Ricoh 4800WD Operating Instructions Manual

Scanner option type 480
Table of Contents

Advertisement

Quick Links

Type for 4800WD/A080/LW411/480W
Printed in Japan
EN USA B188-6607
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety
Information in this manual before using the machine.
B1886607
Operating Instructions
General Settings Guide
Getting Started
Combined Function Operations
Document Server
User Tools (System Settings)
Registering Addresses and Users
Troubleshooting
Remarks
Entering Text
Specifications

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh 4800WD

  • Page 1 Remarks Entering Text Specifications Type for 4800WD/A080/LW411/480W Printed in Japan Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine.
  • Page 2 Introduction In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. This manual contains detailed instructions and notes on the operation and use of this machine. For your c means STAND BY. safety and benefit, read this manual carefully before using the machine.
  • Page 3 Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as a PDF file.
  • Page 4 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Utilities”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTop- Binder Lite in detail.
  • Page 5: What You Can Do With This Machine

    What You Can Do with This Machine The following introduces the functions of this machine, and the relevant manu- als containing detailed information about them. Products marked with * are optional. For details about optional products, see p.22 “Options”, or contact your local dealer. Note ❒...
  • Page 6: Using The Scanner In A Network Environment

    Using the Scanner in a Administrating the Machine/ Network Environment Protecting Documents (Security Functions) AGL012S • You can send scanned documents AGL013S to other network computers using • You can protect documents from e-mail (Sending stored scan file by unauthorized access and stop e-mail).
  • Page 7: Monitoring The Machine Via Computer

    Monitoring the Machine Via Computer AGL014S You can monitor machine status and change settings using a computer. • Using SmartDeviceMonitor for Ad- min, or a Web browser, you can use a computer to view the ma- chine's status, such as checking on paper quantities or misfeeds.
  • Page 8: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ..................i What You Can Do with This Machine..............iii Copier, Printer, and Scanner Functions ..............iii Utilizing Stored Documents..................iii Using the Scanner in a Network Environment ............iv Administrating the Machine/ Protecting Documents (Security Functions) ....iv Monitoring the Machine Via Computer...............
  • Page 9 3. Document Server Relationship between Document Server and Other Functions ....... 39 Document Server Display ..................40 Using the Document Server................41 Storing Data ......................41 Changing a Stored Document's File Name, User Name, or Password....44 Searching for Stored Documents ................44 Printing Stored Documents ..................
  • Page 10 Registering Names to a Group ................90 Registering a New Group ..................90 Registering Names to a Group................. 91 Adding a Group to Another Group ................91 Displaying Names Registered in Groups ..............92 Removing a Name from a Group ................92 Deleting a Group within a Group................
  • Page 11 Other Functions ....................125 Inquiry ........................125 Changing the Display Language ................126 Counter ....................... 127 Displaying the Total Counter..................127 8. Entering Text Entering Text ...................... 129 Available Characters ....................129 Keys ........................129 Entering Text......................130 9. Specifications Main Unit......................131 Options ....................... 135 Roll Feeder Type 480.....................135 Paper Cassette Type 480 ..................135 Carrier Sheet......................136...
  • Page 13: Notice

    Notice Notice To Wireless LAN Interface (optional) Users Notes to users It is strictly forbidden to use antenna(s) except designated. The antenna(s) of this device must not be co-located or operating in conjunc- tion with any other antenna or transmitter. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.
  • Page 14 Note to users in Canada Note: This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) This device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
  • Page 15 Remarque concernant les utilisateurs au Canada Avertissement: Cet appareil numérique de la classe B est conforme á la norme NMB-003 du Can- ada. L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit être prêt á...
  • Page 16: Copyrights And Trademarks

    Copyrights and Trademarks Trademarks ® ® ® Microsoft , Windows and Windows NT are registered trademarks of Mi- crosoft Corporation in the United States and/or other countries. ® Acrobat is a registered trademark of Adobe Systems Incorporated. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 17: Information About Installed Software

    Information about Installed Software expat • The software including controller, etc. (hereinafter "software") installed on this product uses the expat under the conditions mentioned below. • The product manufacturer provides warranty and support to the software of the product including the expat, and the product manufacturer makes the ini- tial developer and copyright holder of the expat, free from these obligations.
  • Page 18 Redistribution and use in source and binary forms, with or without modifica- tion, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 19 • This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD Project. • This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors. • This product includes software developed by Christos Zoulas. •...
  • Page 20 e) The source code of the Sablotron software is available at: http://www.ginger- all.com f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html JPEG LIBRARY • The software installed on this product is based in part on the work of the In- dependent JPEG Group. SASL CMU libsasl Tim Martin...
  • Page 21 Copyright © 1990-2, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
  • Page 22 ® RSA BSAFE ® • This product includes RSA BSAFE cryptographic or security protocol soft- ware from RSA Security Inc. • RSA and BSAFE are registered trademarks of RSA Security Inc. in the United States and/or other countries. • RSA Security Inc. All rights reserved. Samba(Ver 2.2.2-ja-1.1) For SMB transmission, this machine uses Samba ver 2.2.2-ja-1.1 (hereinafter re- ferred to as Samba 2.2.2-ja-1.1).
  • Page 23: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: R WARNING: This symbol indicates a potentially hazardous situation that might result in death or serious injury if you misuse the machine by not following these instruc- tions under this symbol. Be sure to read these instructions, all of which are in- cluded in the Safety Information section.
  • Page 24: Names Of Major Options

    Names of Major Options Major options for this machine are referred to as follows: • Roll Holder Unit Type A → Roll holder • Roll Feeder Type 480 → Lower Tray • Paper Cassette Type 480→ Cut paper tray • Original Tray Type G→ Original tray Terms •...
  • Page 25: Safety Information

    Safety Information When using this machine, the following safety precautions should always be fol- lowed. Safety During Operation In this manual, the following important symbols are used: R WARNING: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. R CAUTION: Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property.
  • Page 26 R CAUTION: • Keep the machine away from humidity and dust. Otherwise a fire or an elec- tric shock might occur. • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. •...
  • Page 27: Positions Of R R R R Warning And R R R R Caution Labels

    Positions of R R WARNING and R R CAUTION Labels This machine has labels for RWARNING and RCAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. AHD016S...
  • Page 28 AHD017S...
  • Page 29: Energy Star Program

    ENERGY STAR Program As an ENERGY STAR Partner, we have determined that this machine model meets the ENERGY STAR Guidelines for energy efficiency. The ENERGY STAR Guidelines intend to establish an international energy-saving system for developing and introducing energy-efficient office equipment to deal with environmental is- sues, such as global warming.
  • Page 30 Specification Copier only Printer and Scanner installed Low power mode Power consumption 195 Wh — Default interval 15 minutes Recovery time 60 seconds Auto Off mode Power consumption 45 W — Default interval 60 minutes — Recovery time 120 seconds —...
  • Page 31: Getting Started

    1. Getting Started Guide to Components ❖ ❖ ❖ ❖ Front AGL050S Upper output stacker Main power switch When the top original exit is selected, Use to turn the main power on or off. originals are stacked here. See “Origi- If you will not use the machine for a nal Output Locations”, Copy Reference.
  • Page 32 Getting Started { { { { Scanner Stop} } } } key Important Use if originals are feeding in slanted, ❒ Do not leave the imaging unit or to cancel scanning while an original open more than 10 minutes, is feeding in. You can also use this to otherwise copy quality may de- release the paper edge hold function.
  • Page 33 Guide to Components Rear output Copy output (rear) auxiliary guide Stacks copies delivered to the rear out- put. When ejecting A0(E) size paper to the rear output, this guide prevents the leading edge of the paper to be caught in the copy output tray. ❖...
  • Page 34: Options

    Getting Started Options Trays AHD019S Original tray Cut paper trays This can stack originals that consist of Load cut paper here. You can load up to many sheets. 250 sheets of A2 size paper for each. See p.135 “Paper Cassette Type 480”. Lower tray (paper roll tray) You can load two paper rolls.
  • Page 35 Guide to Components Paper feed knob Auto feed button Use when loading paper rolls or clear- Use this to clear misfeeds in the paper ing paper jams. See p.105 “Loading feed area. Keep this button pressed to Paper” and p.110 “xClearing Mis- feed the roll paper continuously.
  • Page 36 Getting Started Other Options ❖ ❖ ❖ ❖ Printer unit Allows you to use the printer function. ❖ ❖ ❖ ❖ Scanner unit Allows you to use the scanner function. You can install either Type 480 or RW480 scanner unit. ❖...
  • Page 37: Control Panel

    Control Panel Control Panel This illustration shows the control panel of a machine that has all options fully installed. AHD100S { { { { Program} } } } key (copier mode) Screen contrast knob Adjusts the brightness of the screen. Press to store or select the program mode.
  • Page 38: Display Panel

    Getting Started Operation switch Press to stop a copy job in progress. Press to stop scanning and printing in Press to turn the power on (the On indi- Document Server mode. cator goes on). To turn the power off, { { { { #} } } } key press it again (the On indicator goes off).
  • Page 39: When The Authentication Screen Is Displayed

    Control Panel ❖ ❖ ❖ ❖ When the cut paper trays are installed Common Key Operations The following keys are common to all screens: ❖ ❖ ❖ ❖ Key list Acknowledges a selected function or entered values, and then returns [OK] to the previous display.
  • Page 40 Getting Started B B B B Enter a login user name, and then press [OK]. C C C C Press [Enter] for Login Password. D D D D Enter a login password, and then press [OK]. E E E E Press [Login].
  • Page 41: Turning On The Power

    Turning On the Power Turning On the Power This machine has two power switches: Important ❒ Do not turn off the main power ❖ ❖ ❖ ❖ Operation switch (right side of the switch immediately after turn- control panel) ing it on. Doing so may result in Press to activate the machine.
  • Page 42: Turning Off The Power

    Getting Started ❒ Immediately after the machine Turning Off the Main Power is turned on, or if the tempera- ture is low, or if making a lot of continuous copies (more than Important 30 sheets/A0(E) size), the con- ❒ When the On indicator lights, do tinuous copy speed may be re- n o t t u r n o f f t h e m a i n p o w e r duced to ensure the toner fuses...
  • Page 43: Saving Energy

    Turning On the Power Saving Energy - Auto Off mode If you do not use the machine for a certain period (default: 60 minutes), it - Energy Saver mode automatically turns itself off. This function is called “Auto Off”. When If you do not use the machine for a you press the operation switch, the certain period (default: 60 seconds)
  • Page 44: Anti-Humidity Heater Switch

    Getting Started Anti-humidity Heater Switch During winter or humid periods when there can be sudden changes in temperature, the paper in the paper roll tray, or the cut paper tray can ab- sorb moisture. This may cause copy quality to deteriorate. To prevent this, the machine has a built-in anti-humidity heater.
  • Page 45: Combined Function Operations

    2. Combined Function Operations Switching between Functions You can use this machine not only as a copier, but also as a printer or scanner. The default setting is to display the screen for copying when you turn the power on. You can change the setting. For details about settings, see p.56 “Function Pri- ority”.
  • Page 46 Combined Function Operations Checking the Job List A A A A Press the { { { { Job List} } } } key. AHD102S B B B B Select the job number of the list you want to check. The job list is displayed. The icons below show the operation mode of stored documents.
  • Page 47 Switching between Functions Deleting Jobs Note ❒ If you are unable to delete the job, contact the administrator. A A A A Press the { { { { Job List} } } } key. AHD102S B B B B Select the job number to be deleted. C C C C Press [Delete Job].
  • Page 48: Multi-Access

    Combined Function Operations Multi-Access You can carry out another job using a different function while the current job is being performed. Performing multiple functions simultaneously in this manner is called “Multi-Access”. This allows you to handle your jobs efficiently, regardless of how the machine is being used.
  • Page 49 Multi-Access Function you want to select Function in progress × × ❍ ❍ Operations for Copying ❍ ❍ → Sort ❍ ❍ × × × × × × × Operations for Copying ❍ ❍ × × × × × × ×...
  • Page 50 Combined Function Operations Simultaneous operations are only available after the preceding job documents are all scanned and [New Job] appears. You can scan a document after the preceding job documents are all scanned. Simultaneous operations are possible once you press [New Job]. Depending on the scanner type installed, you may not be able to make copies while the scanner is scanning data to store into the Document Server.
  • Page 51: Document Server

    3. Document Server Relationship between Document Server and Other Functions The following table describes the relationship between the Document Server and other machine functions. Where to store Printing stored Sending docu- Function name Displaying a list documents documents ments Copy/Docu- Copy Available Enabled...
  • Page 52: Document Server Display

    Document Server Document Server Display ❖ ❖ ❖ ❖ Document Server Main Display AHD049S Operating status and messages The numbers of originals, copies, are displayed. and printed pages are displayed. The title of the currently selected The operation keys are displayed. screen is displayed.
  • Page 53: Using The Document Server

    Using the Document Server Using the Document Server ❒ Avoid using a single number or Storing Data consecutive numbers for a pass- word such as “0000” or “1234”, since the numbers like this are easy ❖ ❖ ❖ ❖ File Name to guess, so using them will not Stored documents will automati- provide a worthwhile level of se-...
  • Page 54 Document Server A A A A F F F F Press the { { { { Document Server} } } } key. Press the { { { { Start} } } } key. The document is stored in the Doc- ument Server.
  • Page 55 Using the Document Server When using a name registered in To change a file name the Address Book A A A A Press [Scan Original]. A Select a name from the list, and The Scan Original display appears. then press [OK]. B B B B Press [File Name].
  • Page 56: Changing A Stored Document's File Name, User Name, Or Password

    Document Server C C C C p.43 “To set or change a pass- Enter a four- to eight-digit pass- word”. word using the number keys, and F F F F then press the { { { { #} } } } key. Press [OK].
  • Page 57: Printing Stored Documents

    Using the Document Server Note To Check Details of Stored Documents ❒ To display all files stored in the A A A A Document Server, press [File Select the document. List]. Note ❒ If a password has been set for To Search by User Name the document, enter the pass- A A A A...
  • Page 58 Document Server ❒ If you cannot determine the Note contents of a document by its ❒ The print settings made for print- file name, you can print only the ing in copier mode remain effec- first page of the document for t ive aft er prin ting an d are checking purposes.
  • Page 59 Using the Document Server E E E E A A A A Press the { { { { Start} } } } key. Select the document to be printed. The machine starts printing. To stop printing A Press the { { { { Clear/Stop} } } } key. B Press [Stop].
  • Page 60: Deleting Stored Documents

    Document Server Printing the First Page Deleting Stored Documents You can print the first page of a docu- Important ment selected in the Select Files to ❒ You can store up to 3,000 documents Print display to check its contents. in the Document Server.
  • Page 61: Viewing Stored Documents Using A Web Browser

    Using the Document Server C C C C Note Press [Delete File]. ❒ To enlarge the document pre- view, click [Enlarge Image]. Downloading Stored Documents D D D D Press [Delete] to delete the docu- Note ment. ❒ The optional scanner unit (Type 480) is required to use this func- Viewing Stored Documents tion.
  • Page 62: Settings For The Document Server

    Document Server Settings for the Document Server ❖ ❖ ❖ ❖ System Settings (See p.51 “User Tools (System Settings)”.) Items Default settings General Features Warm Up Notice Copy Count Display Paper Output Exit: Document Front Server Tray Paper Settings Paper Tray Priority: Copier Tray 1 Timer Settings Copier / Document Server...
  • Page 63: User Tools (System Settings)

    4. User Tools (System Settings) User Tools Menu (System Settings) Note ❒ Depending on the options installed, not all items listed below may be displayed. Reference For details about Interface Settings and File Transfer, see “Setting Up the Ma- chine on a Network”, Network Guide. To register addresses and users, specify them under Address Book Manage- ment.
  • Page 64 User Tools (System Settings) User Tools item menu Default Fine Ratio Adjustment: Copier — Fine Ratio Adjustment: Printer — Paper Output Exit: Copier Front Paper Output Exit: Document Serv- Front Job List Time Display On, 15 seconds ❖ ❖ ❖ ❖ Tray Paper Settings (see p.62 “Tray Paper Settings”) User Tools item menu Default Paper Tray Priority: Copier...
  • Page 65 User Tools Menu (System Settings) ❖ ❖ ❖ ❖ Timer Settings (see p.63 “Timer Settings”) User Tools item menu Default Auto Off Timer 60 minute(s) Energy Saver Timer 15 minute(s) Panel Off Timer 1 minute System Auto Reset Timer On, 60 seconds Copier/Document Server Auto On, 60 seconds Reset Timer...
  • Page 66 User Tools (System Settings) ❖ ❖ ❖ ❖ Administrator Tools (see p.65 “Administrator Tools”) For details about Address Book Management, Address Book: Pro- gram/Change/Delete Group, see p.71 “Address Book”. User Tools item menu Default User Authentication Management Administrator Authentication Management Off Program /Change Administrator —...
  • Page 67: Accessing User Tools (System Settings)

    Accessing User Tools (System Settings) Accessing User Tools (System Settings) C C C C User Tools allow you to change or set Select the desired menu, and then defaults. press the desired key. Note Reference ❒ Operations for System Settings dif- p.51 “User Tools Menu (System fer from normal operations.
  • Page 68: Settings You Can Change With User Tools

    User Tools (System Settings) Settings You Can Change with User Tools Reference To access User Tools, see p.55 “Accessing User Tools (System Settings)”. General Features ❖ ❖ ❖ ❖ Panel Tone The beeper (key tone) sounds when a key is pressed. Note ❒...
  • Page 69 Settings You Can Change with User Tools ❒ You can specify an output tray for each function. See the following sec- tions: • p.62 “Paper Tray Priority: Copier” ❖ ❖ ❖ ❖ Function Reset Timer You can set the length of time the machine waits before changing modes when using the multi-access function (see p.36 “Multi-Access”).
  • Page 70 User Tools (System Settings) ❖ ❖ ❖ ❖ Feed Start Method You can specify whether feeding starts automatically or after pressing the { { { { Start} } } } key. Note ❒ Default: Auto ❖ ❖ ❖ ❖ Original Output You can specify the original output tray to use when the power is turned on or the { { { { Clear Modes} } } } key is pressed.
  • Page 71 Settings You Can Change with User Tools ❒ Depending on paper type, operating conditions (low temperature and hu- midity), and paper feeding settings (multiple copies on paper of 542 mm, 22" width or less), toner fusing conditions vary. To improve toner fusing, change the thickness level to 3→2→1.
  • Page 72 User Tools (System Settings) ❖ ❖ ❖ ❖ Fine Ratio Adjustment: Copier ABB009S Depending on paper type, environment, and humidity, copy paper can ex- pand or shrink slightly. This means that the size of the copy and the original do not match. If this happens, specify the vertical and horizontal correction ratio.
  • Page 73 Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Fine Ratio Adjustment: Printer Specifies the fine ratio when the optional printer is installed. Depending on paper type, environment, and humidity, copy paper can expand or shrink slightly. This means that the size of the copy and the original do not match. When the horizontal ratios are almost the same and there are differences be- tween the vertical ratios, you can specify the vertical correction ratio.
  • Page 74: Tray Paper Settings

