) to 40 mm (1.50inch).
  • Page 135: Tray Paper Settings

    Tray Paper Settings Tray Paper Settings This section describes the user tools in the Tray Paper Settings menu under Sys- tem Settings. Default settings are shown in bold type. Important ❒ If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed might occur because the correct paper size was not detected.
  • Page 136 System Settings ❖ Tray Paper Size: Tray 1 Select the size of the paper loaded in the paper tray. Metric version: • A Series: A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3 Width (297 mm), A4 Width (210 mm) •...
  • Page 137 Tray Paper Settings ❖ Tray Paper Size: Tray 2 Select the size of the paper loaded in the paper tray. • When two paper rolls tray is installed Metric version: • A Series: A0 Width (841 mm), A1 Width (594 mm), A2 Width (420 mm), A3 Width (297 mm), A4 Width (210 mm) •...
  • Page 138 System Settings ❖ Paper Type: Paper Bypass Sets the display so you can see what type of paper is loaded in the paper bypass. • The paper types you can set for the paper bypass are as follows: No Display, Recycled Paper, Translucent Paper, Film The default setting is No Display.
  • Page 139 Tray Paper Settings When using thin, soft, or limp paper, toner fusing may appear wrinkled or the image may be blurred. If this happens, change the thickness level to 3 → 4 → 5. When level 1 or 2 are selected for translucent paper, and you change the paper type from plain or film to translucent, it may take longer for the machine to get ready for copying (up to two minutes).
  • Page 140: Timer Settings

    System Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Default settings are shown in bold type. ❖ Auto Off Timer After a specified period has passed, following job completion, the machine automatically turns off, in order to conserve energy.
  • Page 141 Timer Settings ❖ Printer Auto Reset Timer Specifies the time to elapse before the printer function resets. The default setting is On, 60 second(s). The time can be set from 10 to 999 seconds, using the number keys. ❖ Scanner Auto Reset Timer Specifies the time to elapse before the scanner function resets.
  • Page 142: Interface Settings

    System Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Default settings are shown in bold type. Network This section describes the user tools in the Network menu under Interface Set- tings. ❖...
  • Page 143 Interface Settings ❖ DDNS Configuration Specify the DDNS settings. The default setting is Active. ❖ Domain Name Specify the domain name. The default setting is Auto-Obtain (DHCP). When you select [Specify], enter the domain name using up to 63 characters. ❖...
  • Page 144 System Settings ❖ Ethernet Speed Set the access speed for networks. Select a speed that matches your network environment. [Auto Select] should usually be selected. The default setting is Auto Select. Machine 10Mbps Half 10Mbps Full 100Mbps 100Mbps Full Auto Select Router/HUB Duplex Duplex...
  • Page 145: Ieee 802.11B

    Interface Settings ❖ Permit SSL / TLS Communication Set the encrypted communication of SSL/TLS. The default setting is Ciphertext / Clear Text. If you set to [Ciphertext Only], you need to install the SSL certificate for the ma- chine. ❖ Host Name Specify the host name.
  • Page 146 System Settings ❖ Security Method Specifies the encryption of the IEEE 802.11b (wireless LAN). The default setting is Off. If you select [WEP], always enter WEP key. If you select [WPA], specify the en- cryption and authentication methods. Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode]. •...
  • Page 147: Print List

    Interface Settings Print List This section describes how to print the configuration page. You can check items related to the network environment. The configuration page shows the current network settings and network information. Press [System Settings]. Press [Interface Settings]. Press [Print List]. Press the {Start} key.
  • Page 148: File Transfer

    System Settings File Transfer This section describes the user tools in the File Transfer menu under System Settings. Default settings are shown in bold type. ❖ Delivery Option Enables or disables sending stored or scanned documents to the ScanRouter delivery server. The default setting is Off.
  • Page 149 File Transfer ❖ POP before SMTP Specify POP authentication (POP before SMTP). When sending e-mail to an SMTP server, you can enhance the SMTP server security level by connecting to the POP server for authentication. The default setting is Off. If you set POP before SMTP to [On], specify the waiting time after authentica- tion, user name, e-mail address and password.
  • Page 150 System Settings ❖ Administrator's E-mail Address Specify the Administrator's E-mail Address. If a failure occurs in the machine or consumables need to be replaced, e-mail messages are sent to the Administrator's E-mail Address by E-mail Notifica- tion function. On e-mailed scanned documents, if the sender is not specified this appears as the sender's address.
  • Page 151 File Transfer ❖ Default User Name / Password (Send) Specify the user name and password required when sending scan files direct- ly to a shared folder on a computer running Windows, to an FTP server, or to a NetWare server. Enter in up to 64 characters.
  • Page 152 System Settings ❖ Auto Specify Sender Name Set whether or not to specify the name of the sender when sending e-mail. The default setting is Off. • On If you select [On], the specified e-mail address will appear in the "From:" box.
  • Page 153: Administrator Tools

    Administrator Tools Administrator Tools This section describes the user tools in the Administrator Tools menu under Sys- tem Settings. Default settings are shown in bold type. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Ad- ministrator Tools settings.
  • Page 154 System Settings ❖ Address Book: Program / Change / Delete Group Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group. • Program / Change You can register and change groups. •...
  • Page 155 Administrator Tools Press the name key to be moved. You can select a name using the number keys. Press the name key in the place you want to move it to. The user key is moved to the selected position, and the user key currently at the selected position is moved forward or backward.
  • Page 156 System Settings ❖ Print Address Book: Destination List You can print the destination list registered in the Address Book. • Print in Title 1 Order Prints the Address Book in Title 1 order. • Print in Title 2 Order Prints the Address Book in Title 2 order. •...
  • Page 157 Administrator Tools ❖ Address Book: Edit Title You can edit the title to easily find a user. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Edit Title]. Press the title key you want to change. Enter the new name, and then press [OK]. Press [OK].
  • Page 158 System Settings ❖ Display / Print Counter Allows you to view and print the number of prints. • Display / Print Counter Displays the number of prints for each function (Total, Copier, Send Total, Printer, Scanner Send). • Print Counter List Prints out a list of the number of prints made under each function.
  • Page 159 Administrator Tools ❖ User Authentication Management • User Code Auth. Using User Code Authentication, you can limit the available functions and supervise their use. When using User Code Authentication, register the user code. Using the Printer PC Control function, you can obtain a log of prints cor- responding to the codes entered using the printer driver.
  • Page 160 System Settings ❖ Auto Delete File in Document Server Specify whether documents stored in the Document Server will or will not be deleted after a specified period of time. The default setting is On, 3 day(s). If you select [On], documents stored subsequently are deleted after the speci- fied period.
  • Page 161 Administrator Tools ❖ Auto Erase Memory Setting For details about this function, consult your administrator. ❖ Erase All Memory For details about this function, consult your administrator. ❖ Delete All Logs For details about this function, consult your administrator. ❖ Transfer Log Setting For details about this function, consult your administrator.
  • Page 162: Programming The Ldap Server

    System Settings Programming the LDAP server This section describes how to specify the LDAP server settings. To program / change the LDAP server This section describes how to program / change the LDAP server. Press [System Settings]. Press [Administrator Tools]. Press [TNext] twice.
  • Page 163: To Enter A Server Name

    Programming the LDAP server To enter a server name This section describes how to enter a server name. Press [Change] under "Server Name". Register the LDAP server’s host name or IPv4 address. Enter the LDAP server name. Press [OK]. To enter the search base This section describes how to enter the search base.
  • Page 164: To Start Ssl Communication

    System Settings To start SSL communication This section describes how to specify SSL communication. Press [On] under "Use Secure Connection (SSL). Use SSL to communicate with the LDAP server. To use SSL, the LDAP server must support SSL. When SSL is set to [On], the port number automatically changes to “636”. SSL setting must be enabled on this machine.
  • Page 165: To Enter The User Name And Password

    Programming the LDAP server To enter the user name and password This section describes how to enter the user name and password. When [On] or [High Security] is selected for the authentication setting, use the ad- ministrator account name and password. Do not enter the administrator account name and password when using authentication for each individual or each search.
  • Page 166: To Set Search Conditions

    System Settings To set search conditions This section describes how to specify search conditions. You can enter an attribute as a typical search keyword. Using the entered at- tribute, the function searches the LDAP server’s Address Book. Press [TNext] twice. Press [Change] for items you want to use as search conditions from the fol- lowing: "Name", "E-mail Address", "Fax Number", "Company Name", and "Department Name".
  • Page 167 Programming the LDAP server Enter the key display, and then press [OK]. The registered “key display” appears as a keyword for searching LDAP. • Without key display registration • With key display registration The key does not appear on the search screen unless both “Attribute” and “Key Display”...
  • Page 168: To Delete The Programmed Ldap Server

    System Settings To delete the programmed LDAP server This section describes how to delete the programmed LDAP server. Press [System Settings]. Press [Administrator Tools]. Press [TNext] twice. Press [Program / Change / Delete LDAP Server]. Press [Delete]. Select the LDAP server you want to delete. Press [Yes].
  • Page 169: Copier / Document Server Features

    3. Copier / Document Server Features This chapter describes user tools in the Copier / Document Server Features menu. For details on how to access Copier / Document Server Features, see "Ac- cessing User Tools". General Features This section describes the user tools in the General Features menu under Copier / Document Server Features.
  • Page 170 Copier / Document Server Features ❖ Copy Quality Adjust the finish for each original type (Text, Drawing, Text / Photo, Photo, Background Lines, Patched Original) [Custom Setting] provides a set of adjustment options that service representa- tives can use to meet customer requests for finish quality. •...
  • Page 171 General Features ❖ Auto Tray Switching If you load paper of the same size in two or more trays, the machine automat- ically shifts to the other when the first tray runs out of paper (when Auto Pa- per Select is selected.) This function is called "Auto Tray Switching". This setting specifies whether to use Auto Tray Switching or not.
  • Page 172: Reproduction Ratio

    Copier / Document Server Features Reproduction Ratio This section describes the user tools in the Reproduction Ratio menu under Copier / Document Server Features. Default settings are shown in bold type. For details about the relationships between fixed reduce/enlarge ratios, docu- ment sizes, and paper sizes, see "Supplementary Information", Copier / Docu- ment Server Reference.
  • Page 173 Reproduction Ratio ❖ Reproduction Ratio Specify the enlargement and reduction ratios that appear if [Reduce / Enlarge] is pressed on the copier screen. When you select [User Reduce/Enlarge Ratio], the ratio can be set from 25.0 to 400.0%, using the number keys. Metric version: •...
  • Page 174 Copier / Document Server Features Inch version (Architecture) • 25.0% (E → A) • 33.3% (D → A, E → B) • 50.0% (C → A, D → B, E → C) • 66.7% (B → A, C → B, D → C, E → D) •...
  • Page 175: Edit

    Edit Edit This section describes the user tools in the Edit menu under Copier / Document Server Features. Default settings are shown in bold type. ❖ Adjust Position Specify the default setting for Print Position Adjustment. The default setting is Bottom: 20 mm / Right: 20 mm (Metric version) / Bot- tom: 0.8"...
  • Page 176 Copier / Document Server Features ❖ Image Repeat Separation Line You can select a separation line using the Image Repeat function from: None, Solid, Broken A, Broken B, or Crop Marks. • None • Solid • Broken A • Broken B •...
  • Page 177 Edit ❖ Double Copies Separation Line You can select a separation line using the Double Copies function from: None, Solid, Broken A, Broken B, or Crop Marks. • None • Solid • Broken A • Broken B • Crop Marks The default setting is None.
  • Page 178 Copier / Document Server Features ❖ Separation Line in Combine You can select a separation line using the Combine function from: None, Sol- id, Broken A, Broken B, or Crop Marks. • None • Solid • Broken A • Broken B •...
  • Page 179 Edit ❖ Program / Delete Format Store a format (background) image for use with Format Overlay. You can store up to four formats. See "Program/Delete Overlay Format". ❖ Margin Adjustment Priority Specify the default setting for the margin size. You can set the top and bottom margin size. The default setting is Top: 20 mm, Bottom: 20 mm (Metric version) / Top: 0.8", Bottom: 0.8"...
  • Page 180: Stamp

    Copier / Document Server Features Stamp This section describes the user tools in the Stamp menu under Copier / Docu- ment Server Features. Default settings are shown in bold type. Background Numbering This section describes the user tools in the Background Numbering menu under Stamp.
  • Page 181 Stamp ❖ Stamp Format Specify how each of stamp is printed. • Stamp Position Specify where to print the stamp. The default setting is Top Right. • Stamp Position You can adjust the position of the stamp within the available ranges shown below.
  • Page 182: User Stamp

    Copier / Document Server Features User Stamp This section describes the user tools in the User Stamp menu under Stamp. ❖ Program / Delete Stamp You can register, change, or delete user stamps. You can register up to four custom stamps with your favorite designs. ❖...
  • Page 183: Date Stamp

    Stamp Date Stamp This section describes the user tools in the Date Stamp menu under Stamp. ❖ Format You can select the date format for Date Stamp mode. The default setting is DD / MM / YYYY (Metric version) / MM / DD / YYYY (Inch version).
  • Page 184: Page Numbering

    Copier / Document Server Features Page Numbering This section describes the user tools in the Page Numbering menu under Stamp. ❖ Stamp Format You can select the page number format given priority when [Page Numbering] is pressed. The default setting is P1,P2..❖...
  • Page 185 Stamp ❖ Superimpose You can have page numbers printed in white when they overlap black parts of the image. The default setting is Off. ❖ Page Numbering Initial Letter You can select the page numbering initial letter between”P1, P2.../ P.1, P.2...” and ”S1, S2.../ S.1, S.2...”...
  • Page 186: Input/Output

