Ricoh Pro C9100 Operating Instructions Manual

Connecting the machine/system settings
Hide thumbs Also See for Pro C9100:
Table of Contents

Advertisement

Operating Instructions
Connecting the Machine/ System Settings
For safe and correct use, be sure to read the Safety Information in Read This First before using the machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Pro C9100

  • Page 1 Operating Instructions Connecting the Machine/ System Settings For safe and correct use, be sure to read the Safety Information in Read This First before using the machine.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Accessing User Tools............................5 Changing Default Settings..........................5 Quitting User Tools............................6 1. Connecting the Machine Connecting to the Interface..........................7 Connecting to the Gigabit Ethernet Interface....................8 Connecting a Device to the Machine's USB Host Interface..............10 Network Settings Requirements........................11 Using Utilities to Make Network Settings.......................
  • Page 4 Displaying Web Image Monitor Help....................... 60 Machine Status Notification by E-mail......................62 Setting the Account for E-mail Notification....................64 Mail Authentication............................65 Auto E-mail Notification..........................66 On-demand E-mail Notification......................... 68 Format of On-demand E-mail Messages....................69 Remote Maintenance Using telnet........................71 Using telnet..............................71 access................................
  • Page 5 snmp................................89 sntp................................92 ssdp................................93 ssh..................................93 syslog................................94 upnp................................94 web................................95 wins................................95 8021x................................96 Using SNMP..............................99 Understanding the Displayed Information....................100 Configuring the Network Interface Board....................100 Message List..............................105 System Log Information..........................105 4. Registering Addresses and Users Address Book..............................113 Managing Users and Machine Usage....................114 Registering User Information.........................115 Registering Names............................
  • Page 6 Registering a Group..........................127 Registering Names to a Group........................ 128 Adding a Group to Another Group......................129 Displaying Names Registered in a Group....................130 Removing a Name from a Group......................130 Deleting a Group Within Another Group....................131 Changing a Group Name........................132 Deleting a Group............................
  • Page 7: Accessing User Tools

    Accessing User Tools This section describes how to access the User Tools menu. User Tools allow you to change or set defaults. • Operations for system settings differ from normal operations. Always quit User Tools when you have finished. • Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the [Energy Saver] or [Reset] key is pressed.
  • Page 8: Quitting User Tools

    Change settings by following instructions on the display, and then press [OK]. • To cancel changes made to settings and return to the initial display, press the [User Tools] key. • For details about specifying System Settings, see page 15 "System Settings". •...
  • Page 9: Connecting The Machine

    1. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interface This section explains how to identify the machine's interface and connect the machine according to the network environment.
  • Page 10: Connecting To The Gigabit Ethernet Interface

    1. Connecting the Machine • Under normal circumstances, there is a plate covering the ports. Only a customer engineer can remove the plate. Contact your service representative when connecting the interface cable. • Three dedicated cables have already been inserted into the machine's USB port. Do not remove these dedicated cables.
  • Page 11 Connecting to the Interface Connect the Ethernet interface cable to the Gigabit Ethernet port. DFN004 Connect the other end of the Ethernet interface cable to a network connection device such as a hub. Turn on the main power switch of the machine. DFJ006 1.
  • Page 12: Connecting A Device To The Machine's Usb Host Interface

    1. Connecting the Machine Connecting a Device to the Machine's USB Host Interface This section explains how to connect a device to the machine's USB host interface. • Properly shielded and grounded cables and connectors must be used for connections to a host computer (and/or peripheral) in order to meet emission limits.
  • Page 13: Network Settings Requirements

    Network Settings Requirements Network Settings Requirements The requirements of [Interface Settings] menu items under [System Settings] vary depending on the function that you are using. See page 138 "Network Settings Requirements List" and specify the items necessary for the printer function. •...
  • Page 14: Using Utilities To Make Network Settings

    1. Connecting the Machine Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor and telnet. • These settings should be made by the administrator, or with the advice of the administrator. •...
  • Page 15: File Transfer

    Using Utilities to Make Network Settings Web Image Control panel telnet Monitor [Domain Name] [Specify] "Domain Name" Available Available [WINS Configuration] [On] "Primary WINS Server" Available Available [WINS Configuration] [On] "Secondary WINS Server" Available Available [WINS Configuration] [On] "Scope ID" Available Available [WINS Configuration]...
  • Page 16 1. Connecting the Machine Web Image Control panel telnet Monitor [SMTP Server] Available Unavailable [SMTP Authentication] Available Unavailable [POP before SMTP] Available Unavailable [Reception Protocol] [POP3] Available Unavailable [Reception Protocol] [IMAP4] Available Unavailable [Reception Protocol] [SMTP] Available Unavailable [POP3 / IMAP4 Settings] Available Unavailable [Administrator's Email Address]...
  • Page 17: System Settings