    User Tools (System Settings) Tray Paper Settings ❖ ❖ ❖ ❖ Paper Tray Priority: Copier You can specify the tray to supply paper for output. Note ❒ Default: Tray 1 ❖ ❖ ❖ ❖ Tray Paper Size: Tray 1, Tray 2 You can specify the size of paper in Tray 1 and Tray 2.
  • Page 75: Timer Settings

    Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Tray Paper Size: Tray 3, Tray 4 (when Cut Paper Trays are installed) You can specify the size of paper in Tray 3 and Tray 4. • The paper sizes you can select are as follows: •...
  • Page 76 User Tools (System Settings) ❖ ❖ ❖ ❖ Energy Saver When no other key operations are performed, the machine switches to low power mode after a specified period. Note ❒ Default: 15 minutes ❒ Enter a time interval between 1 and 240 minutes in one minute increments using the number keys.
  • Page 77: Administrator Tools

    Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Set Date Set the date for the machine's internal clock using the number keys. Note ❒ To change between year, month, and day, press [← ← ← ← ] and [→ → → → ]. ❒...
  • Page 78 User Tools (System Settings) Note ❒ Default: Off Reference For details about Basic Authentication, Windows Authentication, and LDAP Authentication, see Security Reference. ❖ ❖ ❖ ❖ Administrator Authentication Management See Security Reference. ❖ ❖ ❖ ❖ Program / Change Administrator See Security Reference.
  • Page 79 Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Display / Clear / Print Counter per User Allows you to view and print the various counters accessed with users and to set the values to 0. Note ❒ Press [U U U U Prev.] and [T T T T Next] to show all counters. ❒...
  • Page 80 User Tools (System Settings) Note ❒ You can register up to 2,000 names. ❒ You can register up to 500 user codes. ❒ You can also register user codes from SmartDeviceMonitor for Admin. ❖ ❖ ❖ ❖ Address Book: Program / Change / Delete Group Names registered in the Address Book can be added into a group.
  • Page 81 Settings You Can Change with User Tools Press the name key in the place that you want to move to. The name selected in step E moves to the place selected in step F, and the keys for other names will be shifted accordingly. Note ❒...
  • Page 82 User Tools (System Settings) Enter the new name, and then press [OK]. Press [OK]. ❖ ❖ ❖ ❖ Address Book: Select Title You can specify the title to select a name. Note ❒ Default: Title 1 ❖ ❖ ❖ ❖ Auto Delete File You can specify whether documents stored in the Document Server will or will not be deleted after a specified period of time.
  • Page 83: Registering Addresses And Users

    5. Registering Addresses and Users Address Book Registering information such as the You can register and manage the fol- names of users and their e-mail ad- lowing items in the Address Book: dresses in the Address Book allows ❖ ❖ ❖ ❖ Name you to manage them easily.
  • Page 84 Registering Addresses and Users ❖ ❖ ❖ ❖ Protection Managing names in the Address Book You can set protection codes to stop sender's name from being By registering a name and key dis- used or folders from being access- play beforehand, you can specify e- ed without authorization.
  • Page 85 Address Book Preventing unauthorized user access to shared folders from the machine After registering a protection code, you can specify the object of protec- tion to prevent an e-mail destination from being used without permission. You can prevent unauthorized access to registered folders.
  • Page 86: Registering Names

    Registering Addresses and Users Registering Names If you register data such as a name or Note title in advance, you can enter addi- ❒ The name can be used for docu- tional associated information such as ments in the Document Server. an e-mail address or a folder later by For details about the Document selecting the registered names.
  • Page 87: Changing A Registered Name

    Registering Names Changing a Registered Name Deleting a Registered Name A A A A If you delete a name, data associated Press the { { { { User Tools/Counter} } } } key. with that name, such as e-mail ad- B B B B dresses and folder name, are also de- Press [System Settings].
  • Page 88: Registering User Codes

    Registering Addresses and Users Registering User Codes D D D D Register user codes to limit users to Press [Address Book Management]. the following functions and check E E E E their use of each function: Press the name whose code is to be registered, or enter the regis- •...
  • Page 89: Changing A User Code

    Registering User Codes K K K K H H H H Press [Exit]. Press [#]. L L L L Press the { { { { User Tools/Counter} } } } key. To change the available functions A Press [T T T T Next] twice. Changing a User Code B Press the key to select the func- tions to enable them.
  • Page 90: Displaying The Counter For Each User Code

    Registering Addresses and Users F F F F C C C C Press [Auth. Info]. Press [Administrator Tools]. G G G G D D D D Press [Change] to delete the user Press [Display / Clear / Print Counter code, and then press [#]. per User].
  • Page 91: Clearing The Counters

    Registering User Codes E E E E Press [Print Counter List] under All To clear the counters for all user Users. codes A Press [Clear] under All Users. Note ❒ Enter the user code, and then B Select the function usage you press [#] if the user code is regis- w a n t t o c l e a r f r o m [ P r i n t tered.
  • Page 92: E-Mail Destination

    Registering Addresses and Users E-mail Destination B B B B Register e-mail destinations so you Press [System Settings]. do not need to enter an e-mail address every time, and can send scan files from scanner function by e-mail. • It is easy to select the e-mail desti- nation if you register “Name”...
  • Page 93: Changing A Registered E-Mail Destination

    E-mail Destination C C C C Press [Administrator Tools], and then Using the e-mail address as the press [T T T T Next]. sender D D D D Press [Address Book Management]. To enable this selection, you have E E E E to register a user code in advance.
  • Page 94: Deleting A Registered E-Mail Destination

    Registering Addresses and Users Deleting a Registered E-mail Destination To delete a name entirely, see p.75 “Deleting a Registered Name”. A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [System Settings].
  • Page 95: Registering Folders

    Registering Folders Registering Folders By registering a shared folder, you Using SMB to Connect can send scan files to it directly. There are two types of protocol you can use: Note ❒ To register a folder in an FTP serv- •...
  • Page 96 Registering Addresses and Users F F F F L L L L Press [Auth. Info], and then press Enter the password again for con- [T T T T Next]. firmation, and then press [OK]. G G G G M M M M Press [Specify Other Auth.
  • Page 97 Registering Folders Note Using Browse Network to locate ❒ If the entered user name or the folder password is not correct, a A Press [Browse Network]. message appears. Press [Exit], and then enter the user name The client computers sharing and password again.
  • Page 98 Registering Addresses and Users G G G G K K K K Select the items you want to change. Press [Exit]. L L L L Press the { { { { User Tools/Counter} } } } key. To change the protocol A Press [FTP].
  • Page 99: Using Ftp To Connect

    Registering Folders G G G G Press [Specify Other Auth. Info] on Using FTP to Connect the right side of Folder Authenti- cation. Note ❒ To register a shared folder config- Note ❒ When [Do not Specify] is selected, ured in Windows, see p.83 “Using the SMB User Name and SMB SMB to Connect”.
  • Page 100 Registering Addresses and Users N N N N T T T T Press [FTP]. Press [Connection Test] to check the path is set correctly. U U U U Press [Exit]. Note ❒ If the connection test fails, check the settings, and then try again. O O O O Press [Change] under Server Name.
  • Page 101 Registering Folders G G G G K K K K Select the items you want to change. Press [Exit]. L L L L Press the { { { { User Tools/Counter} } } } key. To change the protocol A Press [SMB]. Deleting a registered folder Note ❒...
  • Page 102: Registering Names To A Group

    Registering Addresses and Users Registering Names to a Group D D D D You can register names to a group to Press [Address Book: Program / Change / enable easy management of e-mail Delete Group]. addresses and folders for each group. E E E E Press [New Program].
  • Page 103: Registering Names To A Group

    Registering Names to a Group The group keys that you have se- Registering Names to a Group lected becomes highlighted, and the name is added to them. You can put names that have been registered in the Address Book into a group.
  • Page 104: Displaying Names Registered In Groups

    Registering Addresses and Users The group key that you have se- Removing a Name from a lected becomes highlighted, and the group is added to it. Group A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [System Settings].
  • Page 105: Deleting A Group Within A Group

    Registering Names to a Group Deleting a Group within a Changing a Group Name Group A A A A Press the { { { { User Tools/Counter} } } } key. A A A A B B B B Press the { { { { User Tools/Counter} } } } key. Press [System Settings].
  • Page 106: Deleting A Group

    Registering Addresses and Users G G G G Press [OK]. H H H H Press [Exit]. I I I I Press the { { { { User Tools/Counter} } } } key. Deleting a Group A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [System Settings].
  • Page 107: Registering A Protection Code

    Registering a Protection Code Registering a Protection Code D D D D You can stop sender's names or fold- Press [Address Book Management]. ers being accessed by setting a protec- E E E E tion code. Select the name whose protection code you want to register.
  • Page 108: Registering A Protection Code For A Group

    Registering Addresses and Users E E E E Note Press the group key you want to ❒ You have to select [Sender] protect or enter the registered number using the number keys. under Use Name as in ad- vance. F F F F Press [Protection].
  • Page 109: Registering Smtp And Ldap Authentication

    Registering SMTP and LDAP Authentication Registering SMTP and LDAP Authentication C C C C Press [Administrator Tools], and then SMTP Authentication press [T T T T Next]. D D D D For each user registered in the Ad- Press [Address Book Management]. dress Book, you can register a login E E E E user name and login password to be...
  • Page 110: Ldap Authentication

    Registering Addresses and Users K K K K A A A A Press the { { { { User Tools/Counter} } } } key. Enter the password, and then press [OK]. Note ❒ You can enter up to 64 charac- ters for the password.
  • Page 111 Registering SMTP and LDAP Authentication I I I I Enter the login user name, and then press [OK]. Note ❒ You can enter up to 128 charac- ters for the user name. Reference p.129 “Entering Text” J J J J Press [Change] under Login Pass- word.
  • Page 112 Registering Addresses and Users...
  • Page 113: Troubleshooting

    6. Troubleshooting If Your Machine Does Not Operate As You Want The following chart gives explanations of common problems and messages. If other messages appear, follow the instructions displayed. Note ❒ If you cannot make copies as you want because of paper type, paper size, or paper capacity problems, use recommended paper.
  • Page 114 Troubleshooting Problem Causes Solutions Original images are print- You may have loaded the Load paper correctly. Load paper ed on the reverse side of paper incorrectly. into the cut paper tray print side the paper. down, and into the paper bypass print side up.
  • Page 115: Document Server

    If Your Machine Does Not Operate As You Want Problem Causes Solutions You have tried to delete Files can be deleted by the file cre- “ Selected files files without the authority ator or file administrator. To delete contain file(s) to do so.
  • Page 116 Troubleshooting Problem Action The Copy function is in use. To cancel the job “ Original is being scanned by in process, first press [Exit], and then press the ” appears. another function. { { { { Copy} } } } key. Next press the { { { { Clear/Stop} } } } key. When the message “...
  • Page 117: Loading Paper

    Loading Paper Loading Paper R CAUTION: • Be careful when replacing the roll paper or removing misfed paper by follow- ing the operating instructions properly. Otherwise, an injury may result from the paper cutter inside. R CAUTION: • The fusing section of this machine might be very hot. Caution should be tak- en when removing misfed paper.
  • Page 118: Loading Paper Roll

    Troubleshooting Loading Paper Roll AHD027S Note ❒ Set the paper volume again after loading the paper roll. See p.59 “Paper Vol- ume”. ❒ When you change the paper size or paper type, make settings under System Settings, see p.62 “Tray Paper Size: Tray 1, Tray 2”, p.62 “Tray Paper Size: Tray 3, Tray 4 (when Paper Roll Trays are installed)”...
  • Page 119: Loading Cut Paper

    Loading Paper Loading Cut Paper AHD028S Note ❒ When you load paper of size that cannot be detected automatically, select the paper size in System Settings. See p.63 “Tray Paper Size: Tray 3, Tray 4 (when Cut Paper Trays are installed)”. - When using translucent paper Note ❒...
  • Page 120: D Adding Toner

    Troubleshooting D Adding Toner R WARNING: • Do not incinerate used toner or toner containers. Toner dust might ig- nite when exposed to an open flame. Dispose of used toner containers in accordance with local regulations. R CAUTION: • Keep toner (used or unused) and toner containers out of reach of children. R CAUTION: •...
  • Page 121 DAdding Toner...
  • Page 122: Clearing Misfeeds

    Troubleshooting x Clearing Misfeeds AGL022S R CAUTION: • The fusing section of this machine might be very hot. Caution should be tak- en when removing misfed paper. R CAUTION: • Be careful when replacing the roll paper or removing misfed paper by follow- ing the operating instructions properly.
  • Page 123: Original Misfeeds (P)

    xClearing Misfeeds Original Misfeeds (P) AHD029S Paper Misfeeds in the Paper Tray (A1, A2) AHD030S When you can see the edge of the paper AHD031S...
  • Page 124 Troubleshooting When you cannot see the edge of the paper AHD032S Paper misfeeds in the cut paper trays AHD033S...
  • Page 125: Paper Misfeeds In The Paper Bypass (A3, B)

    xClearing Misfeeds Paper Misfeeds in the Paper Bypass (A3, B) AHD034S...
  • Page 126: Paper Misfeeds In The Rear Paper Output (C)

    Troubleshooting Paper Misfeeds in the Rear Paper Output (C) Important ❒ When clearing the paper, be careful of the auxiliary guide and other protru- sions. Note ❒ Even if only C is displayed, check the front area first and clear any misfed pa- per there.
  • Page 127: Changing The Paper Size

    Changing the Paper Size Changing the Paper Size Preparation When changing the paper size, make sure the paper size in the User Tools menu are correctly set. If you do not, misfeeds might occur. If you load a paper size that is not selected automatically, you need to specify the paper size with the User Tools.
  • Page 128 Troubleshooting Setting the roll holder AHD050S Reference For details about the procedure of loading paper, see p.106 “Loading Paper Roll”. Confirm paper width using the paper roll tray's scale.
  • Page 129: Changing The Cut Paper Size

    Changing the Paper Size Changing the Cut Paper Size AHD028S...
  • Page 130 Troubleshooting...
  • Page 131: Remarks

    7. Remarks Dos and Don'ts R WARNING: • Do not leave the main unit open more than 10 minutes, otherwise • Keep the machine away from copy quality may deteriorate. flammable liquids, gases, and aerosols. A fire or an electric •...
  • Page 132: Toner

    Remarks Toner Handling Toner R WARNING: • Do not incinerate used toner or toner containers. Toner dust might ig- nite when exposed to an open flame. Dispose of used toner containers in accordance with local regulations. R CAUTION: • Keep toner (used or unused) and toner containers out of reach of children. Important ❒...
  • Page 133: Where To Put Your Machine

    Where to Put Your Machine Where to Put Your Machine • Near machines generating ammo- Machine Environment nia, such as a diazo copy machine. • Places where the machine will be Choose your machine's location care- subject to frequent strong vibra- fully.
  • Page 134: Power Connection

    Remarks Power Connection Clearance Around the Machine R WARNING: Place the machine near a power source, and provide the clearance as • Connect the machine only to shown. the power source described on the inside front cover of this manual. Connect the power cord directly into a wall outlet and do not use an extension cord.
  • Page 135: Maintaining Your Machine

    Maintaining Your Machine Maintaining Your Machine If the exposure glass or feed roller are Cleaning inside the Original dirty, you will not be able to make clear copies. Clean them when they Cover become dirty. If you open the original cover, you ❖...
  • Page 136: Cleaning The Imaging Unit

    Remarks Cleaning the feed roller Cleaning the Imaging Unit A Wipe the feed roller with a soft, Clean off toner that may have collect- dry cloth while turning the roller. ed on the imaging area. A A A A Lift the imaging unit opening le- vers on both sides and open the imaging unit.
  • Page 137: Other Functions

    Other Functions Other Functions B B B B Press [Inquiry]. Inquiry The inquiry functions let you confirm the telephone numbers to contact for repairs or to order toner. Be sure to contact your service engineer to veri- fy the following: Inquiry information is displayed.
  • Page 138: Changing The Display Language

    Remarks Changing the Display Language You can change the language used on the display. English is set as default setting. A A A A Press the { { { { User Tools/Counter} } } } key. AHD101S B B B B Press [Español].
  • Page 139: Counter

    Counter Counter Displaying the Total Counter You can display the total length of sheets used or the total area of sheets used. You can also print the counter list. Note ❒ The total length display is set as default. If you want to change it to the total area display, contact your service representative.
  • Page 140 Remarks...
  • Page 141: Entering Text

    8. Entering Text Entering Text This section describes how to enter characters. When you enter a character, it is shown at the position of the cursor. If there is a character at the cursor position, the entered character is shown before that character. Available Characters •...
  • Page 142 Entering Text Entering Text Entering letters A A A A Press [Shift] to switch between uppercase and lowercase. B B B B Press the letters you want to enter. Deleting characters A A A A Press [Backspace] or [Delete All] to delete characters.
  • Page 143: Specifications

    9. Specifications Main Unit ❖ ❖ ❖ ❖ Configuration: Console ❖ ❖ ❖ ❖ Photosensitivity type: OPC drum ❖ ❖ ❖ ❖ Copy process: Dry electrostatic transfer system ❖ ❖ ❖ ❖ Development: Dry two-component magnetic brush development system ❖ ❖ ❖ ❖ Fusing: Heating roll pressure system ❖...
  • Page 144 Specifications ❖ ❖ ❖ ❖ Reproduction ratio: • Metric version: Full-size: 100% Reduce: 25.0%, 35.4%, 50.0%, 70.7% Enlarge: 141.4%, 200.0%, 282.8%, 400.0% Zoom: 25.0 – 400.0% (0.1% increments) • Inch version (Engineering): Full-size: 100% Reduce: 25.0%, 32.4%, 50.0%, 64.7% Enlarge: 129.4%, 200.0%, 258.8%, 400.0% Zoom: 25.0 –...
  • Page 145 Main Unit ❖ ❖ ❖ ❖ Non-reproduction area: • Metric version: • Top: 8 mm • Bottom: 10 mm • Left and Right 2 ± 2 mm • Inch version: • Top: 0.32" • Bottom: 0.40" • Left and Right 0.08" ± 0.08" ❖...
  • Page 146 Specifications ❖ ❖ ❖ ❖ Noise emission Sound Power Level: Stand-by Less than 50.6 dB (A) Copying Less than 65.7 dB (A) Sound Pressure Level Stand-by Less than 38 dB (A) Copying Less than 54.7 dB (A) The above measurements are in accordance with ISO 7779 and are actual values. Measured at the position of the operator.
  • Page 147: Options

    Options Options Roll Feeder Type 480 ❖ ❖ ❖ ❖ Paper sizes: width: 210 – 914 mm, length: 210 – 15000 mm (diameter: 175 mm) ❖ ❖ ❖ ❖ Paper widths: • Metric version 210 mm, 257 mm, 297 mm, 364 mm, 420 mm, 440 mm, 490 mm, 515 mm, 594 mm, 660 mm, 680 mm, 728 mm, 800 mm, 841 mm, 880 mm, 914 mm •...
  • Page 148: Carrier Sheet

    Specifications Carrier Sheet Allows you to load bent, folded, creased, thin, or pasted originals using this sheet. Roll Holder Unit Type A When using several types of paper roll, you can set each type of paper roll with a roll holder unit in advance. Original Tray Type G It is installed in the back of the machine.
  • Page 149: Copy Paper