    Copier / Document Server Features Input/Output This section describes the user tools in the Input/Output menu under Copier / Document Server Features. Default settings are shown in bold type. ❖ Rotate Sort: Auto Paper Continue Specify to continue copying when paper of the required orientation has run out during rotate sort.
  • Page 187: Program / Delete Overlay Format

    Program / Delete Overlay Format Program / Delete Overlay Format This section describes how to program / delete Overlay Format. Note ❒ The maximum size of original size to be stored is A0(E). You cannot store long length originals. ❒ For details about Format Overlay, see "Format Overlay", Copier / Document Server Reference.
  • Page 188: Overwriting A Stored Format

    Copier / Document Server Features Select the original orientation. Place the original, and then press [Start Scanning]. The original is scanned and stored. Press [Exit]. Press the {User Tools / Counter} key. Overwriting a Stored format This section describes how to overwrite a stored Overlay Format. Make sure the machine is ready to copy.
  • Page 189: Deleting A Stored Format

    Program / Delete Overlay Format Deleting a Stored format This section describes how to delete a stored Overlay Format. Make sure the machine is ready to copy. Press [Copier / Document Server Features]. Press [Edit]. Press [Program / Delete Format]. Press [Delete].
  • Page 190: Settings For The Document Server

    Copier / Document Server Features Settings for the Document Server This section describes user tool settings for the Document Server. For details, see "System Settings", and "Copier / Document Server Features". ❖ System Settings Heading Item Default General Features Warm-up Beeper General Features Copy Count Display General Features...
  • Page 191: Printer Features

    4. Printer Features This chapter describes user tools in the Printer Features menu. For details on how to access Printer Features, see "Accessing User Tools". List / Test Print This section describes the user tools in the Test Print menu under Printer Fea- tures.
  • Page 192: Printing The Configuration Page

    Printer Features Note ❒ When printing from the [List / Test Print] menu, the machine first tries to print from a tray containing plain or recycled paper. It checks the cut paper tray first, then the paper roll tray. If there is no paper tray containing plain or re- cycled paper, the machine then tries print on tracing paper and finally print- ing film.
  • Page 193 List / Test Print Interpreting the Configuration Page This section describes the Configuration Page. ❖ System Reference • Unit Number Displays the serial number assigned to the board by its manufacturer. • Total Memory Displays the total amount of memory (SDRAM) installed on the printer. •...
  • Page 194: Maintenance

    Printer Features Maintenance This section describes the user tools in the Maintenance menu under Printer Fea- tures. Default settings are shown in bold type. ❖ List / Test Print Lock You can lock the [List / Test Print] menu. The default setting is Off. ❖...
  • Page 195: System

    System System This section describes the user tools in the System menu under Printer Features. Default settings are shown in bold type. ❖ Print Error Report Select this to have an error report printed when a printer or memory error oc- curs.
  • Page 196 Printer Features ❖ Memory Usage You can select the amount of memory used in Font Priority or Frame Priority, according to paper size or resolution. The default setting is Frame Priority. • Font Priority This setting uses memory for registering fonts. •...
  • Page 197 System ❖ Default Printer Language You can set the default printer language if the machine cannot find the printer language automatically. The default setting is PS. This menu appears only when the PostScript 3 unit is installed. ❖ Tray Switching You can set to switch the paper tray.
  • Page 198: Host Interface

    Printer Features Host Interface This section describes the user tools in the Host Interface menu under Printer Features. Default settings are shown in bold type. ❖ I/O Buffer You can set the size of the I/O Buffer. Normally it is not necessary to change this setting.
  • Page 199: Ps Menu

    PS Menu PS Menu This section describes the user tools in the PS Menu under Printer Features. Default settings are shown in bold type. ❖ Data Format You can select a data format. The default setting is TBCP. This setting is not effective when operating the machine with a parallel or EtherTalk connection.
  • Page 200: Pdf Menu

    Printer Features PDF Menu This section describes the user tools in the PDF Menu under Printer Features. Default settings are shown in bold type. ❖ Change PDF Password Set the password for the PDF file executing PDF Direct Print. • Current Password •...
  • Page 201: Scanner Features

    5. Scanner Features This chapter describes user tools in the Scanner Features menu. For details on how to access Scanner Features, see "Accessing User Tools". General Settings This section describes the user tools in the General Settings menu under Scanner Features.
  • Page 202 Scanner Features ❖ Destination List Display Priority 2 In the machine’s address book, select which address book appears by default. You can select either [E-mail Address] or [Folder]. The default setting is E-mail Address. ❖ Print & Delete Scanner Journal Up to 250 transmission/delivery results can be checked on this machine.
  • Page 203: Scan Settings

    Scan Settings Scan Settings This section describes the user tools in the Scan Settings menu under Scanner Features. Default settings are shown in bold type. ❖ Next Original Wait Setting To divide originals and scanning them individually to make a single file, se- lect [Off], [Set Wait Time], or [Continuous Wait] for the waiting status.
  • Page 204: Send Settings

    Scanner Features Send Settings This section describes the user tools in the Send Settings menu under Scanner Features. Default settings are shown in bold type. ❖ Compression (Black & White) Select whether or not to compress scan files. The default setting is On. Compression reduces the time required for transferring the scan file.
  • Page 205 Send Settings ❖ Insert Additional E-mail Info Select the language in which e-mail information such as title, date, and ad- ministrator's e-mail address is sent. • On • Off Select one of the following 20 languages: • British English, American English, German, French, Italian, Spanish, Dutch, Portuguese, Polish, Czech, Swedish, Finnish, Hungarian, Norwegian, Dan- ish, Japanese, Simplified Chinese, Traditional Chinese, Russian, and Hangul.
  • Page 206 Scanner Features...
  • Page 207: Registering Addresses And Users For Scanner Functions

    6. Registering Addresses and Users for Scanner Functions This chapter describes how to register destinations and users in the Address Book. For details on how to access System Settings see "Accessing User Tools". Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily.
  • Page 208 Registering Addresses and Users for Scanner Functions ❖ Protection You can set protection codes to stop sender's name from being used or folders from being accessed without authorization. ❖ E-mail Address You can register e-mail destinations in the Address Book.
  • Page 209 Address Book ❖ Folder You can register the protocol, path name and server name. • SMB • FTP • NCP ❖ Add to Group You can put registered e-mail and folder destinations into a group for easier management.
  • Page 210: Managing Names In The Address Book

    Registering Addresses and Users for Scanner Functions Note ❒ You can also use a Web Image Monitor to register names in the Address Book. With the SmartDeviceMonitor for Admin, you can register multiple names at the same time. For details about using Web Image Monitor, see the Web Im- age Monitor Help.
  • Page 211: Preventing Unauthorized User Access To Shared Folders From The Machine

    Address Book Preventing unauthorized user access to shared folders from the machine After registering a protection code, you can specify the object of protection to prevent an e-mail destination from being used without permission. You can prevent unauthorized access to registered folders. Reference p.168 “Registering a Protection Code”...
  • Page 212: Registering Names

    Registering Addresses and Users for Scanner Functions Registering Names This section describes names in Address Book. Register user information including their names. The user name is useful for selecting a destination when sending e-mail. You can also use it as a folder destination. You can register up to 2000 names.
  • Page 213 Registering Names When you want to change the key display, press [Change] under "Key Dis- play". Enter the key display, and then press [OK]. Press the key for the classification you want to use under "Select Title”. The keys you can select are as follows: •...
  • Page 214: Changing A Registered Name

    Registering Addresses and Users for Scanner Functions Changing a Registered Name This section describes how to change a registered name. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the registered name you want to change. Press the name key, or enter the registered number using the number keys.
  • Page 215: Deleting A Registered Name

    Registering Names Deleting a Registered Name This section describes how to delete a registered name. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Press [Delete]. Select the name you want to delete. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address.
  • Page 216: Authentication Information

    Registering Addresses and Users for Scanner Functions Authentication Information This section describes the procedure for authenticating a user code. Important ❒ The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code be- come invalid.
  • Page 217: Registering A User Code

    Authentication Information Registering a User Code This section describes how to register a user code. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Press the name whose code is to be registered, or enter the registered num- ber using the number key.
  • Page 218: Changing A User Code

    Registering Addresses and Users for Scanner Functions Select the functions to be used with the user code from Available Func- tions. Press [OK]. To continue registering user codes, repeat the procedure from step Press [Exit]. Press the {User Tools/Counter} key. Note ❒...
  • Page 219 Authentication Information Check that [Program / Change] is selected. Select the user whose user code you want to change. Press the name key, or enter the registered number using the number keys. If you press [Search], you can search by the registered name, user code, folder name, or e-mail address.
  • Page 220: Deleting A User Code

    Registering Addresses and Users for Scanner Functions Deleting a User Code This section describes how to delete registered user code. Important ❒ After clearing the user code, the counter is automatically cleared. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected.
  • Page 221: Displaying The Counter For Each User

    Authentication Information Press the {User Tools/Counter} key. Note ❒ To delete a name from the Address Book entirely, see “Deleting a Regis- tered Name”. Reference p.121 “Deleting a Registered Name” Displaying the Counter for Each User This section describes how to display the counter for each user. Press [System Settings].
  • Page 222: Printing The Counter For Each User

    Registering Addresses and Users for Scanner Functions Printing the Counter for Each User This section describes how to print the counter for each user. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select a user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page.
  • Page 223: Printing The Counter For All Users

    Authentication Information Select the function usage you want to print from [Copier Counter], [Printer Counter], [Scanner Counter], and [Total Prints]. Press [Print]. Printing the Counter for All Users This section describes how to print the counter for all users. Press [System Settings]. Press [Administrator Tools].
  • Page 224: Clearing The Number Of Prints

    Registering Addresses and Users for Scanner Functions Clearing the Number of Prints This section describes how to clear the counter. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the user code to clear. To clear the number of prints made under a user code, select the user code from the left side of the display.
  • Page 225 Authentication Information Press [OK]. Press [Exit]. Press the {User Tools/Counter} key.
  • Page 226: E-Mail Destination

    Registering Addresses and Users for Scanner Functions E-mail Destination This section describes the procedure for registering, changing, and deleting E- mail Destination. Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan files from scanner function by e-mail. •...
  • Page 227 E-mail Destination Press [E-mail]. Press [Change] under "E-mail Address". Enter the e-mail address, and then press [OK]. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Note ❒ You can enter up to 128 characters for the e-mail address. ❒ To register the name, see Registering Names”. Reference p.118 “Registering Names”...
  • Page 228: Changing An E-Mail Destination

    Registering Addresses and Users for Scanner Functions Changing an E-mail Destination This section describes how to change an e-mail destination. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to change. Press the name key, or enter the registered number using the number keys.
  • Page 229: Deleting An E-Mail Destination

    E-mail Destination Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” p.133 “Using the e-mail address as the sender” "Entering Text", About This Machine Deleting an E-mail Destination This section describes how to delete an e-mail destination.
  • Page 230 Registering Addresses and Users for Scanner Functions Press the {User Tools/Counter} key. Note ❒ To delete the name, key display, and title, see “Deleting a Registered Name”. Reference p.121 “Deleting a Registered Name”...
  • Page 231: Registering Folders

    Registering Folders Registering Folders This section describes the procedure for registering, changing, and deleting folders. By registering a shared folder, you can send scan files to it directly. There are three types of protocol you can use: • SMB For sending files to shared Windows folders. •...
  • Page 232: Using Smb To Connect

    Registering Addresses and Users for Scanner Functions Using SMB to Connect This section describes the procedure for registering, changing, and deleting SMB folders. Note ❒ To register a folder in an FTP server, see “Using FTP to Connect”. ❒ To register a folder in an NetWare server, see “Using NCP to Connect”. Reference p.145 “Using FTP to Connect”...
  • Page 233 Registering Folders Press [Auth. Info], and then press [TNext]. Press [Specify Other Auth. Info] on the right side of Folder Authentication. When [Do not Specify] is selected, the SMB User Name and SMB Password that you have specified in Default User Name / Password (Send) of File Transfer settings applies.
  • Page 234 Registering Addresses and Users for Scanner Functions Press [Exit]. Press the {User Tools/Counter} key. Note ❒ To register the name, see Registering Names”. ❒ You can enter up to 64 characters for the user name. ❒ You can enter up to 64 characters for the password. ❒...
  • Page 235 Registering Folders Locating the SMB folder using Browse Network This section describes how to locate the SMB folder using Browse Network. Press [Browse Network]. The client computers sharing the same network as the machine appear. If you have already specified your user name and password in steps 7 to 13 on "Registering a SMB Folder", the Network display only lists client comput- ers you are authorized to access.
  • Page 236 Registering Addresses and Users for Scanner Functions Changing a SMB Folder This section describes how to change settings of the registered SMB folder. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to change.
  • Page 237 Registering Folders Changing the registered SMB folder This section describes how to change the registered SMB folder. Press [Change] under "Path". Enter the New path where the folder is located, and then press [OK]. You can also use Browse Network to specify a new folder. For details, see "Lo- cating the SMB folder using Browse Network".
  • Page 238 Registering Addresses and Users for Scanner Functions Deleting a SMB folder This section describes how to delete the registered SMB folder. [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys.
  • Page 239: Using Ftp To Connect