    2. System Settings This chapter describes user tools in the System Settings menu. General Features This section describes the user tools in the General Features menu under System Settings. Program / Change / Delete User Text You can register text phrases you often use when specifying settings, such as ".com" and "Regards". You can register up to 40 entries.
  • Page 18 2. System Settings Default: [Medium] Warm-up Beeper You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on. Default: [Off] If the Panel Key Sound setting is [Off], the beeper does not sound, whatever the Warm-up Beeper setting is.
  • Page 19 General Features • Auto Change Default: [According to Function Setting] • Multi-job Output Method to Stacker This setting appears only when a stacker tray is attached to the machine. Always select [Stack Jobs] when outputting multiple jobs to the stacker. Be sure to select [Stack Jobs] even when [Do not Stack Jobs] is displayed.
  • Page 20 2. System Settings • B4 JIS: 2 - 17 mm • A4: 2 - 17 mm • 11 × 17: 2 - 20 mm • 8 × 14: 2 - 17 mm • 8 × 11: 2 - 17 mm •...
  • Page 21 General Features • 8 × 14: -0.40" - 0.40" • 8 × 11: -0.40" - 0.40" • Other Paper Sizes: -0.40" - 0.40" Default: [0.00 inch] Letter Fold-out Position If you specify letter fold-out folding, set the fold-back position in 1 mm (0.04") increments. The setting ranges of the folding position for each paper size are shown below: Metric version: •...
  • Page 22 2. System Settings • 8 × 14: 2 - 7 mm • 8 × 11: 2 - 7 mm • Other Paper Sizes: 2 - 7 mm Default: [4 mm] Inch version: • A3: 0.08" - 0.28" • B4 JIS: 0.08" - 0.28" •...
  • Page 23 General Features Default: [0.00 inch] Gate Fold Position If you specify gate folding, set the fold-back position in 1 mm (0.04") increments. The setting ranges of the folding position for each paper size are shown below: Metric version: • A3: 2 - 12 mm •...
  • Page 24: Output Tray Settings

    2. System Settings [English],[ German], [Canadian French], [Italian], [Spanish], [Dutch], [Portuguese], [Polish], [Czech], [Swedish], [Finnish], [Hungarian], [Norwegian], [Danish], [Japanese], [Simplified Chinese], [Traditional Chinese], [Russian], [Hangul], [Catalan], and [Turkish] (mainly North America) [English], [German], [Canadian French], [Italian], [Spanish], [Dutch], [Portuguese], [Polish], [Czech], [Swedish], [Finnish], [Hungarian], [Norwegian], [Danish], [Japanese], [Simplified Chinese], [Traditional Chinese], [Russian], [Hangul], [Catalan], and [Turkish] Program/Change USB Device List...
  • Page 25 General Features • When the second stacker is installed and [According to Function Setting] is selected for [Output Tray Setting], [Second Stacker Tray] is displayed. • When Interface Box is installed, [Extended Option's Tray] is displayed. • If you select a setting that uses the finisher, the job might not be delivered to the specified output tray.
  • Page 26: Timer Settings

    2. System Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Sleep Mode Timer After a specified period has passed, or the [Energy Saver] key is pressed, the machine enters Sleep mode in order to conserve energy. Specify the time to elapse before Sleep mode.
  • Page 27 Timer Settings (mainly North America) Enter the time using the 12-hour format (in steps of 1 second). Auto Logout Timer Specify whether or not to automatically log out a user when the user does not operate the machine for a specified period of time after logging in. The time can be set from 10 to 999 seconds in steps of 1 second, using the number keys.
  • Page 28 2. System Settings • Weekly Timer Schedule • Event • Enter Sleep Mode • Cancel Weekly Timer Code • Main Power Off • Main Power On • None Default for "Event": [None] If an event is selected, enter the time for the event in "Event Timer". (mainly Europe and Asia) Enter the time in [Event Timer] using the 24-hour format.
  • Page 29: Interface Settings

    Interface Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Network This section describes the user tools in the Network menu under Interface Settings. Machine IPv4 Address Specify the machine's IPv4 network address. Default: [Auto-Obtain (DHCP)] When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx"...
  • Page 30 2. System Settings Default: [Active] DHCPv6 Configuration Specify the DHCPv6 setting. Default: [Inactive] If you set to [Active], select "Operation Mode" from [Router Request], [Obtain IP Address] or [Do not obtain IP Address], and also select "DNS Server Address" from [Auto-Obtain (DHCPv6)] or [Specify].
  • Page 31 Interface Settings Default for "SMB": [Active] Default for "@Remote Service": [Active] Default for "Firmware Update (IPv4)": [Active] Default for "Firmware Update (IPv6)": [Active] SMB Computer Name Specify the SMB computer name. Enter the computer name up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Do not set a computer name starting with RNP and rnp.
  • Page 32 2. System Settings Ping Command Check the network connection with ping command using the given IPv4 address. If you fail to connect to the network, check the following, and then retry the ping command. • Make sure that "IPv4" in [Effective Protocol] is set to [Active]. •...
  • Page 33: Print List

    Interface Settings Print List This section describes how to print a configuration page. The configuration page shows the current network settings and network information. Press the [User Tools] key. Press [System Settings]. Press [Interface Settings]. Press [Print List]. Press the [Start] key. The configuration page is printed.
  • Page 34: File Transfer