    Copy Paper Copy Paper Recommended Size and Type The following limitations apply to each paper tray. ❖ ❖ ❖ ❖ Metric version Where paper is Paper type Paper size Number of placed sheets that can be placed Paper roll tray (Tray 3 Plain paper Paper roll –...
  • Page 150 Specifications ❖ ❖ ❖ ❖ Inch version Where paper is Paper type Paper size Number of placed sheets that can be placed Paper roll tray (Tray 3 Plain paper Paper roll – and Tray 4 are option- 13.9 – 29.3 lb 13.9 –...
  • Page 151 Copy Paper Paper roll • If humidity is high, and the paper roll has expanded due to moisture, be sure to cut off approximately 1000 mm (40"), before making copies. • Use a paper roll that has a black core. •...
  • Page 152: Unusable Paper

    Specifications Unusable Paper R CAUTION: • Do not reuse stapled paper. Do not use aluminum foil, carbon-containing paper or other conductive paper. If you do, there is a danger of fire. Important ❒ To prevent faults, do not use any of the following kinds of paper: •...
  • Page 153: Paper Storage

    Copy Paper Paper Storage Note ❒ When storing paper, the following precautions always should be followed: • Do not store paper where it will be exposed to direct sunlight. • Avoid storing paper in humid areas (humidity: 70% or less). •...
  • Page 154: Handling Paper

    Specifications Handling paper Depending on the humidity of the storage environment, handle the paper as fol- lows: AHD039S Note ❒ If humidity is above 60%, turn on the anti-humidity heater. Reference p.32 “Anti-humidity Heater Switch”...
  • Page 155: Index

    INDEX Checking Stored Documents , 45 Checking the job list , 34 A1 is displayed , 111 Check Modes key , 25 A2 is displayed , 111 C is displayed , 114 A3 is displayed , 113 Cleaning inside the original cover , 123 Accessing user tools (System Settings) , 55 Cleaning the imaging unit , 124 Adding a group to another group , 91...
  • Page 156 E-mail destination , 80 Key Counter Management , 66 Energy Saver , 64 Energy Saver key , 25 Energy saver mode , 31 LDAP authentication , 97 ENERGY STAR program , 17 Loading Entering Text , 129 cut paper , 107 Exiting user tools , 55 paper roll , 106 Extended Security , 66...
  • Page 157 Paper output exit Registering SMTP and LDAP authentication , 97 copier , 61 Registering user codes , 76 Document Server , 61 Removing a name from a group , 92 Paper roll , 139 Removing the roll holder , 115 Paper roll tray , 22 Paper size detect method , 59 Paper storage , 141...
  • Page 158 Trays , 22 Turning off the main power , 30 the power , 30 Turning on the main power , 29 the power , 29 Unusable paper , 140 Upper output stacker , 19 Upper tray , 19 , 21 Use LDAP Server , 70 User Authentication Management , 65 User Name...
  • Page 159 Operating Instructions Security Reference Getting Started Preventing Information Leaks Preventing Unauthorized Use of Functions and Settings Enhanced Network Security Management Based on Authentication and Access Control Specifying the Administrator/Security Functions Troubleshooting Appendix Printed in Japan EN USA Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety B188-7571 Information in the "General Settings Guide"...
  • Page 160 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licens- The preceding list is meant as a guide only and is not inclusive.
  • Page 161 Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as a PDF file ❒...
  • Page 162 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Utilities”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTop- Binder Lite in detail.
  • Page 163 TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 1. Getting Started Enhanced Security....................3 Glossary ........................4 Security Measures Provided by this Machine.............5 Preventing Information Leaks ..................5 Preventing Unauthorized Operation ................6 Enhanced Network Security..................7 2.
  • Page 164 5. Management Based on Authentication and Access Control The Management Function ................. 47 Administrators and Users ................... 48 Administrator ......................48 User.......................... 49 Enabling Authentication..................50 Administrator Authentication ..................50 User Authentication....................51 Authentication Information Stored in the Address Book......... 59 Specifying Authentication Information to Log on............
  • Page 165 8. Appendix Operations by the Supervisor................87 Logging on as the Supervisor .................. 87 Logging off as the Supervisor .................. 88 Changing the Supervisor..................88 Resetting an Administrator’s Password ..............89 Machine Administrator Settings................. 91 System Settings ....................... 91 Copier/Document Server Features ................93 Scanner Features.....................
  • Page 167: How To Read This Manual

    How to Read This Manual Symbols The following set of symbols is used in this manual. R WARNING: This symbol indicates a potentially hazardous situation that might result in death or serious injury when you misuse the machine without following the in- structions under this symbol.
  • Page 169: Getting Started

    1. Getting Started Enhanced Security This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 170: Glossary

    Getting Started Glossary ❖ ❖ ❖ ❖ Administrator Administrators manage a specific area of machine usage, such as settings or user registration. There are four types of administrator: user administrator, network adminis- trator, machine administrator, and file administrator. One person can act as more than one type of administrator.
  • Page 171: Security Measures Provided By This Machine

    Security Measures Provided by this Machine Security Measures Provided by this Machine Preventing Information Leaks ❖ ❖ ❖ ❖ Protecting Stored Files from Unauthorized Access You can specify who is allowed to use and access scanned files and the files in Document Server.
  • Page 172: Preventing Unauthorized Operation

    Getting Started ❖ ❖ ❖ ❖ Overwriting the Data on the Hard Disk You can overwrite data on the hard disk. Reference For details, see p.22 “Overwriting the Data on the Hard Disk”. Preventing Unauthorized Operation ❖ ❖ ❖ ❖ Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server.
  • Page 173: Enhanced Network Security

    Security Measures Provided by this Machine Enhanced Network Security ❖ ❖ ❖ ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings.
  • Page 174 Getting Started...
  • Page 175: Preventing Information Leaks

    2. Preventing Information Leaks Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. You can prevent activities such as the sending of stored files by unauthorized users. ❖...
  • Page 176: Assigning Users And Access Permission For Stored Files

    Preventing Information Leaks Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files.
  • Page 177: Assigning The User And The Access Permission For The User's Stored Files

    Specifying Access Permission for Stored Files G G G G Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. H H H H Press [Exit].
  • Page 178 Preventing Information Leaks A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [System Settings]. C C C C Press [Administrator Tools]. D D D D Press [Address Book Management]. If it does not appear, press [T T T T Next].
  • Page 179 Specifying Access Permission for Stored Files I I I I Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. J J J J Press [Exit]. K K K K Select the user who you want to assign an access permission to, and then select the permission.
  • Page 180: Specifying Passwords For The Stored Files

    Preventing Information Leaks Specifying Passwords for the Stored Files This can be specified by the file creator (owner) or file administrator. Specify passwords for the stored files. Provides increased protection against unauthorized use of files. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 181: Unlocking Files

    Specifying Access Permission for Stored Files Unlocking Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files. For details about “Enhance File Protection”, see p.76 “Specifying the Extended Security Functions”.
  • Page 182: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Information Leaks Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on can be designated as the sender to prevent unauthorized access. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 183 Preventing Data Leaks Due to Unauthorized Transmission E E E E Press [On] for “Restrict Use of Destinations”. Note ❒ If you set “Restrict Use of Destinations” to [Off], “Permit Adding of Desti- nations” appears. ❒ If you set “Permit Adding of Destinations” to [On], the user can register destinations by entering them directly.
  • Page 184: Protecting The Address Book

    Preventing Information Leaks Protecting the Address Book You can specify who is allowed to access the data in the address book. By mak- ing this setting, you can prevent the data in the address book being used by un- registered users. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 185 Protecting the Address Book E E E E Select the user or group. F F F F Press [Protection]. G G G G Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups". H H H H Press [New Program]. I I I I Select the users or groups to register.
  • Page 186: Encrypting The Data In The Address Book

    Preventing Information Leaks M M M M Press [OK]. N N N N Press [Exit]. O O O O Press the { { { { User Tools/Counter} } } } key. Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book.
  • Page 187 Protecting the Address Book C C C C Press [Administrator Tools]. D D D D Press [Extended Security]. E E E E Press [On] for “Encrypt Address Book”. F F F F Press [Change] for [Encryption Key]. G G G G Enter the encryption key, and then press [OK].
  • Page 188: Overwriting The Data On The Hard Disk

    Preventing Information Leaks Overwriting the Data on the Hard Disk To use this function, the optional DataOverwriteSecurity unit must be installed. You can overwrite data on the hard disk. Note ❒ Depending on the hard disk capacity and the method of erasing the data, this action may take a few hours.
  • Page 189 Overwriting the Data on the Hard Disk Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”. For details about logging off with administrator authentication, see p.74 “Logging off Using Administrator Authentication”. A A A A Press the { { { { User Tools/Counter} } } } key.
  • Page 190 Preventing Information Leaks Note ❒ Should the main power switch of the machine be turned off before over- writing is completed, the temporary data will remain on the hard disk un- til the main power switch is next turned on and overwriting is resumed. ❒...
  • Page 191: Erase All Memory

    Overwriting the Data on the Hard Disk “Erase All Memory” This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 192 Preventing Information Leaks F F F F Select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. When you select “Random Numbers” A Press [Change]. B Enter the number of times that you want to overwrite using the number keys, and then press [#].
  • Page 193: Preventing Unauthorized Use Of Functions And Settings

    3. Preventing Unauthorized Use of Functions and Settings Preventing Modification of Machine Settings The machine settings that can be modified depend on the type of administrator. Users cannot change the administrator settings. Register the administrators before using the machine. ❖ ❖ ❖ ❖ Type of Administrator Register the administrator on the machine, and then authenticate the admin- istrator using the administrator’s login user name and login password.
  • Page 194: Limiting Available Functions

    Preventing Unauthorized Use of Functions and Settings Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ ❖ ❖ ❖ Available Functions Specify the available functions from the copier, Document Server, and scan- ner functions.
  • Page 195 Limiting Available Functions F F F F Press [Auth. Info]. G G G G In [Available Functions], select the functions you want to specify. If the setting to be specified does not appear, press [T T T T Next]. H H H H Press [OK].
  • Page 196 Preventing Unauthorized Use of Functions and Settings...
  • Page 197: Enhanced Network Security

    4. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator. Specify whether to enable or disable the function for each protocol.
  • Page 198: Access Control

    Enhanced Network Security E E E E Press [Invalid] for the protocol you want to disable. F F F F Press [OK]. G G G G Press the { { { { User Tools/Counter} } } } key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help.
  • Page 199 Preventing Unauthorized Access F F F F Click [Apply]. Access control is set. G G G G Log off from the machine. Reference For details, see the Web Image Monitor Help.
  • Page 200: Encrypting Transmitted Passwords

    Enhanced Network Security Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ ❖ ❖ ❖ Driver Encryption Key To encrypt the login password, specify the driver encryption key for the driv- er used for the machine and the user’s computer.
  • Page 201 Encrypting Transmitted Passwords C C C C Press [Administrator Tools]. D D D D Press [Extended Security]. E E E E For [Driver Encryption Key], press [Change]. F F F F Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters.
  • Page 202: Ipp Authentication Password

    Enhanced Network Security IPP Authentication Password This can be specified by the network administrator. Specify the IPP authentication passwords for the machine using Web Image Monitor. By making this setting, you can encrypt IPP authentication passwords for trans- mission to prevent them from being analyzed. A A A A Open a Web browser.
  • Page 203: Protection Using Encryption

    Protection Using Encryption Protection Using Encryption When you access the machine using a Web browser or IPP, you can establish en- crypted communication using SSL. When you access the machine using an ap- plication such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
  • Page 204: Ssl (Secure Sockets Layer) Encryption

    Enhanced Network Security SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-cer- tificate using the machine, or request a certificate from a certificate authority and install it.
  • Page 205 Protection Using Encryption D D D D Click [Configuration], click [Security], and then click [Certificates]. E E E E Click [Create]. F F F F Make the necessary settings. Reference For details about the displayed items and selectable items, see Web Image Monitor Help.
  • Page 206 Enhanced Network Security G G G G Click [OK]. [Requesting] appears for [Certificate Status] in the [Certificates] area. Use the data in the [Certificate Request Contents:] dialog box to apply to the cer- tificate authority. H H H H Log off from the machine. I I I I Apply to the certificate authority for the server certificate.
  • Page 207 Protection Using Encryption G G G G Click [OK]. [Installed] appears under [Certificate Status] to show that a server certificate for the machine has been installed. H H H H Log off from the machine. Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a cer- tificate authority.
  • Page 208: User Settings For Ssl (Secure Sockets Layer)

    Enhanced Network Security User Settings for SSL (Secure Sockets Layer) If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user’s computer. The network administrator must explain the procedure for installing the certifi- cate to users.
  • Page 209 Protection Using Encryption Setting the SSL / TLS Encryption Mode This can be specified by the network administrator or machine administrator. After installing the server certificate, specify the SSL/TLS encrypted communi- cation mode. By making this setting, you can change the security level. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 210: Snmpv3 Encryption

    Enhanced Network Security SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 211 Protection Using Encryption Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMP V3 Communication] on the machine.
  • Page 212 Enhanced Network Security...
  • Page 213: Management Based On Authentication And Access Control

    5. Management Based on Authentication and Access Control The Management Function The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you can not only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine.
  • Page 214: Administrators And Users

    Management Based on Authentication and Access Control Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 215: User

    Administrators and Users User Users are managed using the personal information registered in the machine’s address book. By enabling user authentication, you can allow only people registered in the ad- dress book to use the machine. Users can be registered in the address book by the user administrator or registered user.
  • Page 216: Enabling Authentication

    Management Based on Authentication and Access Control Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be en- abled.
  • Page 217: User Authentication

    Enabling Authentication F F F F Set "Admin. Authentication" to [On]. [Available Settings] appears. G G G G Select the settings to manage from "Available Settings". Note ❒ To specify administrator authentication for more than one category, repeat steps H H H H Press [OK].
  • Page 218 Management Based on Authentication and Access Control User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒...
  • Page 219 Enabling Authentication G G G G Press [OK]. H H H H Press the { { { { User Tools/Counter} } } } key. Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you can not only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 220 Management Based on Authentication and Access Control Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- tered in the directory server.
  • Page 221 Enabling Authentication Specifying Windows Authentication Note ❒ Under Windows authentication, the machine and domain controller commu- nicate using SSL, so you need to create a server certificate for the domain con- troller. For details about creating the certificate, see p.56 “Creating the Server Certificate”.
  • Page 222 Management Based on Authentication and Access Control You also need to register in the machine the functions available to the global group members. If global groups are not specified, users can use the available functions spec- ified in [Default Group]. If global groups are specified, users not registered in global groups can use the available functions specified in [Default Group].
  • Page 223 Enabling Authentication LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be downloaded to the machine, enabling user authentica- tion without first using the machine to register individual settings in the address book.
  • Page 224 Management Based on Authentication and Access Control E E E E Select [LDAP Authentication]. Note ❒ If you do not want to use user authentication management, select [Off]. F F F F Select the LDAP server to be used for LDAP authentication. G G G G Enter the login name attribute in the [Login Name Attribute] box.
  • Page 225: Authentication Information Stored In The Address Book

    Authentication Information Stored in the Address Book Authentication Information Stored in the Address Book In [User Authentication Management], specify the login user name and password. The login user name and password specified in [User Authentication Management] can be used as the login information for “SMTP Authentication”, “Folder Au- thentication”, and “LDAP Authentication”.
  • Page 226 Management Based on Authentication and Access Control F F F F Press [Auth. Info]. G G G G Specify the login user name and password. H H H H In “Available Functions”, select the functions available to the user. Reference For details about limiting available functions, see p.28 “Limiting Available Functions”.
  • Page 227: If User Authentication Has Been Specified

    If User Authentication Has Been Specified If User Authentication Has Been Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, or LDAP Authentication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, opera- tions are not possible with the machine.
  • Page 228: Log Off (Using The Control Panel)

    Management Based on Authentication and Access Control E E E E Press [Login]. When the user is authenticated, the screen for the function you are using ap- pears. Log Off (Using the Control Panel) Follow the procedure below to log off when Basic Authentication, Windows Au- thentication, or LDAP Authentication is set.
  • Page 229: Auto Logout

    If User Authentication Has Been Specified Auto Logout When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called “Auto Logout”. Specify how long the machine is to wait before perform- ing Auto Logout.
  • Page 230: Menu Protect

    Management Based on Authentication and Access Control Menu Protect The administrator can also limit users’ access permission to the machine’s set- tings. The machine’s System Settings menu can be locked so they cannot be changed. This function is also effective when management is not based on user authentication.
  • Page 231 Menu Protect F F F F Press the { { { { User Tools/Counter} } } } key. Scanner Functions Note ❒ To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
  • Page 232 Management Based on Authentication and Access Control...
  • Page 233: Specifying The Administrator/Security Functions

    6. Specifying the Administrator/Security Functions The Roles of Administrators By limiting the functions available to each user, you can protect the data in the machine from leaks and from being tampered with or deleted. The administra- tors each manage the access limits to the functions they are responsible for. There are four types of administrator, as shown below.
  • Page 234 Specifying the Administrator/Security Functions ❖ ❖ ❖ ❖ User Administrator This is the administrator who manages personal information in the address book. A user administrator can register/delete users in the address book or change users’ personal information. Users registered in the address book can also change and delete their own in- formation.
  • Page 235: Administrator Authentication

    Administrator Authentication Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name and login password already registered in the address book. Windows Authentica- tion and LDAP Authentication are not performed for an administrator, so an ad- ministrator can log on even if the server is unreachable because of a network problem.
  • Page 236 Specifying the Administrator/Security Functions Administrator Authentication To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. If you have not registered any administrator, you can obtain each administra- tor’s authority with the “Administrator 1”...
  • Page 237 Administrator Authentication Specifying Machine Management Authentication A Press [Machine Management], and then press [On]. B Press the item for which you want to specify management. Specifying Network Management Authentication A Press [Network Management], and then press [On]. B Press the item for which you want to specify management. Specifying File Management Authentication A Press [File Management], and then press [On].
  • Page 238: Registering The Administrator

    Specifying the Administrator/Security Functions Registering the Administrator To specify the administrators separately when only “Administrator 1” has been specified, log on using the “Administrator 1” login user name and login pass- word. To register an administrator, you need to specify the authority of one of the administrators.
  • Page 239: Logging On Using Administrator Authentication

    Administrator Authentication G G G G Enter the login user name, and then press [OK]. H H H H Press [Change] for the login password. I I I I Enter the login password, and then press [OK]. J J J J If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 240: Logging Off Using Administrator Authentication

    Specifying the Administrator/Security Functions A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [Login]. C C C C Press [Enter] next to “Login User Name”. D D D D Enter the login user name, and then press [OK].
  • Page 241: Changing The Administrator

    Administrator Authentication Changing the Administrator Change the administrator’s login user name and login password. You can also assign each administrator’s authority to the login user names “Administrator 1” to “Administrator 4” To combine the authorities of multiple administrators, as- sign multiple administrators to a single administrator. For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
  • Page 242: Specifying The Extended Security Functions

    Specifying the Administrator/Security Functions Specifying the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 243: Settings