    Registering Folders Using FTP to Connect This section describes the procedure for registering, changing, and deleting FTP folders. Note ❒ To register a shared folder configured in Windows, see “Using SMB to Con- nect”. ❒ To register a folder in an NetWare server, see “Using NCP to Connect”. Reference p.138 “Using SMB to Connect”...
  • Page 240 Registering Addresses and Users for Scanner Functions Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [Folder]. Press [FTP].
  • Page 241 Registering Folders Press the {User Tools/Counter} key. Note ❒ To register the name, see Registering Names”. ❒ You can enter up to 64 characters for the user name. ❒ You can enter up to 64 characters for the password. ❒ You can enter a server name using up to 64 characters. ❒...
  • Page 242 Registering Addresses and Users for Scanner Functions Press the {User Tools/Counter} key. Note ❒ To change the name, key display and title, see “Changing a Registered Name”. Reference p.120 “Changing a Registered Name” p.148 “Changing the protocol” Changing the protocol This section describes how to change the protocol.
  • Page 243 Registering Folders Deleting a FTP Folder This section describes how to delete the registered FTP folder. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys.
  • Page 244: Using Ncp To Connect

    Registering Addresses and Users for Scanner Functions Using NCP to Connect This section describes the procedure for registering, changing, and deleting NCP folders. Note ❒ To register a shared folder configured in Windows, see “Using SMB to Connect” ❒ To register a folder in an FTP server, see “Using FTP to Connect” Reference p.138 “Using SMB to Connect”...
  • Page 245 Registering Folders Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [Folder]. Press [NCP]. Select "Connection Type". If you want to specify a folder in an NDS tree, press [NDS].
  • Page 246 Registering Addresses and Users for Scanner Functions Locate the NCP folder manually This section describes how to locate the NCP folder manually. Press [Change] under "Path". Enter the path where the folder is located. Press [OK]. Note ❒ If you set "Connection Type" to [NDS], and if the NDS tree name is "tree", the name of the context including the volume is "context", the volume name is "volume"...
  • Page 247 Registering Folders Changing a NCP folder This section describes how to change the registered NCP folder. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the user of the registered folder you want to change. Press the name key, or enter the registered number using the number keys.
  • Page 248 Registering Addresses and Users for Scanner Functions Changing the registered NCP folder This section describes how to change the register NCP folder. Press [Change] under "Path". Enter the path where the folder is located, and then press [OK]. You can also use Browse Network to specify a new folder. For details, see "Lo- cating the NCP folder manually".
  • Page 249 Registering Folders Deleting an NCP Folder This section describes how to delete the registered NCP folder. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select a user of the folder you want to delete. Press the name key, or enter the registered number using the number keys.
  • Page 250: Registering Names To A Group

    Registering Addresses and Users for Scanner Functions Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management of e-mail addresses and folders for each group. To add names to a group, the groups must be registered beforehand.
  • Page 251 Registering Names to a Group Press [Change] under "Group Name". Enter the group name, and then press [OK]. The key display name is set automatically. When you want to change the key display, press [Change] under "Key Dis- play". Enter the key display, and then press [OK]. Press the title key under Select Title, if necessary.
  • Page 252: Registering Names To A Group

    Registering Addresses and Users for Scanner Functions Registering Names to a Group This section describes how to register names to a registered group. You can put names that have been registered in the Address Book into a group. When registering new names, you can also register groups at the same time. Press [System Settings].
  • Page 253 Registering Names to a Group Select a group to which you want to add the name to. The group key that you have selected becomes highlighted, and the name is added to it. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key.
  • Page 254: Adding A Group To Another Group

    Registering Addresses and Users for Scanner Functions Adding a Group to Another Group This section describes how to add a group to another group. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Select the group that you want to put into another group.
  • Page 255 Registering Names to a Group Select the group which you want to add to. The group key that you have selected becomes highlighted, and the group is added to it. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key.
  • Page 256: Displaying Names Registered In A Group

    Registering Addresses and Users for Scanner Functions Displaying Names Registered in a Group This section describes how to display names registered in a group. You can check the names or groups registered in each group. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group].
  • Page 257: Removing A Name From A Group

    Registering Names to a Group Removing a Name from a Group This section describes how to remove a name from a group. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name to remove from a group. Press the name key, or enter the registered number using the number keys.
  • Page 258: Deleting A Group Within Another Group

    Registering Addresses and Users for Scanner Functions Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Deleting a Group Within Another Group This section describes how to delete a group within another group. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected.
  • Page 259 Registering Names to a Group Select the group that you want to delete from. The group key is deselected and the group is deleted from it. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key.
  • Page 260: Changing A Group Name

    Registering Addresses and Users for Scanner Functions Changing a Group Name This section describes how to change a group name. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to change.
  • Page 261: Deleting A Group

    Registering Names to a Group Press [Exit]. Press the {User Tools/Counter} key. Deleting a Group This section describes how to delete a group Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Press [Delete]. Press a group key you want to delete.
  • Page 262: Registering A Protection Code

    Registering Addresses and Users for Scanner Functions Registering a Protection Code This section describes how to register a Protection Code. You can stop sender's names or folders being accessed by setting a protection code. You can use this function to protect the following: •...
  • Page 263 Registering a Protection Code Press [Protection]. Press [Destination] or [Sender] under "Use Name as". Both [Destination] and [Sender] can be selected at the same time. Press [Folder Destination] or [Sender] under "Protection Object". Both [Folder Destination] and [Sender] can be selected at the same time. Press [Change] under "Protection Code".
  • Page 264: Registering A Protection Code To A Group User

    Registering Addresses and Users for Scanner Functions Registering a Protection Code to a Group User This section describes how to register a Protection Code to a Group User. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected.
  • Page 265 Registering a Protection Code Press [Exit]. Press the {User Tools/Counter} key. Note ❒ Specify a protection code of up to eight digits. You can also specify “Pro- tection” without specifying a protection code.
  • Page 266: Registering Smtp And Ldap Authentication

    Registering Addresses and Users for Scanner Functions Registering SMTP and LDAP Authentication This section describes how to register SMTP and LDAP Authentication. SMTP Authentication This section describes how to register SMTP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an SMTP server.
  • Page 267 Registering SMTP and LDAP Authentication Press [Change] under "Login User Name". Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. [OK].
  • Page 268: Ldap Authentication

    Registering Addresses and Users for Scanner Functions LDAP Authentication This section describes how to register LDAP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an LDAP server. To use an LDAP server, you need to program it beforehand.
  • Page 269 Registering SMTP and LDAP Authentication Press [Change] under "Login User Name". Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [OK].
  • Page 270 Registering Addresses and Users for Scanner Functions...
  • Page 271: Other User Tools

    7. Other User Tools Initial settings allow you switch the language as well as checking the number of printed papers by displaying the counter. For the details on how to access re- spective settings, see "Accessing User Tools". Changing the Display Language You can change the language used on the display.
  • Page 272: Inquiry

    Other User Tools Inquiry The inquiry function lets you check the telephone numbers to contact for repairs, or ordering consumables such as toner. Be sure to contact your service engineer to verify the following: ❖ Consumables • Telephone No. to order •...
  • Page 273 Inquiry Press the {Start} key. Inquiry information prints out. Press [Exit] twice. Reference p.3 “Accessing User Tools”...
  • Page 274: Counter

    Other User Tools Counter Displaying the Total Counter You can display the total counter value used for all functions. Press [Counter]. To print a counter list, press [Print Counter List]. Press the {Start} key. A counter list prints out. Reference p.3 “Accessing User Tools”...
  • Page 275: Appendix

    8. Appendix Copyrights expat • The software including controller, etc. (hereinafter "software") installed on this product uses the expat under the conditions mentioned below. • The product manufacturer provides warranty and support to the software of the product including the expat, and the product manufacturer makes the ini- tial developer and copyright holder of the expat, free from these obligations.
  • Page 276: Netbsd

    Appendix NetBSD 1. Copyright Notice of NetBSD For all users to use this product: This product contains NetBSD operating system: For the most part, the software constituting the NetBSD operating system is not in the public domain; its authors retain their copyright. The following text shows the copyright notice used for many of the NetBSD source code.
  • Page 277 Copyrights • This product includes software developed by the University of California, Berkeley and its contributors. • This product includes software developed by Jonathan R. Stone for the NetB- SD Project. • This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
  • Page 278: Sablotron

    Appendix Sablotron Sablotron (Version 0.82) Copyright © 2000 Ginger Alliance Ltd. All Rights Re- served a) The application software installed on this product includes the Sablotron soft- ware Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by the product manufacturer. The original code of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of the Sa- blotron 0.82 has been derived from such original code provided by Ginger Alli- ance Ltd.
  • Page 279: Sasl

    Copyrights SASL CMU libsasl Tim Martin Rob Earhart Rob Siemborski Copyright © 2001 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modifica- tion, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 280: Md4

    Appendix Copyright © 1990-2, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
  • Page 281: Samba(Ver 3.0.4)

    Copyrights Samba(Ver 3.0.4) For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to as Samba 3.0.4). Copyright © Andrew Tridgell 1994-1998 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation;...
  • Page 282: Open Ssl

    Appendix Open SSL Copyright © 1998-2004 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modifica- tion, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 283 Copyrights This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
  • Page 284 Appendix IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT- TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GEN- ERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCU-...
  • Page 285 Copyrights 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specif- ic prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 286 Appendix THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EX- PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPE- CIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 287: Open Ldap

    Copyrights THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSE- QUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE- MENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 288 Appendix THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WAR- RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRAN- TIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDEN- TAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD-...
  • Page 289: Libtiff

    Copyrights LibTIFF TIFF emulation software includes freeware TIFF libraries developed by Sam Lef- fler and Silicon Graphics, Inc.. In accordance with the conditions of distribution, the copyright notice concerning the TIFF library part is shown below. Copyright © 1988, 1989, 1990, 1991 Sam Leffler Copyright ©...
  • Page 290: Index

    INDEX Copier / Document Server Features / Input/Output Accessing User Tools Copier / Document Server Features / Address Book: Change Order Reproduction Ratio Address Book: Edit Title Copier / Document Server Features / Address Book: Program / Change / Stamp Delete Group Copies Address Book: Program / Change /...
  • Page 291 Erase Original Shadow in Combine Error Log Job End Call Ethernet Speed Extended Security Key Counter Management Key Repeat Feed Start Method File Transfer / System Settings Fine Ratio Adjustment Copier LAN Type Printer LDAP Search Firmware Version List / Test Print Lock Fixed USB Port List / Test Print / Printer Features Fold Width Fine Adjustment...
  • Page 292 Page Numbering Reception Protocol Page Numbering in Combine (Page Reduce / Enlarge Ratio Priority Numbering) Reduce Recovery Time Page Numbering Initial Letter Reproduction Ratio Panel Key Sound Reproduction Ratio / Copier / Document Panel Off Timer Server Features Paper Thickness Reserved Job Waiting Time Paper Bypass Resolution...
  • Page 293 System / Printer Features System Settings / Administrator Tools System Settings / File Transfer System Settings / General Features System Settings / Timer Settings System Settings / Tray Paper Settings System Status/ Job List Display Time Timer Settings / System Settings Transfer Log Setting Transmission Speed Tray Paper Settings / System Settings...
  • Page 294 B286-7807...
  • Page 295 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. Trademarks ® ® ® Microsoft , Windows and Windows NT are registered trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 296 Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7807...
  • Page 297 Operating Instructions Troubleshooting When the Machine Does Not Operate As Wanted Troubleshooting When Using the Copy Function Troubleshooting When Using the Printer Function Troubleshooting When Using the Scanner Function Adding Paper and Toner Clearing Misfeeds Remarks Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 298 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice.
  • Page 299 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒...
  • Page 300 ❖ Network Guide Explains how to configure and operate the machine in a network environ- ment, and use the software provided. ❖ Other manuals • PostScript3 Supplement • UNIX Supplement • Manuals for DeskTopBinder Lite • DeskTopBinder Lite Setup Guide •...
  • Page 301 TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 Symbols ........................1 Names of Major Options ....................2 1. When the Machine Does Not Operate As Wanted Indicators........................3 Panel Tone......................4 Checking Machine Status and Settings...............5 When an Indicator to the Right of a Function Key Is Lit ........8 When You Have Problems Operating the Machine..........9 When a Job Is Not Performed................14 2.
  • Page 302 5. Adding Paper and Toner Loading Paper ......................57 Loading the Paper Roll.....................59 Loading Cut Paper ....................60 Changing the Paper Size..................61 Changing the Paper Size in the Paper Roll Tray .............61 Changing the Paper Size in the Cut Paper Tray ............63 Adding Toner......................64 Inserting Toner ......................65 Sending Scanned Documents When Toner Has Run Out ........66...
  • Page 303: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the “Safety Information” section of About This Machine. Indicates important safety notes.
  • Page 304: Names Of Major Options

    Names of Major Options Major options of this machine are referred to as follows in this manual: • Roll Feeder Type 240A → Paper roll tray 1 • Roll Feeder Type 240B → Paper roll tray 2 • Paper Cassette Type 240 → Cut paper tray •...
  • Page 305: When The Machine Does Not Operate As Wanted

    1. When the Machine Does Not Operate As Wanted This chapter explains basic troubleshooting procedures that are applicable to all functions of this machine. Indicators This section explains the Indicators displayed when the machine requires the user to remove misfed paper, to add paper or to perform other procedures. x: Misfeed indicator Appears when a misfeed occurs.
  • Page 306: Panel Tone

    When the Machine Does Not Operate As Wanted Panel Tone The following table explains the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Cause Two long beeps. Machine has warmed up.
  • Page 307: Checking Machine Status And Settings