    2. System Settings File Transfer This section describes the user tools in the File Transfer menu under System Settings. SMTP Server Specify the SMTP server name. If DNS is in use, enter the host name. If DNS is not in use, enter the SMTP server IPv4 address. Default for "Port No.": [25] Default for "Use Secure Connection (SSL)": [Off] Enter the server name up to 127 characters.
  • Page 35 File Transfer Use if the authentication method is CRAMMD5 or DIGEST-MD5. [Off] Use if the authentication method is PLAIN or LOGIN. POP before SMTP Specify POP authentication (POP before SMTP). When sending e-mail to an SMTP server, you can enhance the SMTP server security level by connecting to the POP server for authentication.
  • Page 36 2. System Settings • Encryption Select Encryption as follows: [Auto] The password is automatically encrypted according to the POP/IMAP server settings. If encryption fails, authentication is carried out using the cleartext password. [On] The password is encrypted. [Off] The password is not encrypted. Default: [Auto] Administrator's Email Address Specify the administrator's e-mail address up to 128 characters.
  • Page 37: Administrator Tools

    Administrator Tools Administrator Tools This section describes the user tools in the Administrator Tools menu under System Settings. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Administrator Tools settings. Address Book Management You can add, change, or delete information registered in the Address Book.
  • Page 38 2. System Settings You can check the names or groups registered in each group. • Add to Group You can put groups registered in the Address Book into a group. • Delete You can delete a group from the Address Book. For details on how to register names to a group, see page 127 "Registering Names to a Group".
  • Page 39 Administrator Tools Auto Delete User in Address Book If the maximum registerable limit has been reached and adding a new account is requested, the oldest account can be deleted and a new account can be registered according to the user settings. The new account described above is an account which is automatically registered in the Address Book, and is not arbitrarily registered in the Address Book by a user.
  • Page 40 2. System Settings Display / Clear Eco-friendly Counter per User For details about this function, see Security Guide. Eco-friendly Counter Period / Administrator Message For details about this function, see Security Guide. User Authentication Management • User Code Auth. Using User Code Authentication, you can limit the available functions and supervise their use. When using User Code Authentication, register user codes.
  • Page 41 Administrator Tools [Color], [Black & White] • Other Functions: [Browser] If a user uses the browser function, only the functions specified for this setting are available. If [Browser] is selected and "Printer" is not specified, the printer function cannot be used with the browser function.
  • Page 42 2. System Settings For details about how to program the LDAP Server, see page 44 "Programming the LDAP Server". Sleep Mode Entry by Sleep Mode Timer Specify whether or not to use Sleep Mode. Default: [Enable] Service Test Call You can make a test call to the @Remote center. This function is available only if the @Remote service is enabled and active.
  • Page 43 Administrator Tools For details about Program/Change/Delete Realm, see page 49 "Programming the Realm". Machine Data Encryption Settings For details about this function, see Security Guide. Program / Delete Device Certificate You can program and delete a self-generated device certificate and also check status of the certificate.
  • Page 44 2. System Settings Default for "Access Log ": [Inactive] Default for "Eco-friendly Logs ": [Inactive] For details about this function, see Security Guide. Central Address Book Management You can set Managed Client when Management Server centrally manages address book information. The address book information registered in Management Server can be shared with Managed Client by synchronizing Management Server with the other machines to be registered as Managed Client.
  • Page 45 Administrator Tools • If [Managed Client] is specified for [Central Address Book Management], the following settings are not available: • Address Book Management • Address Book: Program / Change / Delete Group • Address Book: Change Order • Address Book: Edit Title •...
  • Page 46: Programming The Ldap Server

    2. System Settings Programming the LDAP Server This section describes how to specify the LDAP server settings. This function supports LDAP version 2.0 and 3.0. Program the LDAP server to find e-mail destinations in the LDAP server Address Book directly. To start an LDAP search, make sure to specify the following items.
  • Page 47 Programming the LDAP Server Press [Change] under "Search Base". Select a root folder to start a search. E-mail addresses registered in the selected folder are search targets. Enter the search base, and then press [OK]. For example, if the search target is the sales department of ABC company, enter "dc=sales department, o=ABC".
  • Page 48 2. System Settings Proceed to Step 25. Press [Change] under "User Name". When [Kerberos Authentication], [Digest Authentication], or [Cleartext Authentication] is selected for the authentication setting, the administrator account name and password can be used. Do not enter the administrator account name and password when using authentication for each individual or each search.
  • Page 49: Changing The Ldap Server

    Programming the LDAP Server Press [Change] for items you want to use as search conditions from the following: "Name" and "Email Address". You can enter an attribute as a typical search keyword. Using the entered attributes, the function searches the LDAP server's Address Book. Enter the attributes you want to use when searching for e-mail addresses, and then press [OK].
  • Page 50 2. System Settings Press [Program / Change / Delete LDAP Server]. Press [Delete]. Select the LDAP server you want to delete. Press [Yes]. Press [Exit]. Press the [User Tools] key.
  • Page 51: Programming The Realm

    Programming the Realm Programming the Realm This section describes how to specify the Realm settings. A realm is the network area in which Kerberos authentication is used. After checking the network environment, specify the necessary items. You can register up to 5 realms. Programming the Realm Press the [User Tools] key.
  • Page 52: Changing The Realm