    Specifying the Extended Security Functions F F F F Press [OK]. G G G G Press the { { { { User Tools/Counter} } } } key. Settings ❖ ❖ ❖ ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication.
  • Page 244 Specifying the Administrator/Security Functions ❖ ❖ ❖ ❖ Permit Adding of Destinations This can be specified by the user administrator. When “Restrict Use of Destinations” is set to [Off]. After directly entering a scanner destination, you can register it in the address book by pressing [ProgDest].
  • Page 245 Specifying the Extended Security Functions ❖ ❖ ❖ ❖ Permit Settings by SNMP V1 and V2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 246: Limiting Machine Operation To Customers Only

    Specifying the Administrator/Security Functions Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 247 Limiting Machine Operation to Customers Only D D D D Press [Service Mode Lock]. E E E E Press [On] and then [OK]. A confirmation message appears. F F F F Press [Yes]. G G G G Press the { { { { User Tools/Counter} } } } key. Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the ma- chine administrator must log onto the machine and cancel the service mode lock.
  • Page 248 Specifying the Administrator/Security Functions...
  • Page 249: Troubleshooting

    7. Troubleshooting Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 250 Troubleshooting Messages Causes Solutions The entered login user name Inquire the user administrator Authentication has or login password is not cor- for the correct login user name failed. rect and login password. The number of users regis- Delete unnecessary user ad- tered in the address book has dresses.
  • Page 251: Machine Cannot Be Operated

    Authentication Does Not Work Properly Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Solution Cannot connect using the The encryption key specified Specify the driver encryption TWAIN driver.
  • Page 252 Troubleshooting Condition Cause Solution Cannot access the machine us- ScanRouter EX Professional V2 does not support user authen- ing ScanRouter EX Profes- tication. sional V2. [ProgDest] does not appear on [Permit Adding of Destinations] is Registration must be done by the scanner’s screen for speci- set to [Off] in [Restrict Use of the user administrator.
  • Page 253: Appendix

    8. Appendix Operations by the Supervisor The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 254: Logging Off As The Supervisor

    Appendix D D D D Enter a login user name, and then press [OK]. Note ❒ When you assign the administrator for the first time, enter “supervisor”. E E E E Press [Enter] for [Login Password]. F F F F Enter a login password, and then press [OK].
  • Page 255: Resetting An Administrator's Password

    Operations by the Supervisor E E E E Under “Supervisor”, click [Change]. F F F F Press [Change] for the login user name. G G G G Enter the login user name, and then press [OK]. H H H H Press [Change] for the login password.
  • Page 256 Appendix G G G G Press [Change] for the administrator you wish to reset. H H H H Press [Change] for the login password. I I I I Enter the login password, and then press [OK]. J J J J If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 257: Machine Administrator Settings

    Machine Administrator Settings Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ General Features All the settings can be specified. ❖ ❖ ❖ ❖ Tray Paper Settings All the settings can be specified.
  • Page 258 Appendix ❖ ❖ ❖ ❖ Administrator Tools • User Authentication Management You can specify which authentication to use. You can also edit the settings for each function. • Administrator Authentication Management Machine Management • Program / Change Administrator Machine Administrator You can change the user name and the full-control user’s authority.
  • Page 259: Copier/Document Server Features

    Machine Administrator Settings Copier/Document Server Features The following settings can be specified. ❖ ❖ ❖ ❖ General Features All the settings can be specified. ❖ ❖ ❖ ❖ Reproduction Ratio All the settings can be specified. ❖ ❖ ❖ ❖ Edit All the settings can be specified.
  • Page 260: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ ❖ ❖ ❖ Top Page • Reset Device ❖ ❖ ❖ ❖ Device Settings • System Device Name Output Tray Paper Tray Priority • Paper All the settings can be specified. •...
  • Page 261: Settings Via Smartdevicemonitor For Admin

    Machine Administrator Settings Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ Device Information • Reset Device • Reset Current Job • Reset All Jobs ❖ ❖ ❖ ❖ User Management Tool The following settings can be specified. •...
  • Page 262: Network Administrator Settings

    Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Interface Settings • Network All the settings can be specified. • IEEE 1394 All the settings can be specified.
  • Page 263: Scanner Features

    Network Administrator Settings Scanner Features The following settings can be specified. ❖ ❖ ❖ ❖ Send Settings • Max. E-mail Size • Divide & Send E-mail Settings via Web Image Monitor The following settings can be specified. ❖ ❖ ❖ ❖ Device Settings •...
  • Page 264 Appendix The IEEE802.11b interface unit option must be installed. The IEEE1394 interface board option must be installed. ❖ ❖ ❖ ❖ Network • Protocol All the settings can be specified. • TCP/IP All the settings can be specified. • NetWare All the settings can be specified.
  • Page 265: Settings Via Smartdevicemonitor For Admin

    Network Administrator Settings Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ NIB Setup Tool All the settings can be specified.
  • Page 266: File Administrator Settings

    Appendix File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator •...
  • Page 267: User Administrator Settings

    User Administrator Settings User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator •...
  • Page 268: Settings Via Smartdevicemonitor For Admin

    Appendix Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ Address Management Tool All the settings can be specified. ❖ ❖ ❖ ❖ User Management Tool • Restrict Access To Device • Add New User •...
  • Page 269: The Available Functions For Using The Files Stored In Document Server

    The Available Functions for Using the Files Stored in Document Server The Available Functions for Using the Files Stored in Document Server The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authori- ties.
  • Page 270: Settings That Can Be Specified In The Address Book

    Appendix Settings That Can Be Specified In the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned “Read-only” authority. •...
  • Page 271 The Available Functions for Using the Files Stored in Document Server Settings User User Ad- Registered Full Con- ministra- User trol Read- Edit Edit / De- only lete ❍ ❍ ❍ ❍ ❍ Registration No. ❍ ❍ ❍ ❍ ❍ Key Display ❍...
  • Page 272 Appendix Settings User User Ad- Registered Full Con- ministra- User trol Read- Edit Edit / De- only lete ❍ ❍ ❍ ❍ Folder SMB/FTP Destina- ❍ ❍ ❍ ❍ SMB: Path tion FTP: ❍ ❍ ❍ ❍ Server Name ❍ ❍...
  • Page 273: User Settings

    User Settings User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting.
  • Page 274 Appendix Tab Names Settings Menu Protect Level 1 Level 2 ❍ ❍ Stamp Back- Size ground Density Num- ❍ ❍ bering ❍ ❍ Preset Stamp Position: COPY Stamp ❍ ❍ Stamp Position: URGENT ❍ ❍ Stamp Position: PRIORITY ❍ ❍ Stamp Position: For Your Info.
  • Page 275: Scanner Features

    User Settings Tab Names Settings Menu Protect Level 1 Level 2 ❍ ❍ Stamp Page Stamp Format Num- ❍ ❍ Font bering ❍ ❍ Size ❍ ❍ Page Numbering in Combine ❍ ❍ Stamp Position: P1, P2… ❍ ❍ Stamp Position: 1/5, 2/5… ❍...
  • Page 276: System Settings

    Appendix System Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Tab Names Settings Admin-...
  • Page 277 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Inter- Network IP Address face ❍...
  • Page 278 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Inter- IEEE Communication Mode face 802.11b...
  • Page 279 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Administrator User Authentication Management Tools ❍...
  • Page 280: Web Image Monitor Setting

    Appendix Web Image Monitor Setting ❖ ❖ ❖ ❖ Device Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 281 User Settings Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ E-mail Administrator E-mail Address ❍...
  • Page 282 Appendix ❖ ❖ ❖ ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 283 User Settings ❖ ❖ ❖ ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 284 Appendix Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ TCP/IP Host Name ❍ ❍...
  • Page 285 User Settings Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ NetWare NetWare ❍ ❍...
  • Page 286: Functions That Require Options

    Appendix Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity unit • Data Encryption Scanner option...
  • Page 287: Index

    INDEX Access Control , 32 Input / Output , 93 Access Permission , 9 Interface , 116 Address Book , 101 Interface Settings , 91 , 96 , 97 Address Management Tool , 102 Administrator , 4 Administrator Authentication , 4 Login , 4 Administrator Tools , 92 , 93 , 96 , 100 , 101 Logout , 4...
  • Page 288 Scan Settings , 93 Security , 98 Send Settings , 93 , 97 Service Mode Lock , 80 SMB , 98 SNMP , 98 SNMPv3 , 98 SSL (Secure Sockets Layer) , 37 Stamp , 93 Supervisor , 67 , 68 System Settings , 96 TCP/IP , 98 Timer Settings , 91...
  • Page 289 Network Guide Getting Started Connecting and Setting Up Monitoring and Configuring the Machine Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in the "General Settings Guide"...
  • Page 290 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice.
  • Page 291 TABLE OF CONTENTS Manuals for This Machine ..................1 How to Read This Manual ..................3 1. Getting Started Functions Available over a Network ..............5 E-mail .........................5 Scan to Folder......................5 Network Delivery Scanner..................5 Network TWAIN Scanner ................... 5 Document Server .......................6 2.
  • Page 292 3. Monitoring and Configuring the Machine Using Web Image Monitor................... 39 Displaying Top Page ....................40 When user authentication is set ................41 About Menu and Mode.....................41 Access in the Administrator Mode................42 Displaying Web Image Monitor Help................43 Remote Maintenance by telnet ................44 Using telnet ......................44 access ........................44 autonet ........................45...
  • Page 293: Manuals For This Machine

    Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader is necessary to view the manuals as a PDF file. ❒...
  • Page 294 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder DeskTopBinder is a utility included on the CD-ROM labeled “Scanner Driver & Utilities”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTopBinder Lite in detail. This guide can be displayed from the [Setup] dialog box when DeskTopBinder Lite is installed.
  • Page 295: How To Read This Manual

    How to Read This Manual Symbols In this manual, the following symbols are used: * The statements above are notes for your safety. Important If this instruction is not followed, paper might be misfed, originals might be damaged, or data might be lost. Be sure to read this. Preparation This symbol indicates prior knowledge or preparation is required before opera- tion.
  • Page 297: Getting Started

    1. Getting Started Functions Available over a Network This machine provides scanner func- Network Delivery Scanner tion over a network. Using the Docu- ment Server function, you can combine You can use the machine as a delivery copied documents and print jobs into a scanner for ScanRouter V2 Profes- single document.
  • Page 298: Document Server

    Getting Started Document Server You can store copy, and scanner doc- uments on the hard disk. Using Desk- TopBinder Lite or a Web browser, you can browse, print, delete, or copy these documents over a network. Reference For details about what settings to make, see p.11 “Setting Up the Ma- chine on a Network”.
  • Page 299: Connecting And Setting Up

    2. Connecting and Setting Up Confirming the Connection When the IEEE 1394 When the interface board (optional) wireless LAN board (optional) is installed. is installed. AGM054S 10BASE-T/100BASE-TX port Wireless LAN port (optional) Port for connecting the 10BASE-T or Port for using the wireless LAN 100BASE-TX cable Note IEEE 1394 ports (optional)
  • Page 300: Connecting To The Ethernet Interface

    Connecting and Setting Up Connecting to the Ethernet Interface Connecting to the IEEE 1394 Interface The network interface board supports 10BASE-T or 100BASE-TX connections. Important ❒ Before making the connection, touch Important ❒ Before making the connection, touch the metallic part to ground yourself. the metallic part to ground yourself.
  • Page 301: Using The Ieee 802.11B (Wireless Lan)

    Confirming the Connection Using the IEEE 802.11b (Wireless LAN) Setting IEEE 802.11b (Wireless LAN) Note ❒ Select [802.11 Ad hoc] mode when connecting Windows XP as a wireless LAN client using Windows XP standard driver or utilities, or when not using the infrastructure mode.
  • Page 302 Connecting and Setting Up Confirming the Connection Checking the machine's radio wave status A A A A When using in infrastructure mode, Make sure the LED of the IEEE 802.11b you can check the machine's radio interface unit is lit. wave status using the control panel.
  • Page 303: Setting Up The Machine On A Network

    Setting Up the Machine on a Network Setting Up the Machine on a Network This section describes the network settings you can change with User Tools (Sys- tem Settings). Make settings according to functions you want to use and the in- terface to be connected.
  • Page 304 Connecting and Setting Up Interface Settings ❍ Ethernet File Transfer Program / Change / Delete Subject See p.27 “File Transfer”. ❍ Scanner Recall Interval Time ❍ Number of Scanner Recalls IEEE 1394 IP Address Interface Settings/IEEE 1394 (IP over 1394) See p.25 “IEEE 1394”.
  • Page 305: Scan To Folder

    Setting Up the Machine on a Network Interface Settings IEEE 802.11b Interface Settings/IEEE Communication Mode (wireless LAN) 802.11b ❍ SSID Setting See p.26 “IEEE 802.11b”. ❍ Channel ❍ WEP (Encryption) Setting ❍ Transmission Speed File Transfer SMTP Server See p.27 “File Transfer”. ❍...
  • Page 306 Connecting and Setting Up Interface Settings ❍ Ethernet Interface Settings/Network Permit SSL / TLS Communication See p.23 “Network”. ❍ File Transfer Default User Name / Password (Send) See p.27 “File Transfer”. ❍ Scanner Recall Interval Time ❍ Number of Scanner Recalls IEEE 1394 IP Address Interface Settings/IEEE 1394...
  • Page 307: Network Delivery Scanner

    Setting Up the Machine on a Network Interface Settings ❍ IEEE 802.11b File Transfer Default User Name / Password (wireless LAN) (Send) See p.27 “File Transfer”. ❍ Scanner Recall Interval Time ❍ Number of Scanner Recalls Appears when the optional IEEE 1394 interface board is installed. Appears when the optional IEEE 802.11b interface unit is installed.
  • Page 308: Network Twain Scanner

    Connecting and Setting Up Interface Settings ❍ IEEE 1394 File Transfer Delivery Option (IP over 1394) See p.27 “File Transfer”. ❍ Scanner Recall Interval Time ❍ Number of Scanner Recalls IEEE 802.11b Interface Settings/Network IP Address (wireless LAN) See p.23 “Network”. ❍...
  • Page 309 Setting Up the Machine on a Network Interface Settings ❍ Ethernet Interface Settings/Network Domain Name See p.23 “Network”. ❍ WINS Configuration LAN Type ❍ Ethernet Speed Effective Protocol ❍ Permit SNMP V3 Communication ❍ Permit SSL / TLS Communication ❍ Host Name IEEE 1394 IP Address...
  • Page 310: Document Server

    Connecting and Setting Up Appears when the optional IEEE 802.11b interface unit is installed. If Ethernet and 802.11b (wireless LAN) are both connected to the machine, the select- ed interface has priority. Check [Effective] is selected for TCP/IP. Document Server Interface Settings Ethernet...
  • Page 311: Network Configuration

    Setting Up the Machine on a Network Interface Settings ❍ IEEE 802.11b Interface Settings/Network Permit SNMP V3 Communication (wireless LAN) See p.23 “Network”. ❍ Permit SSL / TLS Communication ❍ Host Name Interface Settings/IEEE Communication Mode 802.11b ❍ SSID Setting See p.26 “IEEE 802.11b”.
  • Page 312 Connecting and Setting Up Configuring the network using other utilities As well as using the control panel to make network settings, utilities such as a Web Image Monitor can also be used. The following table shows available settings: Note ❒ ❍ Indicates machine settings can be changed. ❒...
  • Page 313 Setting Up the Machine on a Network Web Image Name on the control panel telnet Monitor Interface Ping Command Network Settings ❍ ❍ Permit Encryption Only SNMP V3 ❍ Encryption / Clear Text Communi- cation ❍ Permit SSL Ciphertext Only / TLS Com- ❍...
  • Page 314 Connecting and Setting Up Web Image Name on the control panel telnet Monitor ❍ Interface IEEE Transmis- Auto 802.11b sion Speed Settings ❍ 11Mbps Fixed ❍ 5.5Mbps Fixed ❍ 2Mbps Fixed ❍ 1Mbps Fixed Return to Defaults Print List File Trans- Delivery Option Capture Server IP Address ❍...
  • Page 315 Setting Up the Machine on a Network ❖ ❖ ❖ ❖ Gateway Address Interface Settings A gateway is a connection or inter- change point between two net- works. Configure the gateway Network address for the router or host com- puter used as a gateway. ❖...
  • Page 316 Connecting and Setting Up ❖ ❖ ❖ ❖ LAN Type If [On] is selected, enter the [V V V V WINS Server] IP address as When you have installed the op- “xxx.xxx.xxx.xxx”(“x” indi- tional IEEE 802.11b interface unit, cates a number). select interface, IEEE 802.11b If DHCP is in use, specify the (wireless LAN) or Ethernet.
  • Page 317 Setting Up the Machine on a Network ❖ ❖ ❖ ❖ Permit SSL / TLS Communication ❒ If you use the interface for Eth- ernet and IEEE 1394 (IP over Set the encrypted communication 1394) at the same time, settings of SSL/TLS.
  • Page 318 Connecting and Setting Up Limitation Limitation ❒ Enter [Scope ID] using up to 31 ❒ The characters that can be used alphanumeric characters. are ASCII 0x20-0x7e (32 bytes). Note Note ❒ Default: Off ❒ Default: blank (ASSID) ❒ If blank is specified in 802.11b ❖...
  • Page 319: File Transfer

    Setting Up the Machine on a Network G G G G ❖ ❖ ❖ ❖ Transmission Speed Press the { { { { User Tools/Counter/Inquiry} } } } Specifies the communication key. speed of the IEEE 802.11b (wireless LAN). Note ❒...
  • Page 320 Connecting and Setting Up ❖ ❖ ❖ ❖ SMTP Authentication ❖ ❖ ❖ ❖ POP before SMTP You can configure SMTP authenti- You can configure POP authentica- cation (PLAIN, LOGIN, CRAM- tion (POP before SMTP). MD5, DIGEST-MD5). Authentication prevents unau- Authentication prevents unau- thorized access, by authenticating thorized access, by making users...
  • Page 321 Setting Up the Machine on a Network ❖ ❖ ❖ ❖ POP3 Setting ❖ ❖ ❖ ❖ E-mail Communication Port Specify the POP3 [Server Name]. Specify the [POP3] port numbers. The specified POP3 server name is The specified POP3 port number is used for [POP before SMTP].
  • Page 322 Connecting and Setting Up ❖ ❖ ❖ ❖ Program / Change / Delete E-mail Mes- Note sage ❒ Default: On/3 time(s) You can program, change, or delete ❒ If [On] is selected, the number of the e-mail message used when send- times can be set from 1 to 99 us- ing a scan file as an attachment.
  • Page 323 Setting Up the Machine on a Network Programming an e-mail message Deleting an e-mail message A Press [*Not programed]. A Press [Delete]. B Press [Change], and then enter B Select the e-mail message to the name. delete. T h e c on firm a tio n m ess ag e Reference about deleting appears.
  • Page 324 Connecting and Setting Up Programming a subject A Press [*Not programed], and then enter the text. Reference For more information about entering text, see “Entering Text”, General Settings Guide. B Press [OK]. Changing a subject A Select the subject to change. B Enter the text.
  • Page 325: Ldap Server Settings

    LDAP Server Settings LDAP Server Settings Program the LDAP server to find up Program/Change/Delete LDAP e-mail destinations in the LDAP serv- er Address Book directly. This func- Server tion is possible when sending scan files by e-mail using the scanner func- tion.
  • Page 326: Programming The Ldap Server