    Checking Machine Status and Settings Checking Machine Status and Settings You can check the machine's system status. ❖ Maintenance Info You can check the following items under [Maintenance Info]: • [Remaining Toner] Displays the amount of remaining toner. • [Paper Tray] Displays the paper type and size loaded in the paper tray.
  • Page 308 When the Machine Does Not Operate As Wanted ❖ Inquiry You can check the following items under [Inquiry]: • [Machine Repairs] Displays the machine number and contact number that are required for service. • [Sales Representative] Displays the sales representative's telephone number. •...
  • Page 309 Checking Machine Status and Settings Note ❒ [Original Misfeed], [Paper Misfeed], and [Cover Open] appear only when these errors occur. ❒ For details about how to locate and remove misfeeds, see “Locating Jammed Paper” or “Removing Jammed Paper”. Reference p.68 “Locating Jammed Paper” p.67 “Removing Jammed Paper”...
  • Page 310: When An Indicator To The Right Of A Function Key Is Lit

    When the Machine Does Not Operate As Wanted When an Indicator to the Right of a Function Key Is Lit When an indicator to the right of a function key lights up, press the correspond- ing function key. Then, follow the instructions displayed on the control panel. ATK021S If an error occurs in the function you are using, check the message that appears on the control panel, and then refer to “When a Message is Displayed”...
  • Page 311: When You Have Problems Operating The Machine

    When You Have Problems Operating the Machine When You Have Problems Operating the Machine The following chart gives explanations of common problems and messages. If other messages appear, follow the instructions displayed. Important ❒ Check the contact address and Serial No. of Machine shown in the Service Call message (L), and then contact your service representative.
  • Page 312 When the Machine Does Not Operate As Wanted Problem Cause Solution This message appears Wait for the machine to get ready. “ Please wait. ” ap- when you change the pears. toner cartridge. The scanned originals • Press [Store File] to store pages that “...
  • Page 313 When You Have Problems Operating the Machine Problem Cause Solution Original images are You may have loaded Load paper correctly. Load paper into printed on the reverse the paper incorrectly. the cut paper tray print side down, and side of the paper. into the bypass tray print side up.
  • Page 314: Document Server

    When the Machine Does Not Operate As Wanted ❖ Document Server Problem Cause Solution The number of scanned • To store scanned pages as a file, press “ Exceeded max. pages exceeds the capac- [Store File]. Scanned data is stored as number of pages ity per file of the Docu- a file in the Document Server.
  • Page 315 When You Have Problems Operating the Machine Problem Cause Solution Memory frequently be- The document server Delete unnecessary files. On the file se- comes full. memory is full. lection display, select unnecessary files, and then press [Delete File]. If this does not increase available memory, do the following.
  • Page 316: When A Job Is Not Performed

    When the Machine Does Not Operate As Wanted When a Job Is Not Performed If you cannot execute a function, it may be that the machine is being held up by another function. If you cannot execute a function, terminate any other functions currently active, and then try executing the function again.
  • Page 317 When a Job Is Not Performed Mode after you select Mode before you select Operations for × × × × × Copying × × → × × × → → Copying → → Printer Data Reception → Printing × × Scanner Operations for scanning Scanning...
  • Page 318 When the Machine Does Not Operate As Wanted Note ❒ If the machine is capable of executing multiple functions simultaneously, specify which function should have priority in “Print Priority”. This setting is factory-preset to “Display Mode”. For setting of Printing Priority Function, see “General Features”, General Settings Guide.
  • Page 319: Troubleshooting When Using The Copy Function

    2. Troubleshooting When Using the Copy Function This chapter explains likely causes of and possible solutions for copier function problems. When a Message Appears This section explains the machine's main messages. If other messages appear, follow the instructions they contain. Important ❒...
  • Page 320 Troubleshooting When Using the Copy Function Message Cause Solution The rotate sort function You cannot use rotate sort with A0 (E), B4 Rotate Sort is does not support the size JIS, A4 (A), and custom size paper. See not available of the scanned original.
  • Page 321 When a Message Appears Message Cause Solution The machine cannot per- Contact the administrator. Authentication form authentication. has failed. You have tried to delete Files can be deleted by the person who The selected files without the authori- created the file. To delete a file which file(s) contained ty to do so.
  • Page 322: When You Cannot Make Clear Copies

    Troubleshooting When Using the Copy Function When You Cannot Make Clear Copies This section explains likely causes of and possible solutions for unclear copies. Problem Cause Solution Black or white streaks ap- The exposure glass or Clean the exposure glass or platen plate. pear on copies.
  • Page 323 When You Cannot Make Clear Copies Problem Cause Solution Image density is uneven. The original has areas of When using Repeat Copy with originals solid color, or Posi- that have areas of solid color, set the tive/Negative is selected number of originals as follows: A0 - A2 when copying multiple (E - C): 1 sheet, A3 (B) or smaller: 3 sheets.
  • Page 324 Troubleshooting When Using the Copy Function Problem Cause Solution When D is blinking, ton- White lines appear. Add toner. See p.64 “Adding Toner”. er is beginning to run out. Copies are blank. The original is not set When using the exposure glass, face the correctly.
  • Page 325: When You Cannot Make Copies As Wanted

    When You Cannot Make Copies As Wanted When You Cannot Make Copies As Wanted This section explains likely causes of and possible solutions for unclear copies. ❖ Basic Problem Cause Solution Misfeeds occur frequently. The number of sheets Load paper only as high as the upper loaded in the cut paper limit markings on the side fences of the tray exceeds the capacity...
  • Page 326 Troubleshooting When Using the Copy Function Problem Cause Solution Cannot scan originals on Originals on different se- Scan the originals on each series separately. mixed A series and JIS B ries of paper cannot be series paper continuously. scanned continuously at the same time.
  • Page 327 When You Cannot Make Copies As Wanted Problem Cause Solution In Erase Border, Erase In- Originals are not Place the originals correctly. side, or Erase Outside scanned correctly. mode, parts of the origi- nal image are not copied. Parts of the image are not Print Position Adjust- Cancel Print Position Adjustment or Mar- copied.
  • Page 328: When Memory Is Full

    Troubleshooting When Using the Copy Function When Memory Is Full This section explains likely causes of and possible solutions for problems related to full memory. Message Cause Solution The scanned originals Press [Print] to copy scanned originals Memory is full. exceeds the number of and cancel the scanning data.
  • Page 329: Troubleshooting When Using The Printer Function

    3. Troubleshooting When Using the Printer Function This chapter explains likely causes of and possible solutions for printer function problems. When a Message Appears During Installation of the Printer Driver This section explains what to do if a message appears when installing the printer driver.
  • Page 330: Windows Xp Professional, Windows Server 2003

    Troubleshooting When Using the Printer Function Windows XP Professional, Windows Server 2003 This section explains the procedure under Windows XP Professional or Windows Server 2003. On the [Start] menu, click [Printers and Faxes]. Click [Add a printer]. Follow the instructions in [Add Printer Wizard]. If the printer driver is on a CD-ROM, the location of the RPCS printer driver is \DRIVERS\RPCS\WIN2K_XP.
  • Page 331: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section explains how to troubleshoot a problem related to USB connection. Problem Cause Solution The machine is not auto- The USB cable is not con- Disconnect the USB cable, and then turn matically recognized.
  • Page 332: When A Message Appears

    Troubleshooting When Using the Printer Function When a Message Appears This section describes the principal messages that appear on the panel display. If a message not described here appears, act according to the message. Note ❒ Before turning the main power off, see “Turning On the Power”, About This Machine.
  • Page 333: Alert Messages

    When a Message Appears Alert Messages This section describes the machine Alert messages. Message Cause Solution IEEE 802.11b interface Turn off the machine and check the in- Cannot connect unit was not inserted terface unit is inserted correctly. Then, with the wireless when the machine was turn the machine on again.
  • Page 334 Troubleshooting When Using the Printer Function Message Cause Solution Use of this function is Contact the administrator. You do not have restricted. the privileges to use this func- tion. • The login user name • Check your login user name and Authentication or password entered password.
  • Page 335: Checking The Error Log

    When a Message Appears Checking the Error Log If files could not be stored due to printing errors, identify the cause of the errors by checking the error log on the control panel. Press the {Printer} key to display the printer screen. ATK022S Press [Error Log].
  • Page 336: When You Cannot Print

    Troubleshooting When Using the Printer Function When You Cannot Print Use the following procedures if printing does not start when printing from a computer. Problem Cause Solution Printing does not start. The power is off. Check the cable is securely plugged into the power outlet and the machine.
  • Page 337 When You Cannot Print Problem Cause Solution Printing does not start. If the machine is operat- Check access point settings when in the ing in an extended wire- infrastructure mode. Depending on the less LAN, the receiver's access point, client access may be limit- MAC address may be ed by MAC address.
  • Page 338 Troubleshooting When Using the Printer Function ❖ When the machine is connected to the computer using the interface cable The following shows how to check the print port when the data-in lamp does not light up or blink. Check if the print port setting is correct. When it is connected using a parallel interface, connect it to LPT1 or LPT2.
  • Page 339: Other Printing Problems

    Other Printing Problems Other Printing Problems This section explains likely causes of and possible solutions for problems that can occur when printing from a computer. ❖ If prints are not clear Problem Cause Solution When D is blinking, The print on the en- Add toner.
  • Page 340 Troubleshooting When Using the Printer Function Problem Cause Solution Images are printed in The feed orientation Set the machine's feed orientation and the the wrong orientation. you selected and the printer driver's feed orientation accordingly. feed orientation se- See the printer driver Help. lected in the printer driver's option setup might not be the...
  • Page 341 Other Printing Problems ❖ When paper does not feed in properly Problem Cause Solution Paper is not fed from When you are using a Set the desired input tray using the printer the selected tray. Windows operating driver. See the printer driver Help. system, printer driver settings override those set using the...
  • Page 342 Troubleshooting When Using the Printer Function Problem Cause Solution It takes a long time to Processing time de- Wait for a moment. complete a print job. pends on data vol- Making the following setting on the printer ume. High volume driver may reduce the computer's workload.
  • Page 343 Other Printing Problems ❖ Other printing problems Problem Cause Solution A print instruction User Authentication • Ask the administrator for the user code. was issued from the may have been set. • Specify the user code you confirmed when computer, but print- printing from the printer driver.
  • Page 344 Troubleshooting When Using the Printer Function...
  • Page 345: When Scanning Is Not Done As Expected

    4. Troubleshooting When Using the Scanner Function This chapter explains likely causes of and possible solutions for scanner function problems. When Scanning Is Not Done As Expected This section explains causes and remedies when scan results are not as expected. Problem Cause Solution...
  • Page 346: When You Cannot Send Scanned Files

    Troubleshooting When Using the Scanner Function When You Cannot Send Scanned Files The following sections explain likely causes of and solutions for Network Deliv- ery and E-mail Sending-related problems. When Stored Files Cannot Be Accessed This section explains likely causes of and possible solutions for job access-relat- ed problems.
  • Page 347: When Stored Files Cannot Be Edited

    When You Cannot Send Scanned Files When Stored Files Cannot Be Edited This section explains likely causes of and possible solutions for the TWAIN driv- er failing to operate. Problem Cause Solution Stored files cannot be Limits have been imposed using Contact the administrator.
  • Page 348: When A Message Appears

    Troubleshooting When Using the Scanner Function When a Message Appears This section explains likely causes of and possible solutions for error messages that may appear on the machine's control panel. When a Message Appears on the Control Panel This section explains causes and remedies if an error message appears on the display of the control panel.
  • Page 349 When a Message Appears Message Cause Solution The destination list has If a destination or sender's name was al- Updating the des- been updated. ready selected, re-select it after this mes- tination list... sage disappears. Please wait. Specified desti- nation(s) or sender's name has been cleared.
  • Page 350 Troubleshooting When Using the Scanner Function Message Cause Solution The destination comput- Check whether the computer name and Cannot find the er name or folder name is the folder name for the destination are specified path. invalid. correct. Please check the settings.
  • Page 351 When a Message Appears Message Cause Solution The correct Network set- • Check the network settings of the cli- Connection with tings are not made. ent computer. the destination has failed. Check • Check that components such as the LAN cable are connected properly. the status and connection.
  • Page 352 Troubleshooting When Using the Scanner Function Message Cause Solution Transmission has failed. Allocate sufficient space. Transmission has There was not enough failed. Insuffi- free space on the hard cient memory in disk of the SMTP server, the destination FTP server, or client com- hard disk.
  • Page 353 When a Message Appears Message Cause Solution The maximum enterable Make sure the maximum number of Exceeded max. number of alphanumeric characters which can be entered, and number of alpha- characters has been exceeded. then enter it again. See “Values of Vari- numeric charac- ous Set Items for Transmission/Stor- ters.
  • Page 354 Troubleshooting When Using the Scanner Function Message Cause Solution The entered e-mail ad- Make sure the e-mail address is correct, E-mail address dress is incorrect. and then enter it again. entered is not correct. Please re-enter. Because there is not Specify whether to use the data or not.
  • Page 355: When A Message Appears On The Client Computer