    2. System Settings Changing the Realm Press the [User Tools] key. Press [System Settings]. Press [Administrator Tools]. Press [ Next] until [Program / Change / Delete Realm] is displayed. Press [Program / Change / Delete Realm]. Check that [Program / Change] is selected. Select the Realm you want to change.
  • Page 53: Monitoring And Configuring The Machine

    3. Monitoring and Configuring the Machine This chapter describes how to monitor and configure the machine. Using Web Image Monitor Using Web Image Monitor, you can check the machine status and change settings. Available operations The following operations can be remotely performed using Web Image Monitor from a client computer.
  • Page 54 3. Monitoring and Configuring the Machine • If you are using a proxy server, change the web browser settings. Contact your administrator for information about the settings. • If you click your browser's back button but the previous page does not appear, click the browser's refresh button and try again.
  • Page 55: Displaying Top Page

    Using Web Image Monitor Displaying Top Page This section explains the Top Page and how to display Web Image Monitor. • When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10". Start your web browser.
  • Page 56: About Guest Mode And Administrator Mode

    3. Monitoring and Configuring the Machine 5. Work area Display the contents of the item selected in the menu area. About Guest Mode and Administrator Mode There are two modes available with Web Image Monitor: guest mode and administrator mode. Displayed Items may differ depending on the machine type.
  • Page 57 Using Web Image Monitor Menu Guest mode Administrator mode System Read Read Version Read Read • Status Menu Guest mode Administrator mode Alert Read Read Messages Read Read Status Read Read Toner Read Read Input Tray Read Read Output Tray Read Read •...
  • Page 58 3. Monitoring and Configuring the Machine Menu Guest mode Administrator mode Job List Read Read/Modify • Inquiry Menu Guest mode Administrator mode Machine Maintenance/ Read Read Repair Sales Representative Read Read Device Management • Configuration Device Settings Menu Guest mode Administrator mode System Read...
  • Page 59 Using Web Image Monitor Menu Guest mode Administrator mode Program/Change None Read/Modify Administrator LDAP Server None Read/Modify Firmware Update None Read/Modify Kerberos Authentication None Read/Modify Device Setting Information: None Read/Modify Import Setting (Server) Import Test None Read/Modify Import/Export Device Setting None Read/Modify Information...
  • Page 60 3. Monitoring and Configuring the Machine Menu Guest mode Administrator mode System Log Read Read Security Menu Guest mode Administrator mode Network Security None Read/Modify Access Control None Read/Modify SSL/TLS None Read/Modify Read Read/Modify Site Certificate None Read/Modify Device Certificate None Read/Modify IPsec...
  • Page 61 Using Web Image Monitor Menu Guest mode Administrator mode Startup Setting None Read/Modify Extended Feature Info Read Read Install None Read/Modify Uninstall None Read/Modify Administrator Tools None Read/Modify Additional Program Startup None Read/Modify Setting Install Additional Program None Read/Modify Uninstall Additional Program None Read/Modify Copy Extended Features...
  • Page 62: Displaying Web Image Monitor Help

    3. Monitoring and Configuring the Machine Menu Guest mode Administrator mode Home Screen Settings Read Read/Modify • Screen Monitoring Guest mode Administrator mode None Read/Modify Convenient Links Guest mode Administrator mode Read/Modify Read/Modify • Some items are not displayed depending on the security settings. Displaying Web Image Monitor Help When using Help for the first time, clicking the Help button ( ) makes the configuration screen...
  • Page 63 Using Web Image Monitor Download Help by following the instructions on the screen. Store the downloaded compressed file in a given location, and then decompress the file. To create a link for the Help button ( ), save the downloaded Help files on a Web server. Linking the URL of the downloaded Help You can link the URL of the Help file on a computer or Web server to the Help button ( Log in to Web Image Monitor in the administrator mode.
  • Page 64: Machine Status Notification By E-Mail

    3. Monitoring and Configuring the Machine Machine Status Notification by E-mail Whenever a paper tray becomes empty or paper is jammed, an e-mail alert is issued to the registered addresses to notify the machine status. For this notification, you can make the e-mail notification settings. Notification timing and e-mail content can be set.
  • Page 65 Machine Status Notification by E-mail • Service Call Failed • Supply Call Successful • Supply Call Failed • Connection Error between Device and Server for Remote Diagnostics • Hole Punch Receptacle is Full • Replacement Required Soon: Cleaning Web • Confirm Firmware Update •...
  • Page 66: Setting The Account For E-Mail Notification

    3. Monitoring and Configuring the Machine • Items in the Email Communication Port column: Configure the port to be used for access to the mail server. • Items in the Email Notification Account column: Specify these items If you want to use e-mail notification.
  • Page 67: Mail Authentication

    Machine Status Notification by E-mail • The user name and e-mail address that are already registered as e-mail destination cannot be specified as the recipient of e-mail notification. Mail Authentication You can configure mail authentication to prevent illegal use of the mail server. SMTP Authentication Specify SMTP authentication.
  • Page 68: Auto E-Mail Notification