    Connecting and Setting Up To finish programming/changing the Programming the LDAP Server LDAP Server A A A A To enter an identification name Press [Change] after setting each item. Register a name for the LDAP server that will appear on the server selection screen of the LDAP search operation.
  • Page 327 LDAP Server Settings ❒ When SSL is set to [On], the port Note number automatically changes ❒ For example, if the search target to “689”. is the sales department of ABC ❒ SSL setting must be enabled on company, enter “dc=sales de- this machine.
  • Page 328 Connecting and Setting Up Note To enter the user name and password ❒ The user name and password When [On] or [High Security] is selected are required for administrator for the authentication setting, use the access to the LDAP server. administrator account name and ❒...
  • Page 329 LDAP Server Settings B B B B B B B B Press [Change] for items you want Press [Change] under [Attribute]. to use as search conditions from the following: [Name], [E-mail Ad- dress], [Company Name], and [De- partment Name]. C C C C Enter the attribute you want to use when searching for e-mail ad- dresses, and then press [OK].
  • Page 330 Connecting and Setting Up...
  • Page 331: Monitoring And Configuring The Machine

    3. Monitoring and Configuring the Machine Using Web Image Monitor Using Web Image Monitor, you can check the machine status and change set- tings. ❖ ❖ ❖ ❖ Available operations The following operations can be remotely performed using Web Image Mon- itor from a client computer.
  • Page 332: Displaying Top Page

    Monitoring and Configuring the Machine Displaying Top Page This section explains the Top Page and how to display Web Image Monitor. A A A A Start your Web browser. B B B B Enter “http: //(machine's address)/” in the address bar of a Web browser. Top Page of Web Image Monitor appears.
  • Page 333: When User Authentication Is Set

    Using Web Image Monitor When user authentication is set Login (using Web Image Monitor) Follow the procedure below to log on when user authentication is set. A A A A Click [Login]. B B B B Enter a login user name and pass- word, and then click [OK].
  • Page 334: About Menu And Mode

    Monitoring and Configuring the Machine About Menu and Mode There are two modes available with Web Image Monitor: user mode and admin- istrator mode. Displayed Items may differ depending on the modes. ❖ ❖ ❖ ❖ About User Mode In the user mode, machine status, and settings can be viewed, but the ma- chine settings cannot be changed.
  • Page 335 Using Web Image Monitor ❖ ❖ ❖ ❖ Administrator Mode In the administrator mode, you can configure various machine settings. AGM059S Status Address Book Machine status, including the amount User information can be registered, of remaining paper in paper trays and displayed, changed, and deleted.
  • Page 336: Access In The Administrator Mode

    Monitoring and Configuring the Machine ❒ By clicking "?", the Help icon in the Access in the Administrator Mode display area, Help for the setting items in the display area appears. Follow the procedure below to access Web Image Monitor in the adminis- Downloading Help trator mode.
  • Page 337: Remote Maintenance By Telnet

    Remote Maintenance by telnet Remote Maintenance by telnet E E E E Important Enter "yes" to save the changes, and then press the { { { { Enter} } } } key. ❒ Remote Maintenance should be password-protected so that access If you do not want to save the chang- is allowed to administrators only.
  • Page 338: Autonet

    Monitoring and Configuring the Machine • ip1394 can be specified only Note when the IEEE 1394 interface is ❒ The access range restricts comput- installed. ers from use of the machine by IP • wlan can be specified only when address.
  • Page 339: Dhcp

    Remote Maintenance by telnet ❖ ❖ ❖ ❖ DNS server address selection dhcp msh> dhcp dnsaddr {dhcp | static} Use the "dhcp" command to config- • Specify whether to obtain the ure DHCP settings. DNS server address from the ❖ ❖ ❖ ❖ View settings DHCP server or use the address set by a user.
  • Page 340 Monitoring and Configuring the Machine ❖ ❖ ❖ ❖ DNS server configuration • add To add new records and store The following command enables the old records. or disables the DNS server ad- dress: • When CNAME overlaps, it is al- ways changed, irrespective of msh>...
  • Page 341: Domainname

    Remote Maintenance by telnet domainname help Use the "domainname" command to Use the "help" command to display display or configure the domain the available command list and the name settings. procedures for using those com- mands. You can configure the Ethernet inter- face, IEEE 1394 interface, or IEEE ❖...
  • Page 342: Ifconfig

    Monitoring and Configuring the Machine ❖ ❖ ❖ ❖ Initializing the machine name for • You can specify either the Eth- ernet interface or IEEE 802.11b each interface interface when using the op- m s h > h o s t n a m e “ i n t e r - tional IEEE 802.11b interface face_name”...
  • Page 343: Route

    Remote Maintenance by telnet ❖ ❖ ❖ ❖ Changing the Password ❖ ❖ ❖ ❖ Setting Default Gateway msh> passwd msh> route add default “gateway” • Enter the current password. ❖ ❖ ❖ ❖ Deleting Specified destination from • Enter the new password. Routing Table •...
  • Page 344: Show

    Monitoring and Configuring the Machine msh> set ftp msh> set http {up | down} msh> set rsh show msh> set web msh> set snmp Use the "show" command to display msh> set ssl network interface board configura- msh> set nrs tion settings.
  • Page 345: Snmp

    Remote Maintenance by telnet ❖ ❖ ❖ ❖ Deleting Comment ❖ ❖ ❖ ❖ Deleting community name msh> smb clear comment msh> snmp “number” clear name ❖ ❖ ❖ ❖ Protocol settings ❖ ❖ ❖ ❖ Access type configuration msh> smb protocol [netbeui {up | down} | tcpip {up | msh>...
  • Page 346 Monitoring and Configuring the Machine ❖ ❖ ❖ ❖ Access configuration ❖ ❖ ❖ ❖ SNMP TRAP configuration msh> snmp “number” {ip/addr msh> snmp trap {v1 | v2 | | ipx} “address” v3} {on | off} • You can configure a host ad- •...
  • Page 347: Sntp

    Remote Maintenance by telnet ❖ ❖ ❖ ❖ Configuring an SNMP v3 encryption ❖ ❖ ❖ ❖ Time-zone configuration algorithm msh> sntp timezone “+/- hour_time” msh> snmp v3auth {md5 | sha1} • You can specify the time differ- ence between the machine clock ❖...
  • Page 348: Wiconfig

    Monitoring and Configuring the Machine ❖ ❖ ❖ ❖ Link name configuration Parameter Value configured You can enter the name for [URL] mode [ap|ad- You can set the in- that appears on Web Image Moni- hoc|802.11adhoc] frastructure mode tor. (ap) , the 802.11 Ad Specify "1"...
  • Page 349 Remote Maintenance by telnet Parameter Value configured Parameter Value configured key [ “key value” ] You can specify keyphrase [ To use this func- val [1|2|3|4] the WEP key when “phrase” ] val tion, set the same entering in hexa- [1|2|3|4] key number and decimal.
  • Page 350: Wins

    Monitoring and Configuring the Machine ❖ ❖ ❖ ❖ Address configuration wins Use the following command to configure a WINS server IP ad- Use the "wins" command to configure dress: WINS server settings. msh> wins “interface_name” ❖ ❖ ❖ ❖ Viewing settings {primary|secondary} “IP address”...
  • Page 351: Snmp

    SNMP SNMP The SNMP agent operating on UDP and IPX is incorporated into the built- in Ethernet board and optional IEEE 802.11b interface unit of this machine. Also, the SNMP agent operating on UDP is incorporated in the optional IEEE 1394 interface board. Using the SNMP manager, you can get information about the machine.
  • Page 352: Understanding The Displayed Information

    Monitoring and Configuring the Machine Understanding the Displayed Information This section explains how to read status information returned by the network in- terface board. Configuring the Network Interface Board Use the following command to display network interface board settings: • telnet : Use the “show” command. See p.52 “show”. Item Description Common...
  • Page 353 Understanding the Displayed Information Item Description EncapType Frame type DHCP Dynamic Host Configuration Protocol (on/off) Host name Address IP address Netmask Subnet mask Broadcast Broadcast address DNS Domain DNS domain type Gateway Default gateway address AccessRange[1]-[5] Access control range Time server NTP server address Time Zone NTP server time difference...
  • Page 354 Monitoring and Configuring the Machine Item Description Channel Channel used Communication mode IEEE 802.11b interface transmitting mode Authentication TX Rate IEEE 802.11b interface speed WEP encryption WEP enabled or disabled Encryption key WEP key IP over 1394 Host name DHCP Address IP address netmask...
  • Page 355 Understanding the Displayed Information Item Description SNMP SNMPv1v2 SNMPv3 protocol v1Trap v2Trap v3Trap SNMPv1v2 Remote Setting SNMPv3 Privacy Shell mode Remote maintenance tool mode...
  • Page 356: Message List

    Monitoring and Configuring the Machine Message List This is a list of messages that appear in the machine's system log. The system log can be viewed using the "syslog" command. System Log Information Use the following command to display the system log information: •...
  • Page 357 Message List Message Problem and solutions multid start. Data transmission service for multiprotocols has started. nbtd start. The nbtd service has started. Name registration failed. name=<NetBIOS Name registration of <NetBIOS Name> failed. name> Change to different NetBIOS name. Name registration success in Broadcast=<Net- Name registration by Broadcast name of <Net- BIOS name>...
  • Page 358 Monitoring and Configuring the Machine Message Problem and solutions SMTPC: failed to connect smtp server. Connection to the SMTP server failed. This could be because: • No connection to the network has been es- tablished. • The network configuration is incorrect, so there is no response from the SMTP server.
  • Page 359: Appendix

    4. Appendix Using DHCP ❒ Ethernet has default interface You can use the machine in a DHCP environment. You can also register priority. the machine NetBIOS name on a • AutoNet: A temporary IP ad- WINS server when it is running. dress starting with 169.254 and If you connect an Ethernet interface not used on the network, is as-...
  • Page 360: Using Autonet

    Appendix Note Using AutoNet ❒ If a static address is not selected, or is set to 0.0.0.0, the interface If the machine IP address is not auto- using the address assigned by matically assigned by the DHCP serv- DHCP is used. er, a temporary IP address starting with 169.254 and not used on the net- Note...
  • Page 361: Precautions

    Precautions Precautions Please pay attention to the following Important when using the network interface ❒ If the machine is set up to con- board. When configuration is neces- nect to the delivery server via a sary, follow the appropriate proce- dial-up router, the router will dures below.
  • Page 362: When The Optional Ieee 802.11B Interface Unit Is Installed

    Appendix Reference When the optional IEEE 802.11b For information about how to interface unit Is Installed check radio wave status, see p.10 “Checking the machine's radio When using the wireless LAN inter- wave status”. face on the network, note the follow- For more information about access ing: point radio wave conditions, refer...
  • Page 363: Information About Installed Applications

    Information about Installed Applications Information about Installed Applications ® RSA BSAFE ® • This product includes BSAFE™ cryptographic or securi- ty protocol software from RSA Se- curity Inc. • RSA is a registered trademark and BSAFE is a registered trademark of RSA Security Inc.in the United States and/or other countries.
  • Page 364: Specifications

    Appendix Specifications Interface 100BASE-TX, 10BASE-T, IEEE 1394 (IP over 1394) , IEEE 802.11b Frame type EthernetII, IEEE 802.2, IEEE 802.3, SNAP Protocol • Network Scanner TCP/IP SMTP • Document Server TCP/IP HTTP • Management Function TCP/IP SNMP HTTP TELNET (mshell) DHCP LDAP SNMP v1/v2...
  • Page 365: Index

    INDEX Access Control , 44 IEEE 802.11b , 55 Administrator's E-mail Address , 29 setting , 9 AutoNet , 68 ifconfig , 49 Autonet information telnet , 45 Network Interface Board configuration , 59 Auto Specify Sender Name , 30 Network interface board configuration , 51 system log , 54 , 63...
  • Page 366 Scanner Recall Interval Time , 30 set , 50 show , 51 smb , 51 SMB Computer Name , 24 SMB Work Group , 24 SMTP Authentication , 28 SMTP Server , 27 SNMP , 58 snmp , 52 sntp , 54 specifications , 72 SSID Setting , 26 TCP/IP address , 49...
  • Page 367 Copyright © 2005...
  • Page 368 GB GB EN USA B765-8710...
  • Page 369 User Tools (Copier / Document Server Features) Specifications Type for 4800WD/A080/LW411/480W Printed in Japan Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety EN USA B188-6707 Information in the "General Settings Guide"...
  • Page 370 Introduction In accordance with IEC 60417, this machine uses the following symbols for the main power switch: a means POWER ON. This manual contains detailed instructions and notes on the operation and use of this machine. For your c means STAND BY. safety and benefit, read this manual carefully before using the machine.
  • Page 371 Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as a PDF file.
  • Page 372 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Utilities”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTop- Binder Lite in detail.
  • Page 373 What You Can Do with This Machine AHD001S...
  • Page 374 AHD002S...
  • Page 375 AHD051S...
  • Page 376 TABLE OF CONTENTS Manuals for This Machine ..................i What You Can Do with This Machine..............iii How to Read this Manual ..................1 Names of Major Options ....................2 Terms .........................2 Control Panel......................3 Display Panel......................5 1. Basics Before Copying ......................7 Original Output Locations...................8 Adjusting the Original Tray..................
  • Page 377 Format Overlay ......................46 Erase Border ......................48 Erase Inside ......................49 Erase Outside ......................50 Margin Adjustment ....................50 Background Numbering ................... 51 Preset Stamp ......................52 User Stamp ......................53 Date Stamp ......................56 Page Numbering ...................... 58 Adjust Print Position ....................
  • Page 378 viii...
  • Page 379: How To Read This Manual

    How to Read this Manual Symbols The following set of symbols is used in this manual. R WARNING: This symbol indicates a potentially hazardous situation that might result in death or serious injury when you misuse the machine without following the in- structions under this symbol.
  • Page 380: Names Of Major Options

    Names of Major Options Major options for this machine are referred to as follows: • Roll Holder Unit Type A→ Roll holder • Roll Feeder Type 480→ Lower tray • Paper Cassette Type 480 → Cut paper tray • Original Tray Type G → Original tray Terms •...
  • Page 381: Control Panel

    Control Panel This illustration shows the control panel of a machine that has all options fully installed. AHD100S { { { { Check Modes} } } } key Screen contrast knob Adjusts the brightness of the screen. Press to check the entered copying set- tings.
  • Page 382 Operation switch Press this switch to turn the power on (the On indicator goes on). To turn the power off, press this switch again (the On indicator goes off). See ”Turning On the Power”, General Settings Guide. { { { { Sample Copy} } } } key Press to make a single sample copy be- fore starting a long copy run.
  • Page 383: Display Panel

    Display Panel The function items displayed serve as selector keys. You can select or specify an item by lightly pressing them. When you select or specify an item on the display panel, it is highlighted like this: . Keys appearing as cannot be used.
  • Page 385: Basics

    1. Basics Before Copying Before you start copying, specify the original and copy paper locations. ❖ ❖ ❖ ❖ Paper Capacities For Each Original/Paper Output Original output Capacities Original Exit : Top A1 (D)L or smaller: 50 sheets (plain paper) 20 sheets (translucent paper) •...
  • Page 386: Original Output Locations

    Basics Copy output Capacities Copy Output: Roll paper Plain paper (at normal tem- 99 sheets Front perature and humidity): Plain paper (at high or low 10 sheets (A1L to A2) temperature and humidity): 99 sheets (smaller than A2) Translucent paper(vellum): 10 sheets Film: 1 sheet...
  • Page 387 Before Copying C C C C Important Press [Rear ], and then press [OK]. ❒ When using the optional carrier sheet, set the original output loca- tion to rear original exit. If the orig- inal output location is set to top original exit, the original may be damaged.
  • Page 388: Adjusting The Original Tray

    Basics D D D D After the original has been eject- Front output ed, pull the document roller for- A A A A ward and remove the original. Press [Front] under Copy Output Location. Adjusting the Original Tray When using the optional original tray, adjust the hook position to the size of the original.
  • Page 389 Before Copying Using the rear output to eject A0 (E) K Paper When ejecting A0 (E) Ksize paper to the rear output, the leading edge of the paper may become caught in the back of the copy output tray. You can prevent this by attaching the copy output auxiliary guide.
  • Page 390: Originals

    Basics Originals Sizes and Weights of Recommended Originals ❖ ❖ ❖ ❖ Metric version Where original Original size Original weight is placed Original table Standard sizes: A0K, A1KL, A2KL, A3KL, 20.9 – 157 g/m A4KL, B1K, B2KL, B3KL, B4KL 0.03 – 1 mm thick origi- nals Custom sizes: Length 210 –...
  • Page 391 Originals Originals that should be scanned using the carrier sheet The following type of originals should be mounted on the carrier sheet. You should also use the carrier sheet for important originals and for originals you will copy repeatedly. • Cut and pasted originals •...
  • Page 392 Basics • Originals not made of paper (such as glass, metal) • Originals with a roll diameter smaller than φ35 mm (φ1.4") • Originals with a roll diameter larger than φ110 mm (φ4.3") Flatten curled originals so they fit within the range shown below: •...
  • Page 393: Placing Originals

    Placing Originals Placing Originals ❒ Do not push the original guide Note side fence with force. ❒ Place the original after any correc- B B B B tion fluid or ink has completely Using both hands, carefully insert dried. Not taking this precaution the original between the original will result in a dirtied exposure guides, copy side up.
  • Page 394: Original Orientation

    Basics ❒ When inserting long length orig- Original Orientation inals, there may be some move- me nt t o e it her side. If thi s Place the original of the same orienta- happens, correct the movement tion as the copy paper on the original manually while feeding the table.
  • Page 395: Placing Custom Size Originals

    Placing Originals F F F F Place the originals, and then press Placing Custom Size Originals the { { { { Start} } } } key. When placing custom size originals, specify the size of the originals. Wide Scan Note The machine checks the original ❒...
  • Page 396: Setting The Carrier Sheet

    Basics ❖ ❖ ❖ ❖ Inch version (Engineering) A A A A Press [Orientation/Custom]. Original width Scanning width BK(11") Over than AK(8 ") and less than 9" Over than BK(11") and CK(17") less than 12" Over than CK(17") and DK(22") less than 18"...
  • Page 397 Placing Originals A A A A Open the carrier sheet with the transparent sheet face up, and then insert the original also face ZEDP020E Note ❒ Align the original with the fold of the carrier sheet. B B B B Using both hands, hold the origi- nal copy side up, and carefully in- sert the folded edge of the carrier...
  • Page 398 Basics...
  • Page 399: Copying

    2. Copying Basic Procedure B B B B Preparation Make sure no previous settings remain. When User Code Authentication is set, the screen for entering a user Note code will be displayed. Enter your ❒ To clear settings, press the user code (up to eight digits) using { { { { Clear Modes} } } } key.
  • Page 400: Original Counter/Reset

    Copying E E E E Enter the number of copies using the number keys. - To stop the machine during a multi-copy run Note ❒ The copy quantity is from 1 to Press the { { { { Clear/Stop} } } } key after the originals have fed in.
  • Page 401: Auto Start