    When a Message Appears Message Cause Solution The scanned data ex- Specify the scan size and resolution Exceeded max. ceeded maximum data again. Note that it may not be possible to data capaci- capacity. scan very large originals at a high reso- ty.Check scanning lution.
  • Page 356 Troubleshooting When Using the Scanner Function Message Cause Solution An original was not Load an original within the time limit Standby time loaded within the speci- specified in [Standby Time]. reached. fied time limit. An unrecoverable error has Contact your service representative. Please call your occurred in the machine.
  • Page 357 When a Message Appears Message Cause Solution Scanner memory is • Reset the scan size. Insufficient mem- insufficient. ory.Reduce the • Lower the resolution. scanning area. • Set with no compression. See TWAIN Driver help. The problem may be due to the follow- ing cause: •...
  • Page 358 Troubleshooting When Using the Scanner Function...
  • Page 359: Adding Paper And Toner

    5. Adding Paper and Toner This chapter explains troubleshooting procedures that are applicable to all the machine's functions. Loading Paper This section explains what to do when paper runs out and needs reloading. R CAUTION: • Be careful when replacing the roll paper or removing misfed paper by follow- ing the operating instructions properly.
  • Page 360 Adding Paper and Toner Note ❒ If the original hanger (optional) is installed, remove it before pulling out the paper roll tray or cut paper tray. ❒ For paper types and sizes that can be loaded in the paper roll tray and cut pa- per tray, see “Recommended Paper Sizes and Types”, About This Machine.
  • Page 361: Loading The Paper Roll

    Loading Paper Loading the Paper Roll The following procedure explains loading the paper roll. ATK003S Note ❒ When you use the printer function, set the paper volume again after loading the paper roll. See “Tray Paper Settings”, General Settings Guide. ❒...
  • Page 362: Loading Cut Paper

    Adding Paper and Toner Reference “Tray Paper Settings”, General Settings Guide Loading Cut Paper The following procedure explains loading cut paper. ATK004S Note ❒ Fan the paper before loading. ❒ Straighten curled or warped paper before loading. ❒ Extend the side-end fences when changing to a larger paper size such as A3. See “Changing the Paper Size in the Cut Paper Tray”.
  • Page 363: Changing The Paper Size

    Changing the Paper Size Changing the Paper Size This section explains how to change a paper size. Procedures for changing the paper size differ depending on the tray. Make sure you are following the appropriate procedure before you begin. Note ❒...
  • Page 364 Adding Paper and Toner Setting the roll holder The following procedure explains setting the roll holder. ATK006S Note ❒ For procedures about loading the paper, see “Loading Paper”. ❒ Confirm paper width using the paper roll tray's scale. Reference p.57 “Loading Paper”...
  • Page 365: Changing The Paper Size In The Cut Paper Tray

    Changing the Paper Size Changing the Paper Size in the Cut Paper Tray The following procedure explains how to change a paper size in the cut paper tray. ATK007S Note ❒ This procedure is required for loading A3K, B4 JISK, 11" × 17"K, or 12" × 18"K size paper.
  • Page 366: Adding Toner

    Adding Paper and Toner Adding Toner This section explains adding and storing toner. R WARNING: • Do not incinerate used toner or toner containers. Toner dust might ig- nite when exposed to an open flame. Dispose of used toner containers in accordance with local regulations.
  • Page 367: Inserting Toner

    Adding Toner Note ❒ You can check name of the required toner name and the replacement proce- DAdd Toner dure using the “ ” screen. ❒ Press [System Status] to check contact number where you can order supplies. See “Checking Machine Status and Settings”. Reference p.5 “Checking Machine Status and Settings”...
  • Page 368: Sending Scanned Documents When Toner Has Run Out

    Adding Paper and Toner Sending Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send scanned documents. Make sure that the machine is in scanner mode.
  • Page 369: Clearing Misfeeds

    6. Clearing Misfeeds This chapter explains what to do when paper or originals misfeed (become jammed inside the machine). Removing Jammed Paper R CAUTION: • The fusing section of this machine might be very hot. Caution should be tak- en when removing misfed paper. R CAUTION: •...
  • Page 370: Locating Jammed Paper

    Clearing Misfeeds Locating Jammed Paper If a misfeed happens, remove the misfed paper or original by following the procedures shown on the diagrams on the original cover, paper output exit cover, or paper roll tray. A misfeed has occurred in the place corresponding to the letter displayed on the control panel.
  • Page 371: Removing Jammed Paper

    Removing Jammed Paper Removing Jammed Paper The following procedure explains how to remove jammed paper. Important ❒ The internal parts of the machine may be hot. Wait for the fusing unit to cool down before clearing a paper jam in the unit. ❒...
  • Page 372 Clearing Misfeeds When A2 is lit ATK011S...
  • Page 373 Removing Jammed Paper When B is lit ATK012S When C is lit ATK013S When P is lit ATK014S...
  • Page 374 Clearing Misfeeds When N1 - N7 is lit ❖ When N1 is lit ATK015S ❖ When N3 is lit ATK016S ❖ When N5 is lit ATK017S...
  • Page 375 Removing Jammed Paper ❖ When N7 is lit ATK018S...
  • Page 376 Clearing Misfeeds...
  • Page 377: Remarks

    7. Remarks This chapter describes how to maintain and operate the machine. Where to Put Your Machine This section provides precautions for installation, movement and disposal. Machine Environment Choose your machine's location carefully. Environmental conditions greatly affect its performance. Moving The following describes precautions when moving the machine.
  • Page 378 Remarks ❒ Do not take off the holding stand. ❒ Protect the machine from strong shocks. Impact can damage the hard disk and cause stored files to be lost. As a precautionary measure, files should be copied to another computer. Note ❒...
  • Page 379 Where to Put Your Machine Environments to avoid • Locations exposed to direct sunlight or other sources of strong light (more than 1,500 lux). • Locations directly exposed to cool air from an air conditioner or heated air from a heater. (Sudden temperature changes can cause condensation to form inside the machine.) •...
  • Page 380: Power Connection

    Remarks Power Connection The following explains power supply. R WARNING: • Connect the machine only to the power source described on the inside front cover of this manual. Connect the power cord directly into a wall outlet and do not use an extension cord. •...
  • Page 381: Maintaining Your Machine

    Maintaining Your Machine Maintaining Your Machine If the exposure glass, or platen plate is dirty, copy clarity may be reduced. Clean these parts if they are dirty. Important ❒ Do not use chemical cleaners or organic solvents, such as thinner or benzene. If such substances get inside the machine or melt plastic parts, a failure might occur.
  • Page 382 Remarks Wipe the platen plate with a soft, dry cloth. ATJ040S Wipe the original feed guides with a soft, dry cloth. ATJ041S Close the original cover gently. ATJ042S Note ❒ If there is paper dust or fluff inside, remove it.
  • Page 383: Cleaning The Main Unit

    Maintaining Your Machine Cleaning the Main Unit Clean off toner that may have collected on the imaging area. Important ❒ Do not leave the main unit more than 10 minutes, otherwise copy quality may deteriorate. Lift the main unit opening levers on either side and open the main unit. ATJ043S Wipe it with a soft, dry cloth.
  • Page 384: Index

    INDEX Access to the machine If prints are not clear Adding Paper If USB Connection Fails Adding Paper and Toner Indicators Adding Toner Indicator to the Right of a Function Key Is Lit Alert Messages Inquiry Inserting Toner Cannot Browse the Network to Send a Scan File Job Is Not Performed Cannot Make Clear Copies...
  • Page 385 Panel Tone Toner Power Connection TWAIN Printer Function TWAIN Driver Cannot Be Started Problems Operating the Machine Put Your Machine Used Toner Remarks Removing Jammed Paper When A1 is lit Removing the roll holder When A2 is lit When B is lit When C is lit Scanner Function When N1 is lit...
  • Page 386 B286-7757...
  • Page 387 In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. c means STAND BY. In accordance with IEC 60417, this machine uses the following symbols for the anti-humidity heater switch: a means POWER ON.
  • Page 388 Type for 2404WD/GWD2004/LW324/Aficio MP W2400 Type for 2406WD/GWD2006/LW326/Aficio MP W3600 EN USA B286-7757...
  • Page 389 Operating Instructions Security Reference Getting Started Authentication and its Application Preventing Information Leaks Managing Access to the Machine Enhanced Network Security Specifying the Extended Security Functions Troubleshooting Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 390 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 391 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 392 ❖ Network Guide Explains how to configure and operate the machine in a network environ- ment, and use the software provided. ❖ Other manuals • Manuals for This Machine • Safety Information • Quick Reference Copy Guide • Quick Reference Printer Guide •...
  • Page 393 TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 Symbols ........................1 1. Getting Started Enhanced Security....................3 Glossary ........................4 Setting Up the Machine....................5 Security Measures Provided by this Machine............. 7 Using Authentication and Managing Users ..............7 Preventing Information Leaks ..................8 Limiting and Controlling Access .................9 Enhanced Network Security..................10...
  • Page 394 3. Preventing Information Leaks Printing a Confidential Document ..............81 Choosing a Locked Print file ..................81 Printing a Locked Print File ..................82 Deleting Locked Print Files ..................84 Changing Passwords of Locked Print Files..............85 Unlocking Locked Print Files..................87 Specifying Access Permission for Stored Files ..........88 Assigning Users and Access Permission for Stored Files ........89 Specifying Access Privileges for Files Stored using the Scanner Function .....92 Assigning the User and the Access Permission for the User’s Stored Files ....95...
  • Page 395 6. Specifying the Extended Security Functions Changing the Extended Security Functions ........... 153 Changing the Extended Security Functions ............153 Settings ........................155 Other Security Functions ..................160 Scanner Function ....................160 Limiting Machine Operation to Customers Only ..........161 Settings ........................161 7.
  • Page 396 User Settings...................... 199 Copier / Document Server Features ..............200 Printer Functions ....................202 Scanner Features....................204 System Settings .....................205 Web Image Monitor Setting..................210 Functions That Require Options ..............221 INDEX....................... 222...
  • Page 397: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Ma- chine.
  • Page 399: Getting Started

    1. Getting Started Enhanced Security This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 400: Glossary

    Getting Started Glossary ❖ Administrator There are four types of administrator: machine administrator, network ad- ministrator, file administrator, and user administrator. We recommend only one person take each administrator role. A single administrator can perform the tasks of multiple administrators. Basically, administrators make machine settings and manage the machine;...
  • Page 401: Setting Up The Machine

    Enhanced Security Setting Up the Machine If you want higher security, make the following setting before using the ma- chine: Turn the machine on. Press the {User Tools/Counter} key. Press [System Settings]. Press [Interface Settings]. Specify IP Address. For details, see the General Settings Guide. Connect the machine to the network.
  • Page 402 Getting Started Enter the administrator’s user name and password. During steps , the administrator’s default account (user name: admin, password: blank) in unencrypted form will be vulnerable to network inter- ception, and this account may be used for breaking into the machine over the network.
  • Page 403: Security Measures Provided By This Machine

    Security Measures Provided by this Machine Security Measures Provided by this Machine Using Authentication and Managing Users ❖ Enabling Authentication To control administrators’ and users’ access to the machine, perform admin- istrator authentication and user authentication using login user names and login passwords.
  • Page 404: Preventing Information Leaks

    Getting Started Preventing Information Leaks ❖ Printing confidential files Using the printer’s Locked Print, you can store files in the machine as confi- dential files and then print them. You can print a file using the machine’s con- trol panel and collect it on the spot to prevent others from seeing it. Reference For details, see p.81 “Printing a Confidential Document”.
  • Page 405: Limiting And Controlling Access

    Security Measures Provided by this Machine ❖ Managing Log Files You can improve data security by deleting log files stored in the machine. By transferring the log files, you can check the history data and identify unau- thorized access. To transfer the log data, the log collection server is required. Reference For details, see p.127 “Managing Log Files”.
  • Page 406: Enhanced Network Security

    Getting Started Enhanced Network Security ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings. Reference For details, see p.131 “Preventing Unauthorized Access”. ❖...
  • Page 407: Authentication And Its Application

    2. Authentication and its Application Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 408: Administrators

    Authentication and its Application Administrators There are four types of administrator: machine administrator, network adminis- trator, file administrator, and user administrator. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administra- tor.
  • Page 409: User

    Administrators and Users User Users are managed using the personal information in the machine’s address book. By enabling user authentication, you can allow only people registered in the ad- dress book to use the machine. Users can be managed in the address book by the user administrator.
  • Page 410: The Management Function

    Authentication and its Application The Management Function The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you cannot only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine.
  • Page 411: About Administrator Authentication

    The Management Function About Administrator Authentication There are four types of administrator: user administrator, machine administra- tor, network administrator, and file administrator. AYJ002S User Administrator File Administrator This administrator manages personal in- This administrator manages permission formation in the address book. You can to access stored files.
  • Page 412: About User Authentication

    Authentication and its Application About User Authentication This machine has an authentication function to prevent unauthorized access. By using login user name and login password, you can specify access limits for individual users and groups of users. AYJ001S User Access Limit A user performs normal operations on Using authentication, unauthorized us- the machine, such as copying and print-...
  • Page 413: Enabling Authentication

    Enabling Authentication Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor or user authentication using login user names and passwords. To perform authentication, the authentication function must be enabled. To specify authen- tication, you need to register administrators. Reference For details, see p.22 “Registering the Administrator”.
  • Page 414: Administrator Authentication

    Authentication and its Application Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name al- ready registered in the address book. Windows Authentication, LDAP Authen- tication and Integration Server Authentication are not performed for an administrator, so an administrator can log on even if the server is unreachable because of a network problem.
  • Page 415: Specifying Administrator Privileges