    3. Monitoring and Configuring the Machine 2. Click [Configuration] on the [Device Management] menu. 3. Click [Email] under "Device Settings". 4. Make the following settings in POP before SMTP column: • POP before SMTP: Enable or disable POP before SMTP. •...
  • Page 69 Machine Status Notification by E-mail Contents of Auto e-mail notification If any of the errors specified in [Auto Email Notification] occurs, the machine sends an e-mail with the following subject: "Device Alert Notification: XXXXX (description of the error that has occurred)" The body of the e-mail contains the error details and protocol setting information of the machine.
  • Page 70: On-Demand E-Mail Notification

    3. Monitoring and Configuring the Machine TCP/IP (Ethernet) IPv6: Stateless Address1: ::/0 Stateless Address2: ::/0 Stateless Address3: ::/0 Stateless Address4: ::/0 Stateless Address5: ::/0 MAC Address Ethernet: 00:00:*74:**:**:** Print Server Name: XXXXX NDS Tree: AppleTalk Machine Name: Zone Name: Workgroup Name: WORKGROUP Computer Name: XXXXX Share Name: XXXXX **********************************************************************...
  • Page 71: Format Of On-Demand E-Mail Messages

    Machine Status Notification by E-mail Make the following settings: • Notification Subject: Enter a text string to be added to the subject line of return e-mails. • Notification Message: You can set this according to your needs, for example, the machine's location, service representative contact information.
  • Page 72 3. Monitoring and Configuring the Machine • The body of a request e-mail has no meaning. Any text written in the e-mail body is ignored.
  • Page 73: Remote Maintenance Using Telnet

    Remote Maintenance Using telnet Remote Maintenance Using telnet • Remote Maintenance should be protected so that access is allowed to administrators only. • The password is the same as the one of Web Image Monitor administrator. When the password is changed using "telnet", other's change also.
  • Page 74: Access

    3. Monitoring and Configuring the Machine access Use the "access" command to view and configure access control. You can also specify two or more access ranges. View settings msh> access IPv4 configuration display msh> access "ID" range IPv6 configuration display msh>...
  • Page 75: Autonet

    Remote Maintenance Using telnet • For IPv4 and IPv6, you can select an ID number between 1 and 5. • IPv6 can register and select the range and the mask for each access range. • IPv6 mask ranges between 1 and 128 can be selected. •...
  • Page 76: Devicename

    3. Monitoring and Configuring the Machine Bonjour service name setting You can specify the bonjour service name. msh> bonjour cname "computer name" • The computer name can be entered up to 63 alphanumeric characters. • If you do not specify a character string, the current setting is displayed. Bonjour Installation location information setting You can enter information about the location where the machine is installed.
  • Page 77: Dhcp

    Remote Maintenance Using telnet Printer name configuration msh> devicename name "string" • Enter a printer name up to 31 alphanumeric characters. • Set single names for each printer. Printer name initialization msh> devicename clear name • Reset the machine name to its default. dhcp Use the "dhcp"...
  • Page 78: Dhcp6

    3. Monitoring and Configuring the Machine • Specify whether to obtain the DNS server address from the DHCP server or use the address set by a user. • To obtain the DNS server address from the DHCP server, specify "dhcp". To use the address set by a user, specify "static".
  • Page 79: Dns

    Remote Maintenance Using telnet DUID (DHCP unique ID) deletion and display msh> dhcp6 duid {clear} Use the "dns" command to configure or display DNS (Domain Name System) settings. View settings The following command displays the current DNS settings: msh> dns IPv4 DNS server configuration The following command enables or disables the IPv4 DNS server address: msh>...
  • Page 80: Domainname

    3. Monitoring and Configuring the Machine • update: To delete old records and register new records. • add: To add new records and store the old records. • When CNAME overlaps, it is always changed, irrespective of the settings. CNAME registration msh>...
  • Page 81: Etherauth

    Remote Maintenance Using telnet You can configure the Ethernet interface. View settings The following command displays the current domain name: msh> domainname Interface domain configuration msh> domainname "interface_name" Setting the Domain Name msh> domainname "interface_name" name "domain name" • A domain name can be entered up to 63 alphanumeric characters. Interface Interface configured ether...
  • Page 82: Help

    3. Monitoring and Configuring the Machine • 10f=10 Mbps Full Duplex • 10h=10 Mbps Half Duplex • 100f=100 Mbps Full Duplex • 100h=100 Mbps Half Duplex The default is "auto_100". help Use the "help" command to display the available command list and the procedures for using those commands.
  • Page 83: Ifconfig

    Remote Maintenance Using telnet View settings msh> http HTTP Keep-Alive configuration msh> http keepalive {on|off} HTTP Keep-Alive timeout configuration msh> http keepalive_timeout [1–255] ifconfig Use the "ifconfig" command to view and configure TCP/IP (IP address, subnet mask, broadcast address, default gateway address) for the machine. View settings msh>...
  • Page 84: Info

    3. Monitoring and Configuring the Machine • To get the above addresses, contact your network administrator. • Use the default configuration if you cannot obtain setting addresses. • Use "0x" as the initial two letters of a hexadecimal address. info Use the "info"...
  • Page 85: Passwd