    Basic Procedure ❒ To switch the display to the cur- Auto Start rent copy job press [Reserved Job], followed by [Printing], and If you make settings and scan the then [Exit]. originals while the message “ Scan- ” ning originals can be started. Editing Job Preset and “...
  • Page 402: Interrupt Copy

    Copying To delete a job after checking its Interrupt Copy contents Use this function to interrupt a long A A A A copy job to make urgently needed Check the contents of the job. copies. B B B B Press [Delete Job]. A A A A Press the { { { { Interrupt} } } } key.
  • Page 403: Copying From The Paper Bypass

    Basic Procedure E E E E A A A A Press the { { { { Interrupt} } } } key again. Press [Bypass]. The Interrupt key indicator goes off. Resuming the previous copy job A Place your originals, and then press the { { { { Start} } } } key.
  • Page 404 Copying F F F F Insert the paper in the paper by- pass, copy side up. The paper feeds in automatically and copying starts. AGL059S Important ❒ Insert the paper evenly on both sides and support it with your hands until it feeds in. Note ❒...
  • Page 405: Copier Functions

    Copier Functions Copier Functions ❖ ❖ ❖ ❖ Others – Generation Selecting Original Type For originals that are copied. This will copy the image while stopping Setting the width of the characters ex- panding. It also eliminates any The following image quality modes specks on the image.
  • Page 406: Adjusting Copy Image Density

    Copying Note Adjusting Copy Image Density ❒ If Auto Image Density is not selected, press [Auto Image Preparation Density]. You can adjust the copy density to match your originals. There are Manual image density three types of density function: A If Auto Image Density is se- ❖...
  • Page 407: Selecting Copy Paper

    Copier Functions Auto paper select Selecting Copy Paper A A A A Make sure [Auto Paper Select] is se- Preparation lected. There are two ways to select copy paper: Note ❒ When Auto Paper Select is not ❖ ❖ ❖ ❖ Auto Paper Select selected, press [Auto Paper Se- The machine detects the origi- lect].
  • Page 408: Setting The Length Of Copy Paper Cut

    Copying Manual paper select - Rotate Copy A A A A Select the paper tray or paper by- If the original's width is different to pass. that of the paper set in the paper roll tray, or the original's orientation ( K The selected tray key is highlight- or L ) is different to that of the paper loaded in the cut paper trays, this...
  • Page 409 Copier Functions ❖ ❖ ❖ ❖ Preset Cut ❖ ❖ ❖ ❖ Inch version (Architecture) Cuts the paper at a preset size, Paper width 36" 24" 18" 12" regardless of the size of the orig- inal. You can use this to copy Paper type different sized originals to the Plain...
  • Page 410 Copying ❖ ❖ ❖ ❖ Inch version (Engineering) Preset cut Roll paper Preset K Preset L A A A A width Select a paper tray. 34" 44" 22" B B B B Select a preset cut size. 22" 34" 17" 17"...
  • Page 411: Sort/Rotate Sort

    Copier Functions B B B B ❖ ❖ ❖ ❖ Rotate sort Enter the length using the num- Alternate sets are rotated (KL) ber keys, and then press [OK] or and delivered to the output tray. the { { { { #} } } } key. ZEDG040E Note ❒...
  • Page 412 Copying Note Sample Copy ❒ If you press [Suspend] after Use this function to check the copy checking the results, return to settings before making a long copy step to adjust the copy set- run. tings as necessary. Depending on the combination of func- Preparation tions, you may not be able to Select [Press Start Key] under Feed...
  • Page 413: Auto Reduce/Enlarge

    Copier Functions ❖ ❖ ❖ ❖ Metric version Auto Reduce/Enlarge Original size Copy size The machine chooses an appropriate A0, A1, A2, A3, A4, magnification based on the paper and B1 JIS, B2 JIS, B3 A1KL original sizes you select. This is useful JIS, B4 JIS A2KL to copy different size originals to...
  • Page 414: Preset Reduce/Enlarge

    Copying A A A A ❖ ❖ ❖ ❖ Inch version Press [User Auto R/E]. Engineering Enlargement ratios: 129.4%, 200.0%, 258.8%, 400.0% Reduction ratios: 25.0%, 32.4%, 50.0%, 64.7% Architecture Enlargement ratios: 133.3%, 200.0%, 266.7%, 400.0% Reduction ratios: 25.0%, B B B B 33.3%, 50.0%, 66.7% Check that the combination se- lected for User Auto Reduce/En-...
  • Page 415: Zoom

    Copier Functions B B B B A A A A Select a ratio, and then press [OK]. Press [Reduce / Enlarge]. Using the number keys Zoom A Press [Mag. Ratio]. You can change the magnification in 0.1% (or 1%) increments. B Enter the ratio using the num- ber keys.
  • Page 416: Size Magnification

    Copying C C C C Note Enter the length of the original ❒ Press [–0.1%] or [+0.1%] to ad- using the number keys, and then press [#]. just the ratio in 0.1% incre- ments. ❒ If you make a mistake, press [–1%], [–0.1%], [+0.1%] or [+1%] to readjust the ratio.
  • Page 417: Directional Magnification (%)

    Copier Functions D D D D Press [Direct. Mag.%] Directional Magnification (%) Copies can be reduced or enlarged at To enter the ratio using the different magnifications, horizontally number keys and vertically. Use this function to al- A Press [Horizontal]. ter the image.
  • Page 418: Directional Size Magnification (Inch)

    Copying Note Note ❒ Pressing [n ❒ You can enter sizes within the fol- n ] or [o o ] changes the ratio in increments of lowing ranges: 0.1%. Pressing and holding Metric 1–9999 mm (increments of 1 mm) down [n n ] or [o o ] changes it version...
  • Page 419: Fine Magnification

    Copier Functions G G G G Note Enter the length for “Copy: Verti- ❒ Fine Magnification is used for orig- cal” using the number keys, and then press [#]. i na ls t ha t h av e a lre a d y b e e n scanned.
  • Page 420: Combine

    Copying ❖ ❖ ❖ ❖ Combine 8 Pages Note Copies 8 one-sided originals onto ❒ You can also make these set- one side of a sheet. tings in "Fine Ratio Adjustment: Copier" under System Settings. If you specified the ratio in both System Settings and this func- tion menu, the resulting settings will be the sum of the set value.
  • Page 421: Image Repeat

    Copier Functions B B B B A A A A Press [Combine]. Press [Edit / Stamp]. C C C C B B B B Select the number of originals to Press [Edit Image]. combine. C C C C Press [Image Repeat]. D D D D Press [OK].
  • Page 422: Positive/Negative

    Copying A A A A A A A A Press [Edit / Stamp]. Press [Edit / Stamp]. B B B B B B B B Press [Edit Image]. Press [Edit Image]. C C C C C C C C Press [Double Copies]. Press [Positive/Negative].
  • Page 423: Mirror Image

    Copier Functions B B B B Press [Edit Image]. Mirror Image C C C C Press [Partial Copy]. Copies by reversing the image from D D D D left to right, as reflected in a mirror. Press [Y1], and then enter the scan start position (the length from the leading edge of the original) us- ing the number keys.
  • Page 424: Format Overlay

    Copying D Place the third original. Format Overlay The machine makes a compos- ite copy of the first and third Use this function to combine two im- originals. ages (original + format) onto one E Place any further originals, as copy using the first original.
  • Page 425 Copier Functions B Select the original orientation. Program/Delete Overlay Format Preparation The maximum size of original size to be stored is A0(E). You cannot store long length originals. C Place the original, and then A A A A Make sure the machine is ready to press [Start Scanning].
  • Page 426: Erase Border

    Copying A A A A Important Press [Edit / Stamp]. ❒ You cannot restore a format that has been deleted. Note ❒ Press [Stop] if you do not want to delete the existing format. C Press [Exit] twice. Returns to the initial User Tools B B B B / Counter display.
  • Page 427: Erase Inside

    Copier Functions D D D D A A A A Press [OK] twice. Press [Edit / Stamp]. Limitation ❒ For details about the scan size limitations when using the Erase Border function together with the other functions, see p.104 “Scan Size Limitations, by Function”.
  • Page 428: Erase Outside

    Copying B B B B Press [Erase]. Erase Outside C C C C Press [Erase Outside]. Use this function to copy the original D D D D while erasing outside a specified area. Enter the length of “X1” using the number keys, and then press [#].
  • Page 429: Background Numbering

    Copier Functions D D D D Preparation Use [-] or [+] to specify the margin, and then press [OK]. You can select the following types of margin for this function: • Top (+): margin at the leading edge of the original (top of copy).
  • Page 430: Preset Stamp

    Copying A A A A • Stamp types are as follows: Press [Edit / Stamp]. • You can change the position and orientation of the stamp. • You can use this function with up to four other stamping functions. ❖ ❖ ❖ ❖ Setting Originals and Stamp Posi- B B B B Press [Stamp].
  • Page 431: User Stamp

    Copier Functions A A A A Press [Edit / Stamp]. User Stamp You can store frequently used charac- ters or symbols, and then use them as a stamp. B B B B Press [Stamp]. C C C C Press [Preset Stamp]. D D D D Select the stamp type.
  • Page 432 Copying ❖ ❖ ❖ ❖ Setting Originals and Stamp Posi- A A A A Press [Edit / Stamp]. tion/Orientation B B B B Press [Stamp]. C C C C Press [User Stamp]. D D D D Select the number for the user stamp.
  • Page 433 Copier Functions F F F F [Program / Delete Stamp]. Program/Delete User Stamp Storing/Overwriting a user stamp Note ❒ The range of stamp images for A Press [Program], and then press readability is 10–432 mm high the stamp number (1–4) you (0.4"–17") and 10–297 mm wide want to program.
  • Page 434: Date Stamp

    Copying F Adjust the original guides to G G G G Press the { { { { User Tools/Counter} } } } key. A3 (B)K K or A4 (A)L L , and then The default settings are changed, place the original for user and the machine is ready to make stamp on the original table.
  • Page 435 Copier Functions ❖ ❖ ❖ ❖ Setting Originals and Date Stamp Po- B B B B Press [Stamp]. sition/Orientation C C C C Press [Date Stamp]. D D D D Press [All Pages] or [1st Page Only] to select the print page. Changing the date format A Press [Change Format].
  • Page 436: Page Numbering

    Copying ❖ ❖ ❖ ❖ Stamp position and orientation of Page Numbering originals Use this function to print page num- bers on your copies. This function is effective when the Sort function is selected. • There are six types of Page Num- bering (“n”...
  • Page 437 Copier Functions C C C C Press [Page Numbering]. Specifying the first printing page and D D D D start number Select the page numbering for- mat. If you selected (P1, P2…, -1-,-2-…, P.1, P.2…, 1, 2…, ) Note ❒ The following explanation uses P1, P2...
  • Page 438 Copying Note If you selected (1/5, 2/5…) ❒ The example below shows the A A A A first printing page as “2”and the Press [Change] on the right side. start number as “3”. B B B B Press [First Printing Page], then en- ter the original page number from which to start printing using the number keys, and then press the...
  • Page 439: Adjust Print Position

    Copier Functions E E E E D D D D Press [Total Pages], enter the total Press [Numbering from / to], and then number of original pages using en ter the p ag e nu mb er fr om the number keys, and then press which to start numbering using the { { { { #} } } } key.
  • Page 440 Copying Preparation You can select the following types of margin for this function: • [↑ ↑ ↑ ↑ ] (Top): shift towards the leading edge of the original (top of copy). • [↓ ↓ ↓ ↓ ] (Bottom): shift towards the trailing edge of the original (bottom of copy).
  • Page 441: Storing Data In The Document Server

    Storing Data in the Document Server Storing Data in the Document Server The Document Server enables you to Reference store documents in memory and print For details about how to regis- them as you want. ter the user name, file name, or For details, see General Settings Guide.
  • Page 442 Copying - Use the Reduce/Enlarge function to print the stored documents Press the { { { { Document Server} } } } key. Select the document to be printed. Press [Print Settings]. Press [Reduce / Enlarge]. Select a ratio, and then press [OK]. Enter the number of copies using the number keys.
  • Page 443: Programs

    Programs Programs C C C C You can store frequently used copy Press [Register]. job settings in machine memory and recall them for future use. Note ❒ You can store up to 10 programs. ❒ You can select the standard mode or Program No.10 as the default mode D D D D to be set when modes are cleared or...
  • Page 444: Changing A Stored Program

    Copying Changing a Stored Program Deleting a Program A A A A A A A A Press the { { { { Program} } } } key. Check the program settings. B B B B Note Press [Delete]. ❒ To check the contents of a pro- C C C C Press the number of the program gram, recall it.
  • Page 445: Troubleshooting

    3. Troubleshooting If Your Machine Does Not Operate As You Want When a Message Appears The following chart contains explanations of common messages. If other mes- sages appear, follow the instructions displayed. Message Problem/Causes Solutions The main power has just been Wait for the machine to fully Please wait.
  • Page 446 Troubleshooting Message Problem/Causes Solutions The size of the paper loaded is Check the settings for Re- Check paper size. different to the size of the duce/Enlarge, etc., and then copy paper size. try again. The scanned original is too big You cannot use rotate sort Rotate Sort is not to rotate.
  • Page 447 If Your Machine Does Not Operate As You Want Message Problem/Causes Solutions The use of this function is re- Contact the administrator. You do not have the stricted to authenticated users privileges to use only. this function. The entered login user name Inquire the user administrator Authentication has or login password is not cor-...
  • Page 448: If You Cannot Make Clear Copies

    Troubleshooting If You Cannot Make Clear Copies Problem Causes Solutions Black or white streaks appear Image density is too dark. Adjust image density. See p.28 on copies. “Adjusting Copy Image Den- sity”. The exposure glass or feed Clean the exposure glass or roller is dirty.
  • Page 449 If You Cannot Make Clear Copies Problem Causes Solutions Copies are too light. Image density is too light. Adjust the image density set- ting. See p.28 “Adjusting Copy Image Density”. Damp or rough grain paper is For good copy quality, use used.
  • Page 450 Troubleshooting Problem Causes Solutions The background on translu- More than 50 copies are being Select a proper paper thick- cent paper is dirty. made of originals longer than ness for the copy paper. See 1189 mm (46.9") with solid “Paper Thickness: Paper blocks of color (2 mm ×...
  • Page 451: If You Cannot Make Copies As You Want

    If You Cannot Make Copies As You Want If You Cannot Make Copies As You Want This section explains causes of, and solutions for, unexpected copy results. Problem Causes Solutions Misfeeds occur frequently. The paper is folded or Cut away the folded or creased.
  • Page 452 Troubleshooting Problem Causes Solutions Copies shift sideways. The paper roll is not set cor- Set the paper roll correctly, rectly. making sure it is straight and not loose. See “CLoading Pa- per Roll”, General Settings Guide. The original does not match Adjust the original guides to the size in the original table the specified size, and then in-...
  • Page 453: User Tools (Copier / Document Server Features)

    4. User Tools (Copier / Document Server Features) User Tools Menu (Copier / Document Server Features) Note ❒ Depending on the options installed, not all items listed below may be dis- played. ❖ ❖ ❖ ❖ General Features (see p.83 “General Features”) User Tools item menu Default Auto Paper Select Priority...
  • Page 454 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Reproduction Ratio (see p.85 “Reproduction Ratio”) User Tools item menu Default Custom Magnification Settings 1–3 Metric version: • Setting 1: 70.7% • Setting 2: 100.0% • Setting 3: 141.4% Inch version (Engineering): •...
  • Page 455 User Tools Menu (Copier / Document Server Features) User Tools item menu Default Reduce 1–4 Metric version: • Reduce 1: 25.0% • Reduce 2: 35.4% • Reduce 3: 50.0% • Reduce 4: 70.7% Inch version (Engineering): • Reduce 1: 25.0% •...
  • Page 456 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Edit (see p.87 “Edit”) User Tools item menu Default Adjust Position — Erase Border Width Metric version 10 mm Inch version 0.4" Erase Original Shadow in Combine Image Repeat Separation Line None Double Copies Separation Line None...
  • Page 457 User Tools Menu (Copier / Document Server Features) User Tools item menu Default Program / Delete Stamp — Stamp Position: 1–4 Metric version • Position: Top Right • Top Margin: 24 mm • Right Margin: 24 mm Inch version • Position: Top Right •...
  • Page 458 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Input / Output (see p.96 “Input / Output”) User Tools item menu Default Rotate Sort: Auto Paper Continue ❖ ❖ ❖ ❖ Administrator Tools (see “Menu Protect”, Security Reference) User Tools item menu Default Menu Protect...
  • Page 459: Accessing User Tools (Copier Features)

    Accessing User Tools (Copier Features) Accessing User Tools (Copier Features) This section is for key operators in Note charge of this machine. You can ❒ When Basic Authentication, Win- change or set the machine's default dows Authentication, or LDAP settings. Authentication is set, the au- thentication screen will be dis- Note...
  • Page 460: Exiting User Tools

    User Tools (Copier / Document Server Features) Exiting User Tools A A A A After changing default settings, press [Exit] on the User Tools main menu. Changes to User Tools are com- plete, and the machine is ready to copy. AHD101S Note ❒...
  • Page 461: Settings You Can Change With User Tools

    Settings You Can Change with User Tools Settings You Can Change with User Tools For details about displaying settings, see p.81 “Accessing User Tools (Copier Features)”. Note General Features ❒ Default: With Image Rotation • [With Image Rotation] Use to copy ❖...
  • Page 462 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Copy Quality Adjusts the finish for each original type (Text, Drawing, Text/Photo, Photo, Background Lines, Patched Original, Generation Copy). Note ❒ [Custom Setting]: Your service representative will set this to meet your requirements.
  • Page 463: Reproduction Ratio

    Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Max. Copy Quantity • Photo You can configure the machine Specifies the maximum number of to copy originals with photo- copies that can be set. graphs. Note ❒ Default: 99 sheets Note ❒...
  • Page 464 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Reduce 1–4 • Inch version: (Engineering) You can customize available re- • Settings 1: 64.7% duction ratios by pressing [Reduce / • Settings 2: 100% Enlarge]. • Settings 3: 129.4% Note •...
  • Page 465: Edit

    Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Magnification Key Display ❖ ❖ ❖ ❖ Erase Original Shadow in Combine Specifies which scale's reproduc- In Combine Copy mode, you can tion ratios shown on the initial dis- specify whether to erase a 3 mm, play.
  • Page 466 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Copy Order in Combine • Solid You can set the copy order to Left to Right or Top to Bottom when us- ing the Combine function . • Broken A •...
  • Page 467 Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Partial Copy Priority Specifies the default settings of the start position (Y1) and the copy size (Y2). Note ❒ Default: • Metric version: Y1: 0 mm, Y2: 210 mm Inch version: Y1: 0", Y2: 8.3"...
  • Page 468: Stamp