    Administrator Authentication Specifying Administrator Privileges To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. To log on as an administrator, use the default login user name and login pass- word.
  • Page 416 Authentication and its Application Press [Administrator Authentication Management]. Press the [User Management], [Machine Management], [Network Management], or [File Management] key to select which settings to manage. Set "Admin. Authentication" to [On]. [Available Settings] appears.
  • Page 417 Administrator Authentication Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. [Available Settings] varies depending on the administrator. For details about Available Settings, see p.121 “Managing Access to the Ma- chine” Note ❒ To specify administrator authentication for more than one category, repeat steps Press [OK].
  • Page 418: Registering The Administrator

    Authentication and its Application Registering the Administrator If administrator authentication has been specified, it is recommended to assign each administrator role to a different person. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administra- tor.
  • Page 419 Administrator Authentication Press [Administrator Tools]. Press [Program / Change Administrator]. In the line for the administrator whose authority you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. If you allocate each administrator’s authority to a different person, the screen appears as follows:...
  • Page 420 Authentication and its Application Press [Change] for "Login user name". Enter the login user name, and then press [OK]. Press [Change] for "Login password". Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy, see p.158 “Password Policy”.
  • Page 421: Logging On Using Administrator Authentication

    Administrator Authentication Enter the encryption password, and then press [OK]. If a password reentry screen appears, enter the encryption password, and then press [OK]. Press [OK] twice. You will be automatically logged off. Press the {User Tools/Counter} key. Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administra- tor’s user name and password.
  • Page 422 Authentication and its Application Press [Enter] for "Login User Name". Enter the login user name, and then press [OK]. Note ❒ When you log on to the machine for the first time as the administrator, en- ter "admin". Press [Enter] for "Login Password". Note ❒...
  • Page 423 Administrator Authentication Enter the login password, and then press [OK]. Enter [Login]. "Authenticating... Please wait." appears, followed by the screen for specifying the default.
  • Page 424: Logging Off Using Administrator Authentication

    Authentication and its Application Logging off Using Administrator Authentication If administrator authentication has been specified, be sure to log off after com- pleting settings. This section explains how to log off after completing settings. Press the {Login/Logout}key. AQI007S Press [Yes].
  • Page 425: Changing The Administrator

    Administrator Authentication Changing the Administrator Change the administrator’s login user name and login password. You can also assign each administrator’s authority to the login user names "Administrator 1" to "Administrator 4" To combine the authorities of multiple administrators, as- sign multiple administrators to a single administrator. For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
  • Page 426 Authentication and its Application Press [Administrator Tools]. Press [Program / Change Administrator]. In the line for the administrator you want to change, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. Press [Change] for the setting you want to change, and re-enter the setting. Press [OK].
  • Page 427: Using Web Image Monitor

    Administrator Authentication Using Web Image Monitor Using Web Image Monitor, you can log on to the machine and change the ad- ministrator settings. This section describes how to access the Web Image Moni- tor. Start your Web browser. Enter "http://(machine's address)/" in the address bar of a Web browser. Top page of Web Image Monitor appears.
  • Page 428: Using Web Printing Tool

    Authentication and its Application Using Web Printing Tool Administrative settings for GL/2 & TIFF Filter can be changed, system logs can be collected, etc. using Web Printing Tool. Start your Web browser. Enter “http://(machine's address)/webprint/” in the Web browser’s address bar.
  • Page 429: User Authentication

    User Authentication User Authentication There are five types of user authentication method: user code authentication, ba- sic authentication, Windows authentication, Integration Server Authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authen- tication.
  • Page 430: User Code Authentication

    Authentication and its Application User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒...
  • Page 431 User Authentication Press [User Authentication Management]. Select [User Code Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. Select which of the machine’s functions you want to limit. User Code Authentication will be applied to the selected functions. Unselected functions will not be affected.
  • Page 432 Authentication and its Application Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication". Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
  • Page 433 User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to Printer Job Au- thentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 434: Basic Authentication

    Authentication and its Application Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you cannot only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 435 User Authentication Press [User Authentication Management]. Select [Basic Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. Select which of the machine’s functions you want to permit. Basic Authentication will be applied to the selected functions. Users can use the selected functions only.
  • Page 436 Authentication and its Application Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, [Simple (Limitation)] will not be ac- cepted. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
  • Page 437 User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to Printer Job Au- thentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 438 Authentication and its Application Specifying Login User Name and Login Password In [User Authentication Management], specify the login user name and password. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Select the user or group. Press [Auth.
  • Page 439 User Authentication Press [Change] for “Login User Name”. Enter a login user name, and then press [OK]. Press [Change] for “Login Password”. Enter a login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 440 Authentication and its Application Specifying Authentication Information to Log on The login user name and password specified in [User Authentication Management] can be used as the login information for "SMTP Authentication", "Folder Au- thentication", and "LDAP Authentication". For details about specifying login user name and login password, see p.42 “Spec- ifying Login User Name and Login Password”.
  • Page 441 User Authentication Press [Address Book Management]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the user or group. Press [Auth. Info]. Specify the login user name and password.
  • Page 442 Authentication and its Application Select [Use Auth. Info at Login] in "SMTP Authentication". If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Limitation ❒ When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Au- thentication", or "LDAP Authentication", a user name other than "other"...
  • Page 443: Windows Authentication

    User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- tered in the directory server.
  • Page 444 Authentication and its Application Note ❒ The first time you access the machine, you can use the functions available to your group. If you are not registered in a group, you can use the functions available under [*Default Group]. To limit which functions are available to which users, first make settings in advance in the address book.
  • Page 445 User Authentication Press [Administrator Tools]. Press [User Authentication Management]. Select [Windows Auth.]. Note ❒ If you do not want to use user authentication management, select [Off].
  • Page 446 Authentication and its Application Press [Change] for "Domain Name". Enter the name of the domain controller to be authenticated, and then press [OK]. Select the "Printer Job Authentication" level. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication".
  • Page 447 User Authentication If you select [Entire], proceed to step If you select [Simple (All)] or [Simple (Limitation)], proceed to step Reference For details, see p.71 “Printer Job Authentication Levels and Printer Job Types”. Press [Simple (Limitation)] Press [Change]. Specify the range in which [Simple (Limitation)] is applied to Printer Job Au- thentication.
  • Page 448 Authentication and its Application Press [On] for "Use Secure Connection(SSL)". If you are not using secure sockets layer (SSL) for authentication, press [Off]. If global groups have been registered under Windows server, you can limit the use of functions for each global group. You need to create global groups in the Windows server in advance and reg- ister in each group the users to be authenticated.
  • Page 449 User Authentication Under "Group Name", press [Change], and then enter the group name. Press [OK]. Select which of the machine’s functions you want to permit. Windows Authentication will be applied to the selected functions. Users can use the selected functions only. For details about "Limiting Available Functions", see p.125 “Limiting Availa- ble Functions”.
  • Page 450: Creating The Server Certificate

    Authentication and its Application -Installing Internet Information Services (IIS) and Certificate services Specify this setting if you want the machine to automatically obtain e-mail ad- dresses registered in Active Directory. We recommended you install Internet Information Services (IIS) and Certificate services as the Windows components.
  • Page 451: Ldap Authentication

    User Authentication LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book.
  • Page 452 Authentication and its Application Limitation ❒ Under LDAP authentication, you cannot specify access limits for groups reg- istered in the LDAP Server. ❒ When using LDAP Authentication, you cannot use reference functions in LDAP Search for servers using SSL. ❒ Enter the user’s login user name using up to 32 characters and login password using up to 128 characters.
  • Page 453 User Authentication Specifying LDAP Authentication This can be specified by the machine administrator. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [User Authentication Management].
  • Page 454 Authentication and its Application Select [LDAP Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication.
  • Page 455 User Authentication Select the "Printer Job Authentication" level. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Limitation ❒ If Printer Controller RW-3600 is installed, you cannot specify "Printer Job Authentication".
  • Page 456 Authentication and its Application Press [Change]. Specify the range in which [Simple (Limitation)] is applied to Printer Job Au- thentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 457 User Authentication Press [Change] for "Login Name Attribute". Enter the login name attribute , and then press [OK]. Note ❒ You can use the Login Name Attribute as a search criterion to obtain infor- mation about an authenticated user. You can create a search filter based on the Login Name Attribute, select a user, and then retrieve the user infor- mation from the LDAP server so it is transferred to the machine’s address book.
  • Page 458 Authentication and its Application Enter the unique attribute and then press [OK]. Note ❒ Specify Unique Attribute on the machine to match the user information in the LDAP server with that in the machine. By doing this, if the Unique At- tribute of a user registered in the LDAP server matches that of a user reg- istered in the machine, the two instances are treated as referring to the same user.
  • Page 459: Integration Server Authentication

    User Authentication Integration Server Authentication To use Integration Server Authentication, you need a server on which ScanRout- er software that supports authentication is installed. For external authentication, the Integration Server Authentication collectively authenticates users accessing the server over the network, providing a server-in- dependent centralized user authentication system that is safe and convenient.
  • Page 460 Authentication and its Application Specifying Integration Server Authentication This can be specified by the machine administrator. This section explains how to specify the machine settings. For details, see the Authentication Manager manual. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools].
  • Page 461 User Authentication Select [Integration Svr. Auth.]. Note ❒ If you do not wish to use User Authentication Management, select [Off]. Press [Change] for "Server Name". Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IPv4 address or host name.
  • Page 462 Authentication and its Application In "Authentication Type", select the authentication system for external au- thentication. Select an available authentication system. Note ❒ For general usage, select [Default]. Press [Change] for "Domain Name". Enter the domain name, and then press [OK]. Note ❒...
  • Page 463 User Authentication Press [Obtain URL]. The machine obtains the URL of the server specified in [Server Name]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. If [Server Name] or the setting for enabling SSL is changed after obtaining the URL, the "URL"...
  • Page 464 Authentication and its Application Under "Group Name", press [Change], and then enter the group name. Press [OK]. Select which of the machine’s functions you want to permit. Authentication will be applied to the selected functions. Users can use the selected functions only. For details about “Limiting Available Functions”, see p.125 “Limiting Avail- able Functions”.
  • Page 465 User Authentication Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)] or [Simple (Limitation)]. ❒ If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required.
  • Page 466 Authentication and its Application Specify the range in which [Simple (Limitation)] is applied to Printer Job Au- thentication. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 467 User Authentication ❖ Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication lev- els and printer job types. Depending on the combination of printer job authentication level and printer job type, the machine may not print properly. Set an appropriate combination according to the operating environment.
  • Page 468 Authentication and its Application ❖ [Printer Job Authentication] • [Entire] The machine authenticates all printer jobs and remote settings, and cancels jobs and settings that fail authentication. Printer Jobs: Job Reset Settings: Disabled • [Simple (All)] The machine authenticates printer jobs and remote settings that have au- thentication information, and cancels the jobs and settings that fail authen- tication.
  • Page 469 User Authentication A printer job or PDF file is sent from a host computer without a printer driver and is printed via LPR. Personal authentication information is not added to the printer job. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password used for logging on via ftp.
  • Page 470: If User Authentication Is Specified

    Authentication and its Application If User Authentication is Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authen- tication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations.
  • Page 471: User Code Authentication (Using A Printer Driver)

    If User Authentication is Specified User Code Authentication (Using a Printer Driver) When user authentication is set, specify the user code in the printer properties of a printer driver. For details, see the printer driver Help. Login (Using the Control Panel) Follow the procedure below to log on when Basic Authentication, Windows Au- thentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 472 Authentication and its Application Enter a login password, and then press [OK]. Press [Login]. When the user is authenticated, the screen for the function you are using ap- pears.
  • Page 473: Log Off (Using The Control Panel)

    If User Authentication is Specified Log Off (Using the Control Panel) Follow the procedure below to log off when Basic Authentication, Windows Au- thentication, or LDAP Authentication is set. Press the {Login/Logout} key. AQI007S Press [Yes]. Note ❒ You can log off using following procedures also. •...
  • Page 474: Login (Using A Printer Driver)

    Authentication and its Application Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help.
  • Page 475: Auto Logout

    If User Authentication is Specified Auto Logout This can be specified by the machine administrator. When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout".
  • Page 476: Authentication Using An External Device

    Authentication and its Application Select [On]. Note ❒ If you do not want to specify [Auto Logout Timer], select [Off]. Enter "60" to "999" (seconds) using the number keys, and then press [q]. Press the {User Tools/Counter} key. Authentication using an external device If you authenticate using an external device, see the Kit manual.
  • Page 477: Printing A Confidential Document

    3. Preventing Information Leaks Printing a Confidential Document Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine’s output trays. When printing confidential documents, use the Locked Print function. ❖...
  • Page 478: Printing A Locked Print File

    Preventing Information Leaks Perform Locked Print. Reference For details, see the printer driver Help. Printing a Locked Print File Print Locked Print files using the control panel. The Document Administrator can change the password if a user has forgotten it. This can also be specified via Web Image Monitor.
  • Page 479 Printing a Confidential Document Press [Print]. Enter the password for the Locked print file, and then press [OK]. Note ❒ Enter the password specified in step on p.81 “Choosing a Locked Print file”. Press [Yes].
  • Page 480: Deleting Locked Print Files

    Preventing Information Leaks Deleting Locked Print Files This can be specified by the file creator (owner). To delete Locked Print files, you must enter the password for the files. If the password has been forgotten, ask the file administrator to change the password. This can also be specified via Web Image Monitor.
  • Page 481: Changing Passwords Of Locked Print Files

    Printing a Confidential Document Press [Delete]. Enter the password for the Locked Print file, and then press [OK]. Press [Yes]. Changing Passwords of Locked Print Files This can be specified by the file creator (owner) or file administrator. If the password has been forgotten, the file administrator change the password. This can also be specified via Web Image Monitor.
  • Page 482 Preventing Information Leaks Press [Change Password]. Enter the password for the stored file, and then press [OK]. The machine administrator does not need to enter the password. Enter the new password for the stored file, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 483: Unlocking Locked Print Files