    Remote Maintenance Using telnet Quit telnet msh> logout A confirmation message appears. {yes|no|return} Enter [yes], [no], or [return] by typing the word, and then press the [Enter] key. To save the changes and quit telnet, enter [yes]. To discard the changes and quit telnet, enter [no]. To continue making changes, enter [return] passwd Use the "passwd"...
  • Page 86: Route

    3. Monitoring and Configuring the Machine • If the MTU size of the sent data is larger than the router's MTU, the router will declare it impassable, and communication will fail. If this happens, setting "pathmtu" to "on" optimizes the MTU size and prevents data output failure. •...
  • Page 87: Set

    Remote Maintenance Using telnet • If the prefix of the address is between 1 and 127, the network is selected. If the prefix of the address is 128, the host is selected. • You cannot register a record that has the same destination and prefix as a registered record. •...
  • Page 88 3. Monitoring and Configuring the Machine msh> set ftp6 msh> set rsh msh> set rsh6 msh> set web msh> set snmp msh> set ssl msh> set ssl6 msh> set nrs msh> set rfu msh> set rfu6 msh> set http msh> set http6 msh>...
  • Page 89: Show

    Remote Maintenance Using telnet msh> set ftp {up|down} msh> set ftp6 {up|down} msh> set rsh {up|down} msh> set rsh6 {up|down} msh> set web {up|down} msh> set snmp {up|down} msh> set ssl {up|down} msh> set ssl6 {up|down} • If the Secured Sockets Layer (SSL, an encryption protocol) function is not available for the printer, you cannot use the function by enabling it.
  • Page 90: Smb

    3. Monitoring and Configuring the Machine • For details about network interface board configuration, see page 100 "Understanding the Displayed Information". Use the "smb" command to configure or delete a computer or workgroup name for SMB. View settings msh> smb Computer name settings msh>...
  • Page 91: Snmp

    Remote Maintenance Using telnet msh> smb client port {139|445} Authentication level for SMB client • To view the setting msh> smb client auth • To specify the authentication level for SMB client msh> smb client auth {0|1|2|3} snmp Use the "snmp" command to display and edit the SNMP configuration settings such as the community name.
  • Page 92 3. Monitoring and Configuring the Machine • The machine cannot be accessed from Device Manager NX or SmartDeviceMonitor for Client if "public" is not registered in numbers 1–10. If you change the machine's community name, change the connected computer's community name accordingly. •...
  • Page 93 Remote Maintenance Using telnet sysLocation configuration msh> snmp location "character string" Deleting sysLocation msh> snmp clear location sysContact setting msh> snmp contact "character string" Deleting sysContact msh> snmp clear contact SNMP v1v2 function configuration msh> snmp v1v2 {on|off} • Specify "on" to enable, and "off" to disable. SNMP v3 function configuration msh>...
  • Page 94: Sntp

    3. Monitoring and Configuring the Machine Configuring an SNMP v3 authentication algorithm msh> snmp v3auth algo {md5|sha1} Configuring an SNMP v3 encryption algorithm msh> snmp v3priv algo des/aes Configuring SNMP v3 encryption msh> snmp v3priv mode {auto|on} • Set "auto" for automatic encryption configuration. •...
  • Page 95: Ssdp

    Remote Maintenance Using telnet Time-zone configuration msh> sntp timezone "±hour_time" • You can specify the time difference between the machine clock and NTP server clock. The values are between -12:00 and +13:00. • You can only select either the IP address or host name for the ntp server. ssdp Use the "ssdp"...
  • Page 96: Syslog

    3. Monitoring and Configuring the Machine SSH/SFTP communication login timeout setting msh> ssh logintimeout [0–65535] The default is 300. Setting an open key for SSH/SFTP msh> ssh genkey [{512|768|1024|2048|4096}] The default key length is 2048. Create an open key for SSH/SFTP communication. Usable characters are ASCII 0x20-0x7e (32 bytes) other than "0".
  • Page 97: Web

    Remote Maintenance Using telnet Public URL configuration msh> upnp url "string" • Enter the URL string in the character string. Use the "web" command to display and configure parameters on Web Image Monitor. View settings msh> web URL configuration You can set URLs linked by clicking [URL] on Web Image Monitor. msh>...
  • Page 98: 8021X

    3. Monitoring and Configuring the Machine Viewing settings msh> wins • If the IPv4 address obtained from DHCP differs from the WINS IPv4 address, the DHCP address is the valid address. Configuration msh> wins "interface_name" {on|off} • {on} means "active" and {off} means "inactive". •...
  • Page 99 Remote Maintenance Using telnet Parameter Value configured eap {tls|ttls|leap|peap} {chap|mschap| You can specify the EAP authentication type. mschapv2|pap|md5|tls} tls: EAP-TLS (default) ttls: EAP-TTLS leap: LEAP peap: PEAP chap, mschap, mschapv2, pap, md5, and tls are settings for the phase 2 method, and one of these must be specified if EAP-TTLS or PEAP is selected.
  • Page 100 3. Monitoring and Configuring the Machine Parameter Value configured srvcert {on|off} You can set the server certificate. The default is "off". imca {on|off} You can enable or disable the certificate when the intermediate certificate authority is present. The default is "off". srvid "character string"...
  • Page 101: Using Snmp