    User Tools (Copier / Document Server Features) Stamp Background Numbering ❖ ❖ ❖ ❖ Size Make settings for the size of background numbers. See p.51 “Background Numbering”. Note ❒ Default: Normal ❖ ❖ ❖ ❖ Density Make settings for the density of background numbers. See p.51 “Background Numbering”.
  • Page 469 Settings You Can Change with User Tools • Inch version: • Position: Top Right • Top Margin: 1.0" • Right Margin: 1.0" ❖ ❖ ❖ ❖ Stamp Format You can adjust the stamp's size, density, and print page. • Size You can set the size of the stamp.
  • Page 470 User Tools (Copier / Document Server Features) User Stamp ❖ ❖ ❖ ❖ Program / Delete Stamp You can store, change, or delete a design of your choice as a user stamp. Note ❒ You can store up to four user stamps. See p.53 “User Stamp”. Reference For details about deleting user stamps, see p.55 “Program/Delete User Stamp”.
  • Page 471 Settings You Can Change with User Tools Note ❒ Default: All Pages Date Stamp ❖ ❖ ❖ ❖ Format You can specify the date stamp format. Note ❒ Default: • Metric version: DD/MM/YYYY • Inch version: MM/DD/YYYY ❖ ❖ ❖ ❖ Font You can select the Date Stamp font.
  • Page 472 User Tools (Copier / Document Server Features) ❖ ❖ ❖ ❖ Stamp Setting You can have the date printed on the first page or all pages. Note ❒ Default: All Pages ❖ ❖ ❖ ❖ Size You can set the Date Stamp size. Note ❒...
  • Page 473 Settings You Can Change with User Tools ❖ ❖ ❖ ❖ Stamp Position P1, P2... Stamp Position: 1/5, 2/5... Stamp Position: –1–, –2–... Stamp Position: P.1, P.2. Stamp Position: 1, 2... Stamp Position: 1–1, 1–2... You can set the position where the stamp is printed. Press the arrow keys to adjust the position.
  • Page 474: Input / Output

    User Tools (Copier / Document Server Features) Input / Output ❖ ❖ ❖ ❖ Rotate Sort: Auto Paper Continue You can continue copying when paper of the required orientation has run out during rotate-sorting. See p.33 “Sort/Rotate Sort”. Note ❒ If you select [No] : •...
  • Page 475: Specifications

    5. Specifications Combination Chart The combination chart below shows modes that can be used together. The fol- lowing tables explains the symbols used in the chart. means that these functions can be used together. × means that these functions cannot be used together. The second function selected will be the function you are working in.
  • Page 476: Supplementary Information

    Specifications Supplementary Information ❖ ❖ ❖ ❖ Auto Start • The warm-up time is longer when scanning long length originals. ❖ ❖ ❖ ❖ Job Preset • When the paper size in Job Preset is as the same as that of the copy job in progress, the number of sheets that can be set is as follows: ❖...
  • Page 477 Supplementary Information ❖ ❖ ❖ ❖ Sort • You can use Sort for copy sizes up to A0(E). • The number of originals that can be scanned for Sort is as follows: Paper size Number of sheets A0(E) 50 sheets A1(D) 100 sheets A2(C)
  • Page 478 Specifications ❖ ❖ ❖ ❖ Metric version Original size → → → → Paper size Ratio (%) 400.0 (16 times in area ratio) A4→A0 282.8 (8 times in area ratio) A3→A0, A4→A1, B4→B1 200.0 (twice in area ratio) A2→A0, A3→A1, A4→A2, B3→B1, B4→B2 A1→A0, A2→A1, A3→A2, A4→A3, 141.4 (...
  • Page 479 Supplementary Information ❖ ❖ ❖ ❖ Zoom • You can set the magnification ratio from 25.0 to 400.0%. • You can select a ratio regardless of original size, or paper roll cut method. With certain ratios, parts of the image might not copy or margins will ap- pear.
  • Page 480 Specifications ❖ ❖ ❖ ❖ Format Overlay • When the sizes of the format (background original) and original to be over- laid on the format are different, the image is created at the size of the over- laid original. • The maximum paper size is A0 (E). However, if you create a copy using A0(E) size paper, the composite image data is lost.
  • Page 481 Supplementary Information ❖ ❖ ❖ ❖ Adjust Print Position • You can adjust the print position from 200 mm (7.9") left to 200 mm (7.9") right, and from 200 mm (7.9") up to 200 mm (7.9") down in increments of 1 mm (0.1").
  • Page 482: Scan Size Limitations, By Function

    Specifications Scan Size Limitations, by Function The following chart shows scan size limitations for the Adjust Print Position, Margin Adjustment, Edit, and Stamp functions. Adjust Print Position A0(E) or smaller Margin Adjustment 15 m or smaller Format Overlay A0(E) Erase Erase Inside A0(E) or smaller, 5 locations Erase Outside...
  • Page 483: Settings Record Sheet

    Settings Record Sheet Settings Record Sheet ❖ ❖ ❖ ❖ Program Record Sheet AHD014S Make copies of this sheet to keep a record of your program settings.
  • Page 484 Specifications ❖ ❖ ❖ ❖ Stored Format Record Sheet AHD015S Make copies of this sheet to keep a record of your format settings.
  • Page 485 Settings Record Sheet ❖ ❖ ❖ ❖ User Stamp Record Sheet Make copies of this sheet to keep a record of your user stamps.
  • Page 486: Magnification Ratio Chart

    Specifications Magnification Ratio Chart ❖ ❖ ❖ ❖ Metric version Copy size (mm) % A0 A1/B1 A2/B2 A3/B3 A4/B4 100.0 70.7 50.0 35.4 25.0 A1/B1 141.4 100.0 70.7 50.0 35.4 A2/B2 200.0 141.4 100.0 70.7 50.0 A3/B3 282.8 200.0 141.4 100.0 70.7 A4/B4...
  • Page 487: Measure Chart

    Settings Record Sheet Measure Chart ❖ ❖ ❖ ❖ Metric version Width × Length (mm) 841 × 1189 594 × 841 420 × 594 297 × 420 210 × 297 728 × 1030 515 × 728 364 × 515 257 × 364 ❖...
  • Page 488: Index

    INDEX Accessing user tools (Copier Features) , 81 Date stamp , 56 , 93 , 102 Adjusting copy image density , 28 font , 93 Adjust Position , 87 format , 93 Adjust print position , 61 , 103 position , 93 Administrator Tools , 96 size , 94 Auto image density , 28...
  • Page 489 Image repeat , 43 , 101 Image repeat separation line , 87 Page numbering , 58 , 94 , 102 Indicators , 3 font , 94 Input/Output , 96 page numbering in combine , 94 rotate sort − auto paper continue , 96 size , 94 Interrupt copy , 24 stamp format , 94...
  • Page 490 Settings you can change with user tools , 83 Setting the carrier sheet , 18 Setting the length of copy paper cut , 30 Sharp (#) key , 4 Size magnification , 38 , 101 Sizes and weights of recommended originals , 12 Sort , 33 , 99 Specifications , 97 Stamp , 90...
  • Page 491 Scanner Option Type 480 Operating Instructions Scanner Reference Getting Started Sending Scan Files by E-mail Sending Scan Files by Scan to Folder Storing Files Delivering Scan Files Using the Network TWAIN Scanner Function Configuring/Registering Scan Settings Troubleshooting Initial Scanner Setup Appendix Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 492 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Two kinds of size notation are employed in this manual. With this machine refer to the inch version. Important Contents of this manual are subject to change without prior notice.
  • Page 493 Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ The manuals provided are specific to machine type. ❒ Adobe Acrobat Reader/Adobe Reader is necessary to view the manuals as a PDF file.
  • Page 494 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled "Scanner Driver and Utilities". • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes the installation of DeskTopBinder Lite, and the operating envi- ronment for DeskTopBinder Lite in detail.
  • Page 495 TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 Symbols ........................1 Names of Major Options .................... 1 1. Getting Started Control Panel......................3 Network Scanner....................5 E-mail ......................... 5 Scan to Folder......................6 Store........................... 7 Network Delivery Scanner..................
  • Page 496 4. Storing Files Storing Files ......................43 Storage Procedure ....................44 Displaying the List of Stored Files ..............47 Viewing the List ......................48 Searching for Files ....................49 Sending Stored Files by E-mail or Scan to Folder, or Delivering ......50 Checking Stored Files from a Client Computer............51 Managing Stored Files..................
  • Page 497 8. Troubleshooting If Your Machine Does Not Operate As You Want..........83 When Scanning Is Not Performed as Expected............83 When the Delivery Function Does Not Work............83 When Stored Files Cannot Be Accessed ..............84 Network Cannot Be Browsed When Sending a Scan File ........84 The TWAIN Driver Cannot Be Started ..............
  • Page 499: How To Read This Manual

    How to Read This Manual Symbols In this manual, the following symbols are used: Important If this instruction is not followed, paper might be misfed, originals might be damaged, or files might be lost. Be sure to read this. Preparation This symbol indicates the prior knowledge or preparations required before op- erating.
  • Page 501: Getting Started

    1. Getting Started Control Panel This illustration shows the control panel when options are installed. AGH002S { { { { Clear Modes} } } } key Indicators Display errors and the machine status. Press to clear the current settings. See "Control Panel", General Settings { { { { Energy Saver} } } } key Guide.
  • Page 502 Getting Started Operation switch Press this switch to turn the machine on. The power indicator lights up. To turn the machine off, press this switch again. See "Turning On the Power", General Set- tings Guide. Note ❒ This key is inactive while scanning or setting scanner defaults.
  • Page 503: Network Scanner

    Network Scanner Network Scanner By installing the scanner option, the machine can be used as a network scanner. As a network scanner, the machine can send e-mail, send files to the FTP server or the shared folders of client computers, store scan files, operate as a network delivery scanner, and operate as a network TWAIN scanner.
  • Page 504: Scan To Folder

    Getting Started Scan to Folder A scan file can be sent to the FTP server folders or the shared Windows folders on the same network. Reference p.31 “Sending Scan Files by Scan to Folder” ZZZ602S This machine Client computer A scan file can be sent to the FTP server A scan file that is sent from the machine folders using FTP or to the shared Win- is received in shared Windows folders.
  • Page 505: Store

    Network Scanner Store You can store scanned documents as files on the machine’s hard disk. The stored scan files can be viewed, copied, deleted, or retrieved over the network using DeskTopBinder from a client computer. You can also view, delete or download scan files over the network using Web Image Monitor from the client.
  • Page 506: Network Delivery Scanner

    Getting Started Network Delivery Scanner A scan file from the originals scanned by the machine is stored in the delivery server and delivered to the folders of client computers on the same network. Reference p.57 “Delivering Scan Files” Note ❒ To use the delivery scanner function, a delivery server installed with the ScanRouter delivery software is required.
  • Page 507: Network Twain Scanner

    Network Scanner Reference For details about DeskTopBinder, or Auto Document Link, see the respective manuals. See p.i “Manuals for This Machine”. Network TWAIN Scanner The scanner function of this machine can be used from a client computer via a network using Ethernet, optional IEEE 1394 (IP over 1394), or optional IEEE 802.11b (wireless LAN).
  • Page 508: Installing Software

    Getting Started Installing Software ❒ If [Cancel] is selected during instal- This section describes how to install the software supplied on the “Scan- lation, the installation will be ner Driver and Utilities". stopped and all the remaining soft- ware will not be installed. If [Can- Reference cel] has been selected, reinstall the For details about the software on...
  • Page 509: Desktopbinder

    Installing Software A A A A Start Windows, and then insert DeskTopBinder the CD-ROM labeled "Scanner Driver and Utilities" into the CD- To check an in-tray or to retrieve files ROM drive of the client compu- using the network delivery scanner ter.
  • Page 510: User Authentication

    Getting Started User Authentication When user authentication (User Code Login (Using the Control Panel) Authentication, Basic Authentication, Windows Authentication, or LDAP Follow the procedure below to log in Authentication) is set, the authentica- when Basic Authentication, Windows tion screen is displayed. Unless a val- Authentication, or LDAP Authentica- id user name and password are tion is set.
  • Page 511: Log Off (Using The Control Panel)

    User Authentication Log Off (Using the Control Panel) Follow the procedure below to log off when Basic Authentication, Windows Authentication, or LDAP Authentica- tion is set. A A A A Press { { { { User Tools / Counter} } } } . B B B B Press [Logout].
  • Page 512: Programming E-Mail Addresses And Folders

    Getting Started Programming E-mail Addresses and Folders You can program e-mail addresses and folders using Address Book Manage- ment in the Administrator Tools menu under System Settings. You can also register the programmed e-mail addresses and folders in a Group. Note ❒...
  • Page 513: Specifying How To Start Scanning

    Specifying How to Start Scanning Specifying How to Start Scanning There are two ways to start scanning: • Placing originals • Pressing the { { { { Start} } } } key. Using the default setting, you can start scanning, storing, and delivering files simply by loading them (without pressing the { { { { Start} } } } key).
  • Page 514 Getting Started...
  • Page 515: Sending Scan Files By E-Mail

    2. Sending Scan Files by E-mail Scan files can be sent from this machine to specified destinations using the e- mail system. This chapter explains the preparation for sending files by the e-mail system, various display screens, procedures for sending, and how to check the sending results when this function is used.
  • Page 516: E-Mail Screen

    Sending Scan Files by E-mail E-mail Screen The e-mail is as shown. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 517: Sending Scan Files By E-Mail

    Sending Scan Files by E-mail Sending Scan Files by E-mail Reference Procedure for Sending E-mail There are two ways to specify scan settings, as described be- A scan file is sent after scan settings low: and destinations are specified. • Configure each setting for A A A A Press the { { { { Scanner} } } } key.
  • Page 518 Sending Scan Files by E-mail B To select more destinations, re- Note peat steps A A A A . ❒ Destinations in the destination list and registration numbers Note must be registered in advance ❒ To deselect a destination, press in [System Settings].
  • Page 519 Sending Scan Files by E-mail Note Manual entry of an e-mail ❒ To deselect a destination, press address [U U U U Prev.] or [T T T T Next] to display A Press [Manual Input]. the destination in the desti- nation field, and then press The soft keyboard appears.
  • Page 520 Sending Scan Files by E-mail ❒ It is necessary to differentiate ❒ Make sure that the LDAP between uppercase and low- server you want to search is ercase letters. selected and highlighted. If a server is not selected, the D Press [OK]. search is not performed and E Select a destination.
  • Page 521 Sending Scan Files by E-mail ❒ When the search condition • [Include One of Words]: The [Name] is used for searching, names which contain an whether the first name or sir- entered character or char- name is searched for de- acters are targeted.
  • Page 522 Sending Scan Files by E-mail I I I I Note Specify the e-mail sender. ❒ An e-mail address found in a You can specify the sender in the search can be registered in following ways: the list. Press [ProgDest], and •...
  • Page 523 Sending Scan Files by E-mail B Select the sender. Example: To enter 00006 Press the { { { { 6} } } } key, and then press the { { { { #} } } } key. Note ❒ When a protection code has been set, a screen for entering Note the protection code appears...
  • Page 524 Sending Scan Files by E-mail C Press [User (Dest.) Name]. G Press [Exit]. H Press [OK]. J J J J For a reception confirmation e-mail, press [Return Receipt]. Note ❒ To use [Return Receipt] you must: • Log on as a user •...
  • Page 525 Sending Scan Files by E-mail B Press [Attach Subject]. ❒ The messages that can be select- ed from the list must be regis- tered in [System Settings] in advance. See Network Guide. ❒ A message can be selected from the list or entered directly. Selecting a message from the list A Press [Subject / Message].
  • Page 526: Simultaneous Storage And Sending By E-Mail

    Sending Scan Files by E-mail D Enter the message “Thank you Simultaneous Storage and for what you did yesterday”. E Press [OK] three times. Sending by E-mail You can use the e-mail function and the storage function together. The scan file is sent by e-mail and at the same time is stored.
  • Page 527 Sending Scan Files by E-mail E E E E Press [Store File]. F F F F Make sure [Send & Store] is select- G G G G Specify file information if neces- sary. Reference For details about specifying file information, see p.45 “Specify- ing file information”.
  • Page 528: Checking The E-Mail Results

    Sending Scan Files by E-mail Checking the E-mail Results B B B B The sending results can be checked. Check the displayed records. Note ❒ For details about the maximum number of sending operations that can be checked, see p.102 “Print & Delete Scanner Journal”.
  • Page 529: Sending Scan Files By Scan To Folder

    3. Sending Scan Files by Scan to Folder Scan files can be sent to the folders of the FTP server or the shared folders of Win- dows. This chapter explains the preparation for sending files by Scan to Folder, various display screens, procedures for sending, and how to check the sending results when this function is used.
  • Page 530: Scan To Folder Screen

    Sending Scan Files by Scan to Folder Scan to Folder Screen The Scan to Folder screen is as shown. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 531 Preparation for Sending by Scan to Folder Note ❒ When the entire list does not fit on one screen, press [U U U U ] or [T T T T ] to scroll through the list. ❒ Group destinations are denoted by this symbol (...
  • Page 532: Sending Scan Files By Scan To Folder

    Sending Scan Files by Scan to Folder Sending Scan Files by Scan to Folder Reference Procedure for Sending by There are two ways to specify Scan to Folder scan settings, as described be- low: A scan file is sent after scan settings •...
  • Page 533 Sending Scan Files by Scan to Folder ❒ If a protection code has been • Enter the path for the folder of a client computer on the same set for the shared folder, a network directly. screen for entering the pro- tection code appears.
  • Page 534 Sending Scan Files by Scan to Folder E Press [OK]. Note F If entering a user name to log ❒ To deselect a destination, press [U U U U Prev.] or [T T T T Next] to display on is required, press [Manual In- put] on the right side of the user the destination in the desti- name field.
  • Page 535 Sending Scan Files by Scan to Folder ❒ Though the connection test C Press [Manual Input] on the right was successful, the machine side of the server name field. may fail to transfer the file if writing authority is lacking or if there is not enough free space on the hard disk.
  • Page 536 Sending Scan Files by Scan to Folder Reference Note ❒ To deselect a destination, press For details about the maxi- [U U U U Prev.] or [T T T T Next] to display mum number of characters that can be entered, see p.113 the destination in the desti- “Scan to Folder”.
  • Page 537 Sending Scan Files by Scan to Folder ❒ If authentication is required Note for the selected folder, a log- ❒ Computer and shared folder on screen appears. Enter the names consisting of more user name and password. than 12 characters cannot be F Press [OK].
  • Page 538 Sending Scan Files by Scan to Folder H H H H ❒ It is also possible to perform Specify the file name if necessary. a combined search using A Press [Attached File]. [Search by Dest. Name] and B Press [File Name]. [Search by Folder Name].
  • Page 539: Simultaneous Storage And Sending By Scan To Folder

    Sending Scan Files by Scan to Folder ❒ When scanning multiple pages • Recall registered settings. For into a single file, place the next details, see p.80 “Programs”. original. For details, see p.77 C C C C Select the destination. “Scanning Multiple Pages into a D D D D Single File”.
  • Page 540: Checking The Scan To Folder Results

    Sending Scan Files by Scan to Folder Checking the Scan to Folder Results B B B B The sending results can be checked. Check the displayed records. Note ❒ For details about the maximum number of sending operations that can be checked, see p.102 “Print & Delete Scanner Journal”.
  • Page 541: Storing Files

    4. Storing Files Scan files can be stored in the hard disk of the machine using the Document Server function, and the stored file can be used later. Using DeskTopBinder, stored files can be viewed or retrieved with a client computer. Important ❒...
  • Page 542: Storage Procedure