    Printing a Confidential Document Unlocking Locked Print Files If you specify [On] for "Enhance File Protection", the file will be locked and be- come inaccessible if an invalid password is entered ten times. This section ex- plains how to unlock files. Only the file administrator can unlock files.
  • Page 484: Specifying Access Permission For Stored Files

    Preventing Information Leaks Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. This can prevent activities such as printing or sending of stored files by unau- thorized users.
  • Page 485: Assigning Users And Access Permission For Stored Files

    Specifying Access Permission for Stored Files Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files.
  • Page 486 Preventing Information Leaks Press [Change Access Priv.]. Press [Program/Change/Delete]. Press [New Program].
  • Page 487 Specifying Access Permission for Stored Files Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission.
  • Page 488: Specifying Access Privileges For Files Stored Using The Scanner Function

    Preventing Information Leaks Specifying Access Privileges for Files Stored using the Scanner Function If user authentication is set for the scanner function, you can specify access priv- ileges for stored files when storing them in the Document Server. You can also change the access privileges for the file.
  • Page 489 Specifying Access Permission for Stored Files Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then se- lect the permission.
  • Page 490 Preventing Information Leaks Press [Change Access Priv.]. Press [Program/Change/Delete]. Press [New Program]. Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 491: Assigning The User And The Access Permission For The User's Stored Files

    Specifying Access Permission for Stored Files Assigning the User and the Access Permission for the User’s Stored Files This can be specified by the file creator (owner) or user administrator. Specify the users and their access permission to files stored by a particular user. Only those users granted access permission can access stored files.
  • Page 492 Preventing Information Leaks Press [Address Book Management]. Select the user or group. Press [Protection].
  • Page 493 Specifying Access Permission for Stored Files Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users/Groups". If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [New Program]. Select the users or groups to register. You can select more than one users.
  • Page 494: Specifying Passwords For The Stored Files

    Preventing Information Leaks Select the user who you want to assign an access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Con- trol]. Press [Exit]. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key.
  • Page 495 Specifying Access Permission for Stored Files Press [File Management]. Press [Change Password]. Enter the password using the number keys. You can use 4 to 8 numbers as the password for the stored file. Press [OK]. Confirm the password by re-entering it using the number keys. Press [OK].
  • Page 496: Unlocking Files

    Preventing Information Leaks Unlocking Files If you specify [On] for "Enhance File Protection", the file will locked and become inaccessible if an invalid password is entered 10 times. This section explains how to unlock files. Only the file administrator can unlock files. For details about "Enhance File Protection", see p.153 “Changing the Extended Security Functions”.
  • Page 497 Specifying Access Permission for Stored Files Press [Unlock File]. Press [Yes]. Press [OK].
  • Page 498: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Information Leaks Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 499 Preventing Data Leaks Due to Unauthorized Transmission Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Extended Security]. Press [On] for "Restrict Use of Destinations".
  • Page 500 Preventing Information Leaks Press [OK]. Press the {User Tools/Counter} key. Reference This can also be specified using Web Image Monitor or SmartDeviceMon- itor for Admin. For details, see the Help for each application.
  • Page 501: Protecting The Address Book

    Protecting the Address Book Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 502 Preventing Information Leaks Press [Address Book Management]. Select the user or group. Press [Protection]. Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups".
  • Page 503 Protecting the Address Book Press [New Program]. Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission.
  • Page 504: Encrypting The Data In The Address Book

    Preventing Information Leaks Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book. Reference See p.153 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.28 “Log- ging off Using Administrator Authentication”.
  • Page 505 Protecting the Address Book Press [Extended Security]. Press [On] for "Encrypt Address Book". Press [Change] for “Encryption Key”. Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt / Decrypt].
  • Page 506 Preventing Information Leaks Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the address book may take a long time. The time it takes to encrypt the data in the address book depends on the number of registered users.
  • Page 507: Deleting Data On The Hard Disk

    Deleting Data on the Hard Disk Deleting Data on the Hard Disk Hard Disk The machine’s hard disk lets you store data under the copy, printer, scanner, and document server functions, as well as the address book and counters stored under each user code. Data Not Overwritten in the Hard Disk The machine’s memory lets you store data transmitted using network TWAIN scanner.
  • Page 508 Preventing Information Leaks "Auto Erase Memory Setting" This can be specified by the machine administrator. A document scanned in Copier or Scanner mode, or print data sent from a print- er driver is temporarily stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary data.
  • Page 509 Deleting Data on the Hard Disk Press [Auto Erase Memory Setting]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [On], and then select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. If you select [Random Numbers], proceed to step If you select [NSA] or [DoD], proceed to step Press [Change].
  • Page 510 Preventing Information Leaks Enter the number of times that you want to overwrite using the number keys, and then press [q]. Press [OK]. Auto Erase Memory is set. Important ❒ When Auto Erase Memory is set to "On", temporary data that remained on the hard disk when Auto Erase Memory was "Off"...
  • Page 511 Deleting Data on the Hard Disk Types of Data that Can or Cannot Be Overwritten The following table shows the types of data that can or cannot be overwritten by Auto Erase Memory. Data overwritten by Auto Copier • Copy jobs Erase Memory Printer •...
  • Page 512 Preventing Information Leaks "Erase All Memory" This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.28 “Log- ging off Using Administrator Authentication”.
  • Page 513 Deleting Data on the Hard Disk Press [Erase All Memory]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. If you select [Random Numbers], proceed to step If you select [NSA] or [DoD], proceed to step Press [Change].
  • Page 514 Preventing Information Leaks Enter the number of times that you want to overwrite using the number keys, and then press [q]. Press [OK]. Press [Yes]. When overwriting is completed, press [Exit], and then turn off the power. Reference Before turning the power off, see "Turning On the Power", About This Ma- chine.
  • Page 515 Deleting Data on the Hard Disk Canceling Erase All Memory Press [Cancel] while Erase All Memory is in progress. Press [Yes]. Erase All Memory is canceled. Note ❒ If you stop this before completion, the data is not fully erased. Execute [Erase All Memory] again to erase the data.
  • Page 516 Preventing Information Leaks...
  • Page 517: Managing Access To The Machine

    4. Managing Access to the Machine Preventing Modification of Machine Settings Administrator type determines which machine settings can be modified. Users cannot change the administrator settings. In [Admin. Authentication], [Available Set- tings], the administrator can select which settings users cannot specify. Register the administrators before using the machine.
  • Page 518: Menu Protect

    Managing Access to the Machine Menu Protect The administrator can also limit users’ access permission to the machine’s set- tings. The machine’s System Settings menu and the printer’s regular menus can be locked so they cannot be changed. This function is also effective when man- agement is not based on user authentication.
  • Page 519 Menu Protect Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key. Printer Functions To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Set- tings].
  • Page 520 Managing Access to the Machine Press the {User Tools/Counter} key. Scanner Functions To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Set- tings]. Press the {User Tools/Counter} key. Press [Scanner Features].
  • Page 521: Limiting Available Functions

    Limiting Available Functions Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ Available Functions Specify the available functions from the copier, Document Server, scanner and printer function. Specifying Which Functions are Available This can be specified by the user administrator.
  • Page 522 Managing Access to the Machine Select the user. Press [Auth. Info]. In [Available Functions], select the functions you want to specify. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [OK]. Press [Exit].
  • Page 523: Managing Log Files

    Managing Log Files Managing Log Files Log information To view the log, the log collection server is required. The following log information is stored in the machine’s memory and on its hard disk: • Job log Stores information about workflow related to user files, such as copying, printing, and scan file delivery •...
  • Page 524: Specifying Delete All Logs

    Managing Access to the Machine Specifying Delete All Logs This can be specified by the machine administrator. By deleting the log stored in the machine, you can free up space on the hard disk. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools].
  • Page 525: Transfer Log Setting

    Managing Log Files Transfer Log Setting The machine administrator can select [On] from the log server only. When using the machine’s control panel, you can change the setting to [Off] only if it is set to [On]. You can check and change the transfer log setting. This setting lets you transfer log files to the log server to check the history data and identify unauthorized ac- cess.
  • Page 526 Managing Access to the Machine Press [Transfer Log Setting]. If the setting to be specified does not appear, press [TNext] to scroll down to oth- er settings. Press [Off]. Press [OK]. Press the {User Tools/Counter}key.
  • Page 527: Enhanced Network Security

    5. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Mon- itor to specify the network security level to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator.
  • Page 528 Enhanced Network Security Press [Effective Protocol]. Press [Inactive] for the protocol you want to disable. Press [OK]. Press the {User Tools/Counter} key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help.
  • Page 529: Preventing Unauthorized Access

    Preventing Unauthorized Access Access Control This can be specified by the network administrator. The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]- [192.168.15.20], the client PC addresses from which access is possible will be from 192.168.15.16 to 192.168.15.20.
  • Page 530: Specifying Network Security Level

    Enhanced Network Security Specifying Network Security Level This can be specified by the network administrator. This setting lets you change the security level to limit unauthorized access. Set the security level to [Level 0], [Level 1], or [Level 2]. Select [Level 2] for maximum security to protect confidential information. Select [Level 1] for moderate security.
  • Page 531 Preventing Unauthorized Access Press [Network Security Level]. If the setting you want to specify does not appear, press [TNext] to scroll down to other settings. Select the network security level. Select [Level 0], [Level 1], or [Level 2]. Press [OK]. Press [Exit].
  • Page 532 Enhanced Network Security Function Network Security Level Level 0 Level 1 Level 2 ❍ ❍ ❍ TCP/IP TCP/IP HTTP Port 80 Port 443 Port 631 Port 7443/7444 Port 80 Port 631 Port 443 ❍ ❍ DIPRINT ❍ ❍ Port 21 Port 22 sftp Port 10021...
  • Page 533: Encrypting Transmitted Passwords

    Encrypting Transmitted Passwords Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ Driver Encryption Key Encrypt the password transmitted when specifying user authentication.
  • Page 534: Driver Encryption Key

    Enhanced Network Security Driver Encryption Key This can be specified by the network administrator. Specify the driver encryption key on the machine. By making this setting, you can encrypt login passwords for transmission to pre- vent them from being analyzed. Reference See p.153 “Changing the Extended Security Functions”.
  • Page 535 Encrypting Transmitted Passwords Press [Extended Security]. For [Driver Encryption Key], press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. Note ❒ The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 536: Group Password For Pdf Files

    Enhanced Network Security Group Password for PDF files This can be specified by the network administrator. On the machine, specify the group password for PDF files. By using a PDF group password, you can enhance security and so protect pass- words for PDF files from being analyzed.
  • Page 537: Ipp Authentication Password

    Encrypting Transmitted Passwords Enter the password, and then press [OK]. For [Confirm New Password], press [Enter]. Enter the password and press [OK]. Press [OK]. Press the {User Tools/Counter} key. IPP Authentication Password This can be specified by the network administrator. Specify the IPP authentication passwords for the machine using Web Image Monitor.
  • Page 538: Protection Using Encryption

    Enhanced Network Security Protection Using Encryption When you access the machine using a Web Image Monitor or IPP, you can estab- lish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish en- crypted communication using SNMPv3 or SSL.
  • Page 539: Ssl (Secure Sockets Layer) Encryption

    Protection Using Encryption The encrypted shared key is decrypted in the machine using private key. Transmit the encrypted data using the shared key, and then decrypt the data at the machine to attain secure transmission. SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator.
  • Page 540 Enhanced Network Security Creating and Installing the Self-Signed Certificate Create and install the server certificate using Web Image Monitor. This section explains the use of a self-certificate as the server certificate. Open a Web Image Monitor. Enter "http://(machine's-address)/" in the address bar to access the printer. Log onto the machine.
  • Page 541 Protection Using Encryption Creating the Server Certificate (Certificate Issued by a Certificate Authority) Create the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Open a Web Image Monitor. Enter "http://(machine's-address)/"...
  • Page 542 Enhanced Network Security Installing the Server Certificate (Certificate Issued by a Certificate Authority) Install the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Enter the server certificate contents issued by the certificate authority. Open a Web Image Monitor.
  • Page 543 Protection Using Encryption Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a cer- tificate authority. Open a Web Image Monitor. Enter "http://(machine's-address)/" in the address bar to access the printer. Log onto the machine.
  • Page 544: User Settings For Ssl (Secure Sockets Layer)

    Enhanced Network Security User Settings for SSL (Secure Sockets Layer) If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user’s computer. The network administrator must explain the procedure for installing the certifi- cate to users.
  • Page 545: Setting The Ssl / Tls Encryption Mode

    Protection Using Encryption Setting the SSL / TLS Encryption Mode By specifying the SSL/TLS encrypted communication mode, you can change the security level. ❖ Encrypted Communication Mode Using the encrypted communication mode, you can specify encrypted com- munication. Ciphertext Only Allows encrypted communication only.
  • Page 546 Enhanced Network Security Press [Interface Settings]. Press [Permit SSL/TLS Communication] If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Clear Text] as the en- crypted communication mode.
  • Page 547: Snmpv3 Encryption

    Protection Using Encryption SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.28 “Log-...
  • Page 548 Enhanced Network Security Press [Permit SNMPv3 Communication]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [Encryption Only]. Press [OK]. Press the {User Tools/Counter} key. Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMPv3...
  • Page 549: Changing The Extended Security Functions