    Using SNMP Using SNMP Using the SNMP manager, you can get information about the machine. The SNMP agent operating on UDP is incorporated into the built-in Ethernet board of this machine. This machine also supports SNMPv3, which increases user authentication, data encryption, and access control security.
  • Page 102: Understanding The Displayed Information

    3. Monitoring and Configuring the Machine Understanding the Displayed Information This section explains how to read status information returned by the network interface board. Configuring the Network Interface Board Use the following command to display network interface board settings: • telnet : Use the "show" command. The following items may not be displayed depending on the implementation of applications and optional items.
  • Page 103 Understanding the Displayed Information • IPsec aggressive_mode, Excluded Protocol (https, dns, dhcp, wins) • EncapType • Host name • DNS Domain • Access Control IPv4: Access Entry [1]–[5] IPv6: Access Entry [1]–[5] *4 *5 • SNTP Server • Time Zone •...
  • Page 104 3. Monitoring and Configuring the Machine • Switch Mode, Direct print, Notification • Workgroup name • Computer name • Comment • Share name [1] • Protocol • Client port • Client auth level • Client WSD browse • Client write mode •...
  • Page 105 Understanding the Displayed Information SSDP The following items are displayed: • UUID • Profile • TTL UPnP The following item is displayed: • URL Bonjour The following items are displayed: • Computer Name (cname) • Local Hostname (ether) • Location •...
  • Page 106 3. Monitoring and Configuring the Machine • TimeOut • LoginTimeOut Certificate The following item is displayed: • Verification IEEE 802.1X The following items are displayed: • User name • Domain name • EAP Type • Password • Phase 2 user name •...
  • Page 107: Message List

    Message List Message List This is a list of messages that appear in the machine's system log. The system log can be viewed using the "syslog" command. System Log Information Use the following commands to display the system log information: •...
  • Page 108 3. Monitoring and Configuring the Machine Message Problem and solutions adjust time server <NTP server name> offset: xx ncsd tells you the timing of the NTP server and sec. whether or not the time system clock is set. NTP Server: NTP server name offset: number of seconds of delay (minus number if a time in advance is specified) child process exec error ! (process name)
  • Page 109 Message List Message Problem and solutions DHCPv 6 address not leased (StatusCode = For some reason, IPv6 address cannot be <status code>) obtained from DHCPv6 server. Check the status code description. <StatusCode>: This indicates the status of DHCPv6 message or option. The followings are the status codes when an error occurs.
  • Page 110 3. Monitoring and Configuring the Machine Message Problem and solutions Duplicate IP=<IP address>(from <MAC A conflicting IPv4 or IPv6 address was used. Each address>). IPv4 or IPv6 address must be unique. Check the device address in [MAC address]. httpd start. The httpd has started.
  • Page 111 Message List Message Problem and solutions < Interface >: Subnet overlap. The same IP address (IPv4, or IPv6 address) and the subnet mask are used with another device. LeaseTime=<lease time>(sec), The resource lease time received from the DHCP RenewTime=<renew time>(sec). server is displayed in [lease time] in seconds.
  • Page 112 3. Monitoring and Configuring the Machine Message Problem and solutions SMTPC: failed to connect smtp server. Connection to the SMTP server failed. This could be because no connection to the network has been established, or the network configuration is incorrect, so there is no response from the SMTP server, or the specified SMTP server name is incorrect, or the specified SMTP server IP address could not be found in the DNS server, or a server...
  • Page 113 Message List Message Problem and solutions SMTPC: no smtp server. connection close. Connection to the SMTP server failed due to no response from SMTP. This could be because a server other than the SMTP server has been specified, or the specified SMTP server port number is incorrect.
  • Page 114 3. Monitoring and Configuring the Machine Message Problem and solutions trap account is unavailable. v3Trap cannot be sent. This could be because the Trap destination account is different from the account specified by the machine. Updated (option name)(value) via DHCPv6 The parameter obtained from the DHCP server Server has been updated.
  • Page 115: Registering Addresses And Users

    4. Registering Addresses and Users This chapter describes how to register destinations and users in the Address Book. Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily.
  • Page 116: Managing Users And Machine Usage

    4. Registering Addresses and Users Add to Group You can put registered names of users into a group for easier management. • You can also use Web Image Monitor to register names in the Address Book. • For details about using Web Image Monitor, see Web Image Monitor Help. •...
  • Page 117: Registering User Information

    Registering User Information Registering User Information Register user information including their names. You can register up to 1000 names. Registering Names This section describes how to register names. Press the [Home] key on the bottom left of the control panel, and press the [Address Book Management] icon on the [Home] screen.
  • Page 118: Changing A Registered Name

    4. Registering Addresses and Users Changing a Registered Name Press the [Home] key on the bottom left of the control panel, and press the [Address Book Management] icon on the [Home] screen. If the [Address Book Management] icon does not appear, press the icon at the upper right corner of the screen to switch to the [Home] screen.
  • Page 119 Registering User Information Press [Address Book: Change Order]. Press the name key to be moved. You can also select a name using the number keys. You can rearrange the order of names on the same tab, but names cannot be moved across different tabs.
  • Page 120: Editing Titles