    6. Specifying the Extended Security Functions Changing the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 550 Specifying the Extended Security Functions Press [Administrator Tools]. Press [Extended Security]. Press the setting you want to change, and change the setting. Press [OK]. Press the {User Tools/Counter} key.
  • Page 551: Settings

    Changing the Extended Security Functions Settings ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication. The Driver Encryption Key must match the encryption key set on the machine. Reference See the printer driver Help.
  • Page 552 Specifying the Extended Security Functions ❖ Restrict Adding of User Destinations This can be specified by the user administrator. When "Restrict Use of Destinations" is set to [Off]. After entering a scanner des- tination directly, you can register it in the address book by pressing [Program Dest.].
  • Page 553 Changing the Extended Security Functions ❖ Settings by SNMPv1 and v2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 554 Specifying the Extended Security Functions ❖ Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for op- erations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 555 Changing the Extended Security Functions ❖ @Remote Service This can be specified by the machine administrator. Communication via HTTPS for @Remote Service cannot be received when [Prohibit] is selected. If you select [Prohibit], you must inform your service rep- resentative. •...
  • Page 556: Other Security Functions

    Specifying the Extended Security Functions Other Security Functions This section explains settings for preventing information leaks, and functions that you can restrict to further increase security. Scanner Function ❖ Print & Delete Scanner Journal To prevent personal information in the transmission/delivery history being printed automatically, set user authentication and the journal will specify [Do not Print: Disable Send] automatically.
  • Page 557: Limiting Machine Operation To Customers Only

    Limiting Machine Operation to Customers Only Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 558 Specifying the Extended Security Functions Press [Administrator Tools]. Press [Service Mode Lock]. Press [On] and then [OK]. A confirmation message appears. Press [Yes]. Press the {User Tools/Counter} key.
  • Page 559 Limiting Machine Operation to Customers Only Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.28 “Log- ging off Using Administrator Authentication”.
  • Page 560 Specifying the Extended Security Functions Press [Off] and then press [OK]. Press the {User Tools/Counter} key. The customer engineer can switch to service mode.
  • Page 561: Troubleshooting

    7. Troubleshooting Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 562 Troubleshooting Messages Causes Solutions The machine cannot connect Make sure the server's set- Failed to obtain to the server or cannot estab- tings, such as the IP Address URL. lish communication. and host name, are specified correctly on the machine. Make sure the host name of the UA Server (Integration Server) is specified correctly.
  • Page 563: Machine Cannot Be Operated

    Authentication Does Not Work Properly Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Solution Cannot print using the printer User authentication has been Enter the login user name and driver or connect using the rejected.
  • Page 564 Troubleshooting Condition Cause Solution After starting [User Manage- "Restrict Simple Encryption" Set "Restrict Simple Encryp- ment Tool] or [Address Manage- is not set correctly. Alterna- tion" to [On]. Alternatively, ment Tool] in tively, [SSL/TLS] has been ena- enable [SSL/TLS], install the SmartDeviceMonitor for Ad- bled although the required server certificate in the ma-...
  • Page 565 Authentication Does Not Work Properly Condition Cause Solution Cannot print when user au- User authentication may not Specify user authentication in thentication has been speci- be specified in the printer the printer driver. fied. driver. For details, see the printer driver Help.
  • Page 566 Troubleshooting...
  • Page 567: Appendix

    8. Appendix Supervisor Operations The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 568: Logging On As The Supervisor

    Appendix Logging on as the Supervisor If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on. Press the {Login/Logout} key. AQI007S Press [Enter] for [Login User Name]. Enter a login user name, and then press [OK].
  • Page 569: Logging Off As The Supervisor

    Supervisor Operations Logging off as the Supervisor If administrator authentication has been specified, be sure to log off after com- pleting settings. This section explains how to log off after completing settings. Press the {Login/Logout} key. AQI007S Press [Yes]. Changing the Supervisor Press the {User Tools/Counter} key.
  • Page 570 Appendix Under "Supervisor", click [Change]. Press [Change] for the login user name. Enter the login user name, and then press [OK]. Press [Change] for the login password. Enter the login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 571: Resetting An Administrator's Password

    Supervisor Operations Resetting an Administrator’s Password Preparation For details about logging on and logging off as the supervisor, see p.172 “Log- ging on as the Supervisor”, p.173 “Logging off as the Supervisor”. Press the {Login/Logout} key. AQI007S Log on as the supervisor. You can log on in the same way as an administrator.
  • Page 572: Machine Administrator Settings

    Appendix Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Tray Paper Settings All the settings can be specified. ❖...
  • Page 573 Machine Administrator Settings ❖ Administrator Tools • Display / Print Counter • Display / Clear / Print / Counter per User Display Counter per User Print Counter per User • User Authentication Management You can specify which authentication to use. You can also edit the settings for each function.
  • Page 574: Copier / Document Server Features

    Appendix Copier / Document Server Features The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Reproduction Ratio All the settings can be specified. ❖ Edit All the settings can be specified. ❖ Stamp All the settings can be specified.
  • Page 575: Printer Features

    Machine Administrator Settings Printer Features The following settings can be specified. ❖ List / Test Print All the settings can be specified. ❖ Maintenance • Menu Protect • List / Test Print Lock ❖ System • Print Error Report • Auto Continue •...
  • Page 576: Scanner Features

    Appendix Scanner Features The following settings can be specified. ❖ General Settings All the settings can be specified. ❖ Scan Settings All the settings can be specified. ❖ Send Settings All the settings can be specified. ❖ Initial Settings All the settings can be specified. Extended Feature Setting Menu The following settings can be specified.
  • Page 577: Settings Via Web Image Monitor

    Machine Administrator Settings Settings via Web Image Monitor The following settings can be specified. ❖ Top Page • Reset Printer Job • Reset Device ❖ Device Settings • System Spool Printing Protect Printer Display Panel Print Priority Function Priority Permit Firmware Update Display IP Address on Device Display Panel Paper Tray Priority (Copier) Paper Tray Priority (Printer)
  • Page 578 Appendix • LDAP Server All the settings can be specified. • Firmware Update Update ❖ Printer • System Print Error Report Auto Continue Memory Overflow Initial Print Job List Rotate by 180 Degrees Copies Black Page print Reserved Job Waiting Time Printer Language Sub paper Size Bypass Tray Setting Priority...
  • Page 579: Settings Via Smartdevicemonitor For Admin

    Machine Administrator Settings ❖ RC Gate • Setup RC Gate Confirm • Remote Communication Gate proxy Server Remote Communication Gate proxy Server proxy Address Port Number User Name Password ❖ Webpage • Download Help File language Settings via SmartDeviceMonitor for Admin The following settings can be specified.
  • Page 580: Network Administrator Settings

    Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Interface Settings • Network All the settings can be specified. • IEEE 802.11b All the settings can be specified. Note ❒...
  • Page 581: Scanner Features

    Network Administrator Settings Scanner Features The following settings can be specified. ❖ Send Settings • Max. E-mail Size • Divide & Send E-mail Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting •...
  • Page 582: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Device Settings • System Device Name Comment Location • E-mail All the settings can be specified. • Auto E-mail Notification Groups to Notify • Program/Change Administrator You can specify the following administrator settings for the machine ad- ministrator.
  • Page 583 Network Administrator Settings ❖ Network • IPv4 All the settings can be specified. • IPv6 All the settings can be specified. • NetWare All the settings can be specified. • AppleTalk All the settings can be specified. • SMB All the settings can be specified. •...
  • Page 584: Settings Via Smartdevicemonitor For Admin

    Appendix Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ NIB Setup Tool All the settings can be specified.
  • Page 585: File Administrator Settings

    File Administrator Settings File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator •...
  • Page 586: Extended Feature Setting Menu

    Appendix Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info ❖ GL/2 & TIFF • General Settings All the settings can be specified. •...
  • Page 587: Settings Via Web Image Monitor

    File Administrator Settings Settings via Web Image Monitor The following settings can be specified. ❖ Top Page Reset Printer Job ❖ Document Server All the settings can be specified. ❖ Printer: Print Jobs • Printer Print Jobs The file administrator can select [Delete], [Delete Password], and [Unlock Job]. The file administrator cannot print files.
  • Page 588: User Administrator Settings

    Appendix User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator • Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book...
  • Page 589: Extended Feature Setting Menu

    User Administrator Settings Extended Feature Setting Menu The following settings can be specified. ❖ Extended Feature Settings • Startup Setting • Install • Uninstall • Change Allocation • Extended Feature Info ❖ GL/2 & TIFF • General Settings All the settings can be specified. •...
  • Page 590: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Address Book All the settings can be specified. ❖ Device Settings • Auto E-mail Notification Groups to Notify • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator •...
  • Page 591: Document Server File Permissions

    Document Server File Permissions Document Server File Permissions The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned "Read-only" authority. •...
  • Page 592: The Privilege For User Account Settings In The Address Book

    Appendix The Privilege for User Account Settings in the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned "Read-only" authority. •...
  • Page 593 The Privilege for User Account Settings in the Address Book ❍ =You can view and change the setting. U =You can view the setting. - =You cannot view or specify the setting. Settings User User Regis- Full Adminis- tered Control Read- Edit Edit /...
  • Page 594 Appendix Settings User User Regis- Full Adminis- tered Control Read- Edit Edit / trator User only Delete E-mail E-mail ❍ ❍ ❍ ❍ ❍ Address Address Folder SMB/ ❍ ❍ ❍ ❍ ❍ Destina- FTP/NCP tion SMB: ❍ ❍ ❍ ❍...
  • Page 595: User Settings

    User Settings User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting.
  • Page 596: Copier / Document Server Features

    Appendix Copier / Document Server Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Menu Protect Level 1 Level 2 ❍ General Features Auto Image Density Priority ❍ ❍ Copy Quality ❍ ❍ Image Density ❍ Max. Copy Quantity ❍...
  • Page 597 User Settings Tab Names Settings Menu Protect Level 1 Level 2 ❍ ❍ Stamp Back- Size ground Density Num- ❍ ❍ bering ❍ ❍ Preset Stamp Language Stamp ❍ Stamp Priority ❍ ❍ Stamp Format: COPY ❍ ❍ Stamp Format: URGENT ❍...
  • Page 598: Printer Functions

    Appendix Tab Names Settings Menu Protect Level 1 Level 2 ❍ Stamp Page Stamp Format Num- ❍ ❍ Font bering ❍ ❍ Size ❍ ❍ Page Numbering in Combine ❍ ❍ Stamp Position: P1, P2… ❍ ❍ Stamp Position: 1/5, 2/5… ❍...
  • Page 599 User Settings ❖ Printer Features Tab Names Settings Menu Protect Level 1 Level 2 Maintenance Delete All Temporary Print Jobs Delete All Stored Print Jobs ❍ ❍ ❍ List/Test Print Multiple Lists ❍ ❍ ❍ Configuration Page ❍ ❍ ❍ Error log ❍...
  • Page 600: Scanner Features

    Appendix Scanner Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Menu Protect Level 1 Level 2 ❍ General Settings Switch Title ❍ ❍ Update Delivery Server Destination List ❍ Search Destination ❍ TWAIN Standby Time ❍ Destination List Display Priority 1 ❍...
  • Page 601: System Settings

    User Settings System Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Tab Names Settings Admin-...
  • Page 602 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Tray Paper Paper Tray Priority: Copier Settings ❍...
  • Page 603 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Inter- Net- NW Frame Type face work ❍...
  • Page 604 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ File Transfer Delivery Option ❍...
  • Page 605 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Administrator Extended Security Tools ❍...
  • Page 606: Web Image Monitor Setting

    Appendix Web Image Monitor Setting ❖ Device Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 607 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Date/Time Set Date ❍ ❍...
  • Page 608 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ E-mail Administrator E-mail Address ❍ ❍...
  • Page 609 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Auto E-mail Notification Message Notification ❍...
  • Page 610 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ User User Authentication Management Authentication User Code Authentication - Printer Job Au- ❍...
  • Page 611 User Settings ❖ Printer The default for [Menu Protect] is [Level 2]. Category Settings Menu Protect Level 1 Level 2 ❍ System Print Error Report ❍ Auto Continue ❍ Memory Overflow ❍ Memory Usage ❍ Auto Delete Temporary Print Job ❍...
  • Page 612 Appendix ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 613 User Settings ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 614 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ IPv6 IPv6 ❍ ❍ Host Name ❍...
  • Page 615 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ ❍ ❍ Workgroup Name ❍...
  • Page 616 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- not been been fied. specified. specified. ❍ ❍ Bonjour Bonjour ❍ ❍ Computer Name ❍...
  • Page 617: Functions That Require Options

    Functions That Require Options Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity unit...
  • Page 618: Index

    INDEX Access Control , 133 General Features , 176 , 178 Access Permission , 88 General Settings , 180 Address Book , 194 Group Passwords for PDF Files , 137 Address Management Tool , 194 Administrator , 4 Administrator Authentication , 4 Host Interface , 179 Administrator Tools , 177 , 178 , 184 , 189 , 192 AppleTalk , 187...
  • Page 619 Password for IPP Authentication , 137 Timer Settings , 176 Password for Stored Files , 88 Top Page , 181 , 191 Password Policy , 158 Tray Paper Settings , 176 PDF Menu , 179 Type of Administrator , 121 Print &...
  • Page 620 MEMO...
  • Page 621 MEMO...
  • Page 622 MEMO B286-7900...
  • Page 623 Copyright © 2006...
  • Page 624 Printed in the Netherlands &$%' GB GB B286-7900...

This manual is also suitable for:

Aficio mp w2400

Table of Contents