    4. Registering Addresses and Users If you move the selected user key backward, the user key originally located at the selected position is moved forward. You can also select a name using the number keys. Press [Exit]. Press the [User Tools] key. Editing Titles This section describes how to edit titles.
  • Page 121: Deleting A Registered Name

    Registering User Information Press the title key you want to change. Enter the new title, and then press [OK]. Press [OK]. Press the [User Tools] key. Deleting a Registered Name This section describes how to delete a name. Press the [Home] key on the bottom left of the control panel, and press the [Address Book Management] icon on the [Home] screen.
  • Page 122: Authentication Information

    4. Registering Addresses and Users Authentication Information • The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code become invalid. Register user codes to limit and monitor users' usage of the following functions: •...
  • Page 123: Changing A User Code

    Authentication Information Enter the user code using the number keys, and then press the [ ] key. Select the functions to be used with the user code from "Available Functions". Press [OK]. Press the [User Tools] key. • You can enter a one-to eight-digit user code. •...
  • Page 124: Deleting A User Code

    4. Registering Addresses and Users Press the [Home] key on the bottom left of the control panel, and press the [Address Book Management] icon on the [Home] screen. If the [Address Book Management] icon does not appear, press the icon at the upper right corner of the screen to switch to the [Home] screen.
  • Page 125: Displaying The Counter For Each User

    Authentication Information Select the name whose code is to be deleted. Press the name key, or enter the registered number using the number keys. You can search by the registered name or user code. Press [Auth. Info]. Press [Change] to delete the user code, and then press the [ ] key. Press [OK].
  • Page 126: Printing The Counter For All Users

    4. Registering Addresses and Users Select a user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page. Press [Print Counter List] under "Per User". Select the function usage you want to print from [Printer] and [Total Prints]. Press [Print].
  • Page 127: Clearing The Number Of Counters For Each User

    Authentication Information Press [Print Counter List] under "All Users". Select the function usage you want to print from [Printer] and [Total Prints]. Press [Print]. Press [Exit]. Press the [User Tools] key. Clearing the Number of Counters for Each User Press the [User Tools] key. Press [System Settings].
  • Page 128: Clearing The Number Of Counters For All Users

    4. Registering Addresses and Users Press the [User Tools] key. Clearing the Number of Counters for All Users Press the [User Tools] key. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Press [Clear] under "All Users". Select the function usage you want to clear from [Printer] and [All Counters].
  • Page 129: Registering Names To A Group

    Registering Names to a Group Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management. To add names to a group, the groups must be registered beforehand. •...
  • Page 130: Registering Names To A Group

    4. Registering Addresses and Users To change the title, press [ Next], and then press the title key under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]. Added to the list of items in the selected title.
  • Page 131: Adding A Group To Another Group

    Registering Names to a Group Press [OK]. Press the [User Tools] key. Adding a Group to Another Group Press the [User Tools] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Select the group that you want to put into another group.
  • Page 132: Displaying Names Registered In A Group

    4. Registering Addresses and Users Press [OK]. Press [Exit]. Press the [User Tools] key. Displaying Names Registered in a Group You can check the names or groups registered in each group. Press the [User Tools] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group].
  • Page 133: Deleting A Group Within Another Group

    Registering Names to a Group Select the name to remove from a group. Press the name key, or enter the registered number using the number keys. You can search by the registered name or user code. Press [Add to Group]. Select the group from which you want to remove the name.
  • Page 134: Changing A Group Name

    4. Registering Addresses and Users You can search by the registered name. Press [Add to Group]. Select the group from which you want to remove the group. The group key is deselected and the group is deleted from it. Press [OK]. Press [Exit].
  • Page 135: Deleting A Group

    Registering Names to a Group To change the group name and key display, press [Change] under "Name" or "Key Display". Enter a new group name or key display, and then press [OK]. To change the registration number, press [Change] under "Registration No.". Enter a new registration number using the number keys.
  • Page 136: Checking Which Functions Are Available

    4. Registering Addresses and Users Checking Which Functions are Available Using User Authentication, access to the machine by individuals and groups of users is limited according to the login user name and password. Each individual or group of users can use only the functions made available to them by the administrator according to user authentication.
  • Page 137 Checking Which Functions are Available Press [OK]. Press the [User Tools] key.
  • Page 138 4. Registering Addresses and Users...
  • Page 139: Appendix

    5. Appendix Preparing Print Server This section explains how to configure the machine as a Windows network printer. The machine is configured to enable network clients to use it. • To change printer properties in the [Printer] or [Printers and Faxes] window, the following access authentications are required: •...
  • Page 140: Network Settings Requirements List

    5. Appendix Network Settings Requirements List Network Settings Requirements List Specify the [Interface Settings] menu items under [System Settings] to use the printer function. : Necessary Functions to be used : As required Printer Menu User Tools Ethernet Machine IPv4 Address IPv4 Gateway Address Machine IPv6 Address IPv6 Gateway Address...
  • Page 141 MEMO...
  • Page 142 MEMO M238-1020A...
  • Page 144 M238-1020A © 2014,2015...

This manual is also suitable for:

Pro c9110

Table of Contents