    Storing Files E E E E Make the settings for storing scan Storage Procedure files. A Press [Store File]. You can scan and store files. A A A A Press the { { { { Scanner} } } } key. B Press [Store Only].
  • Page 543 Storing Files The File Information screen ap- Reference pears. The procedure for placing origi- nals is the same as that for plac- ing originals for copying. For details about placing originals, see “Placing Originals”, Copy Reference. Note ❒ To interrupt scanning, press the { { { { Clear/Stop} } } } key or press [Stop] B B B B on the display panel.
  • Page 544 Storing Files Important Specifying a file name ❒ Do not forget the password. Scan files are automatically named If you forget it, consult the SCAN0001, SCAN0002, etc. If nec- system administrator of the essary, you can change the file machine. name.
  • Page 545: Displaying The List Of Stored Files

    Displaying the List of Stored Files Displaying the List of Stored Files From the list of stored files, you can delete stored files or change file infor- mation. To show the list of stored files, perform the following steps: Note ❒...
  • Page 546: Viewing The List

    Storing Files Viewing the List The list of stored files has the following elements. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 547: Searching For Files

    Displaying the List of Stored Files List of stored files Searching for Files Displays the list of stored files. Note You can search for files from the ❒ The files that are stored by func- stored files using the user name or file tions other than the scanner can be name.
  • Page 548: Sending Stored Files By E-Mail Or Scan To Folder, Or Delivering

    Storing Files Searching by file name Sending Stored Files by E-mail or Scan to Folder, or Delivering A A A A On the screen with the list of stored files, press [Search by File Name]. Files stored can be sent by e-mail or The soft keyboard appears.
  • Page 549: Checking Stored Files From A Client Computer

    Displaying the List of Stored Files C C C C ❒ The illustration used in the follow- To select multiple files, repeat ing explanation is an example. The B B B B step items that actually appear on the screen may differ, depending on the model in use and the environ- ment.
  • Page 550 Storing Files Viewing a list of stored files using Web Image Monitor The stored files are displayed and can be checked also in Web Image Moni- tor. Note ❒ When you enter http:// (machine IP address)/ in the address bar of the Web browser on a client com- puter, Top Page of Web Image Monitor is displayed.
  • Page 551: Managing Stored Files

    Managing Stored Files Managing Stored Files ❒ When you select a password Deleting Files protected file, the Password en- try screen appears. Enter the You can delete files that are no longer correct password, and then needed. press [OK]. When multiple files are selected, the password entry Limitation screen appears each time a pass-...
  • Page 552 Storing Files B B B B Note Press [Manage / Delete File]. ❒ The user names shown here C C C C Select the file for which you want are names that were regis- to change the file information. tered on the [Administrator Tools] tab in [System Settings].
  • Page 553 Managing Stored Files E E E E Make sure that the file informa- Changing the password tion was changed as necessary, A Press [Change Password]. and press [Exit]. B Enter a new four to eight digit number as the password using the number keys.
  • Page 554 Storing Files...
  • Page 555: Delivering Scan Files

    5. Delivering Scan Files Scan files can be sent to a specified destination using the network delivery scan- ner function. This chapter explains the preparation for delivering files, various display screens, delivery procedures, and how to check the delivery results when this function is used.
  • Page 556: Preparation For Delivering

    Delivering Scan Files Preparation for Delivering To use the machine as a network delivery scanner, the preparation described be- low is required. Connect the machine to the network with an Ethernet cable or IEEE 1394 cable, or use wireless LAN. To connect using an IEEE 1394 cable, the IEEE 1394 interface board is required.
  • Page 557: Network Delivery Scanner Screen

    Preparation for Delivering Network Delivery Scanner Screen The network delivery scanner screen is as shown. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 558: Delivering Scan Files

    Delivering Scan Files Delivering Scan Files Reference Delivery Procedure There are two ways to specify scan settings, as described below: A scan file is delivered after scan set- • Configure each setting for tings and destinations are specified. If scanning. For details, see necessary, you can select a sender and p.73 “Specifying Scan Set- a subject.
  • Page 559 Delivering Scan Files Note Using a registration number to ❒ The destination list is updated select a destination automatically. A Press [Registration No.]. ❒ Depending on the security set- B Enter the five digit registration tings, certain destinations may not be displayed. number that has been assigned to a destination folder using the number keys.
  • Page 560 Delivering Scan Files B Press [Search Address Book]. Manual entry of a destination A Press [Manual Input]. C Press [Search by Dest. Name]. Note The soft keyboard appears. ❒ To search by comment, press B Enter the destination. [Search by Comment]. The soft keyboard appears.
  • Page 561 Delivering Scan Files B Select the sender. Checking selected destinations A Use the destination field at the top of the screen to check which destinations are select- Note ❒ Press [U U U U Prev.] or [T T T T Next] to scroll through the list.
  • Page 562 Delivering Scan Files F Select a sender. Searching for a sender A Press [Attach Sender's Name]. G Press [Exit]. H Press [OK]. H H H H Specify [Return Receipt] if neces- sary. B Press [ Note ❒ If you did not specify the sender in Step , [Return Receipt] cannot be used even if you select it.
  • Page 563: Simultaneous Storage And Delivery

    Delivering Scan Files ❒ When scanning multiple pages The procedure to specify the sub- ject name “[Urgent] New product into a single file, place the next appearance” is explained as an ex- original. For details, see p.77 ample here. “Scanning Multiple Pages into a Single File”.
  • Page 564 Delivering Scan Files E E E E Press [Store File]. F F F F Make sure that [Send & Store] is se- lected. G G G G Make settings for file informa- tion if necessary. Reference For details about specifying file information, see p.45 “Specify- ing file information”.
  • Page 565: Checking The Status Of Delivery

    Checking the Status of Delivery Checking the Status of Delivery B B B B The sending results can be checked. Check the displayed records. Note ❒ For details about the maximum number of sending operations that can be checked, see p.102 “Print & Delete Scanner Journal”.
  • Page 566 Delivering Scan Files...
  • Page 567: Using The Network Twain Scanner Function

    6. Using the Network TWAIN Scanner Function This chapter explains the procedure for scanning originals with the network TWAIN scanner using DeskTopBinder. In addition, the preparation for using the network TWAIN scanner is explained. Preparation for Using the Network TWAIN Scanner To use the machine as a network TWAIN scanner, the preparation described be- low is required.
  • Page 568: Scanning Originals

    Using the Network TWAIN Scanner Function Scanning Originals This section explains how to scan Note originals using the network TWAIN ❒ The name of the scanner cur- scanner function. rently being used is shown on the title bar of the dialog Note bo x.
  • Page 569 Scanning Originals E E E E Place originals. Reference The procedure for placing origi- nals is the same as that for plac- ing originals for copying. For details about placing originals, see “Placing Originals”, Copy Reference. F F F F If you have further originals, re- E E E E peat Step...
  • Page 570 Using the Network TWAIN Scanner Function...
  • Page 571: Specifying Scan Settings

    7. Configuring/Registering Scan Settings This section describes how to specify scan settings, the orientation of the origi- nal, and the output tray of the original. In addition, this section describes the programming function by which you can register frequently used settings. Specifying Scan Settings A A A A •...
  • Page 572 Configuring/Registering Scan Settings ❖ ❖ ❖ ❖ Scan Size ❖ ❖ ❖ ❖ Edit Select the size of the original to Make editing settings. be scanned. • Erase Border When [Auto Detect] is selected, Delete the borders of the the auto detect function of the scanned original according machine is used to set the origi- to the width specified.
  • Page 573: Specifying The Orientation And Output Tray Of The Original

    Specifying the Orientation and Output Tray of the Original Specifying the Orientation and Output Tray of the Original ❒ Depending on the image size, To correctly orient a scanned image on the computer display, you must originals with orientations specify the orientation of the original. other than may not be Also, specify the original's output...
  • Page 574: For A Network Twain Scanner

    Configuring/Registering Scan Settings B B B B D D D D Press [OK]. Change the settings in the [Original Size], [Specify output size], and [Qual- The current settings are displayed. ity] groups. Reference For details about each setting, see the Help. E E E E If you have specified the User Code Authentication, click [Au-...
  • Page 575: Scanning Multiple Pages Into A Single File

    Scanning Multiple Pages into a Single File Scanning Multiple Pages into a Single File You can scan multiple pages into a Reference single file. p.73 “Specifying Scan Settings” Select the standby mode for addition- p.75 “Specifying the Orienta- al originals from the following: tion and Output Tray of the •...
  • Page 576: When A Time Limit Is Not Specified For Additional Originals

    Configuring/Registering Scan Settings B B B B Note Select [Next Original Wait]. ❒ The selected destination appears Note while scanning the originals. ❒ In [Scanner Features], if you set E E E E To scan additional originals, load [Next Original Wait at Off] to [Con- them within the specified time.
  • Page 577 Scanning Multiple Pages into a Single File Note ❒ Originals are scanned in or- der.Place them from the first page. Note ❒ The selected destination appears while scanning the originals. E E E E To scan additional originals, load them. Repeat this step until all originals are scanned.
  • Page 578: Programs

    Configuring/Registering Scan Settings Programs C C C C You can register frequently used set- m Register]. Press [m tings in the machine memory and re- call them for future use. Note ❒ You can register up to 10 programs for the scanner mode. ❒...
  • Page 579: Recalling A Program

    Programs G G G G Press the number of the program Recalling a Program for which you changed settings or the number of a different pro- A A A A Make sure the { { { { Scanner} } } } key is se- gram in which you want to regis- lected, and then press the { { { { Pro- ter the changed settings.
  • Page 580: Changing The Program Name

    Configuring/Registering Scan Settings Changing the Program Name A A A A Make sure the { { { { Scanner} } } } key is se- lected, and then press the { { { { Pro- gram} } } } key. B B B B Press [Change Name].
  • Page 581: Troubleshooting

    8. Troubleshooting This section contains advice on what to do if you have problems scanning an original, or if the network delivery scanner or e-mail function does not work. Various messages that may appear on the control panel or client computer are listed, along with causes and solutions.
  • Page 582: When Stored Files Cannot Be Accessed

    Troubleshooting When Stored Files Cannot Be Accessed Problems Causes and solutions The stored file is locked The file, which is password protected, is locked because the pass- and is not accessible. word was incorrectly entered ten times. Consult the network ad- ministrator.
  • Page 583: Operations Are Not Possible When Messages Appear

    If Your Machine Does Not Operate As You Want Operations are not possible when messages appear Problems Causes and solutions The destination list is being updated from the network using " Updating the des- SmartDeviceMonitor for Admin. Depending on the number of tination destinations to be updated, there may be some delay before you list...Please...
  • Page 584: When A Message Is Displayed

    Troubleshooting When a Message Is Displayed When an Error Message Appears on the Control Panel Note ❒ If an error message that is not included in this section appears, turn off the main power switch of the machine, and then turn it on again. If the message still appears, note the content of the message and the error number (if dis- played), and contact your service representative.
  • Page 585 When a Message Is Displayed Message Causes and solutions A network error has occurred and Connection with LDAP server has connection has failed. Try the opera- failed. Check the server status. tion once more. If the message is still shown, the network may be crowd- ed.
  • Page 586 Troubleshooting Message Causes and solutions Make sure the maximum number of Exceeded max. number of alphanumeric characters which can be entered, and characters. then enter it again. See p.112 “Speci- fications for Transmis- sion/Store/Delivery Functions”. The maximum number of characters Exceeded max.
  • Page 587 When a Message Is Displayed Message Causes and solutions Because of insufficient hard disk Memory is full. Cannot scan. The space, the first page could not be scanned data will be deleted. scanned. Try one of the following measures: • Wait for a while, and then retry the scan operation.
  • Page 588 Troubleshooting Message Causes and solutions You cannot delete a file whose status Selected file is currently in use. is “Waiting...” or that is being edited Cannot delete it. with DeskTopBinder. Delete the file after canceling delivery or complet- ing editing. You have tried to delete files without Selected files contain file(s) that the authority to do so.
  • Page 589 When a Message Is Displayed Message Causes and solutions The specified group contains some The specified group contains some destinations for sending by e-mail invalid destination(s). Do you want to and some destinations for sending select only valid destination(s)? by Scan to Folder. To select destina- tions for sending by email, press [Se- lect] for the message displayed on the e-mail screen.
  • Page 590: When An Error Message Appears On The Client Computer

    Troubleshooting When an Error Message Appears on the Client Computer This section describes the main possible causes and solutions for error messages displayed on the client computer when the TWAIN Driver is used. Note ❒ If an error message that is not included in this section appears, turn off the main power switch of the machine, and then turn it on again.
  • Page 591 When a Message Is Displayed Message Causes and solutions [Exceeded the maximum allowable characters for a scan A maximum of 40 characters can be en- tered as the name of a scanning mode. Re- mode.] enter the name within this limit. [Enter within 40 characters.] A maximum of 48 scanning modes can be [Exceeded the maximum number of scan modes to save.]...
  • Page 592 Troubleshooting...
  • Page 593: Initial Scanner Setup

    9. Initial Scanner Setup This section explains all required settings and procedures for using the machine as a network scanner. Reference First, see General Settings Guide to make basic settings, and then make scanner settings. For details about settings for e-mail, see "Connection and Setup", Network Guide.
  • Page 594 Initial Scanner Setup ❖ ❖ ❖ ❖ Destination List Settings For explanations of settings, see p.101 “Destination List Settings”. Settings Default E-mail Scan to Store Delivery TWAIN Folder ❍ ❍ ❍ Destination List Display Delivery Priority 1 Server ❍ ❍ Destination List Display E-mail Priority 2...
  • Page 595: Adjusting Scanner Features

    Adjusting Scanner Features Adjusting Scanner Features F F F F In Scanner Features, you can make Press [OK]. settings for basic operations when us- G G G G ing this machine as a scanner. Nor- C C C C F F F F Repeat steps to make the mally, you can use the machine with...
  • Page 596: Settings

    Initial Scanner Setup Settings ❒ If [Set Wait Time] is selected, en- Scan Settings ter the wait time in seconds (3- 999) for placing additional orig- This section explains how to set the inals with the number keys. If defaults for scan settings. you load additional originals within the specified time, scan- The scan settings consist of the fol-...
  • Page 597 Settings ❖ ❖ ❖ ❖ Change Initial Mode B Enter the scan starting point in relation to the standard scan Select [Standard] to use the stand- starting point. ard settings as the initial mode which is the mode of the machine Select and enter values for [X2] immediately after the operation and [Y2], and then press the { { { { #} } } }...
  • Page 598 Initial Scanner Setup E Make sure that the area speci- Depending on how the original fied in step D D D D (X3 and Y3) is is positioned, the scan area will be as follows: shown in the [Custom Size] field, and then press [OK].
  • Page 599: Destination List Settings

    Settings C Press [OK]. ❖ ❖ ❖ ❖ Select Title Select the titles for destinations and group destinations of e-mail and Scan to Folder. Selected titles appear in the e-mail and Scan to Folder destination list to be used for searching for destinations. Se- lect [Title 1] (ten titles), [Title 2] (ten titles), or [Title 3] (five titles).
  • Page 600 Initial Scanner Setup • When [On] is selected, you can • [Do not Print: Delete Oldest]: enter the delay time with the Transmission/delivery results number keys (3-30 seconds). are deleted one by one as new The machine will switch to the results are stored.
  • Page 601: Administrator Tools

    Settings Select either [No], [Yes (per Page)], or Note [Yes (per Max. Size)]. When [Yes (per ❒ If you select [Send & Store], Max. Size)] is selected, enter the "Send & Store" appears in [Scan- Max. Number of Divisions (2-500) ner Features], and files are stored with the number keys.
  • Page 602 Initial Scanner Setup...
  • Page 603: 10. Appendix

    10. Appendix Relationship between Resolution and original size Resolution and scan area are inversely related. The higher the resolution is set, the smaller the area that can be scanned. Conversely, the larger the scan area, the lower the resolution that can be set. The relationship between the scanning resolution and the file size is shown be- low.
  • Page 604: When Using For E-Mail, Scan To Folder, Or Store, Or As A Network Delivery Scanner

    Appendix When Using for E-mail, Scan to Folder, or Store, or as a Network Delivery Scanner Horizon- Vertical 150dpi 200dpi 300dpi 400dpi 600dpi tal meas- measure- urement ment (length) (length) (inches) (inches) Long 914 (36.0) up to 15000 length (590.6) up to 13400 (527.6) up to 6000...
  • Page 605 Relationship between Resolution and original size Horizon- Vertical 150dpi 200dpi 300dpi 400dpi 600dpi tal meas- measure- urement ment (length) (length) (inches) (inches) ❍ ❍ ❍ ❍ ❍ Engineer- 559 (22.0) 863.6 ing D (34.0) ❍ ❍ ❍ ❍ ❍ Architec- 457 (18.0) 609.6 ture C...
  • Page 606: When Using As A Network Twain Scanner

    Appendix When Using as a Network TWAIN Scanner The maximum resolution available for scanning is determined by the original's horizontal measurement (width). For example, the width of an A0 × 2 original is 841mm (33.2"). Since this is the same as an A0 original, both A0 × 2 and A0 orig- inals can be scanned at the same maximum resolution of 600 dpi.
  • Page 607: Placing Originals

    Placing Originals Placing Originals To correctly display the top/bottom orientation of the scanned original on a cli- ent computer, the placement of the original and the settings made on the control panel and scanner driver must match. There are 4 orientations for placing the original. See the table below. Note ❒...
  • Page 608: Software Supplied On Cd-Rom

    Appendix Software Supplied on CD-ROM Table of files CD-ROM Wizard for the TWAIN Driver and utilities TWAIN Driver for Windows 95/98/Me, Drivers Twain Windows XP, Windows 2000, Windows NT4.0, Windows Server 2003 Utility DeskV2 DeskTopBinder Lite TWAIN Driver This driver is required to scan an original on the machine. To use the machine as a network TWAIN scanner, this driver must be installed.
  • Page 609: Desktopbinder

    Software Supplied on CD-ROM DeskTopBinder DeskTopBinder is to be installed on the client computers for integration and management of various kinds of files such as scan files, files created with appli- cations, and existing scan files. This software allows you to use various functions for stored scan files such as viewing stored files.
  • Page 610: Specifications For Transmission/Store/Delivery Functions

    Appendix Specifications for Transmission/Store/Delivery Functions Note ❒ Depending on the type or settings of the file or document, you may not be able to specify the destination or enter the maximum number of characters stated below. Transmission E-mail Maximum Number of Characters That Can Be Title Entered for E-mail Message...
  • Page 611 Specifications for Transmission/Store/Delivery Functions Scan to Folder Maximum Number of Characters That Can Be Destination folder Entered for Scan to Folder path: 256 characters User name: 128 characters Password: 128 characters Server name: 128 characters Destination folder path: 256 characters User name: 128 characters Password:...
  • Page 612: Store

    Appendix Store Maximum Number of Characters That Can Be File Name Entered for Stored File Information User Name Password 4-8 digit number Maximum Number of Stored Files That Can Be Selected at Once Maximum number of files that can be stored 3000 Maximum number of pages that can be stored 3000...
  • Page 613: Specifications

    Specifications Specifications Scan method Original feed image scanning Maximum power consumption 1,500W Image sensor type Fixed contact image sensor Scan type Sheet Interface Ethernet interface (10BASE-T or 100BASE-TX), IEEE 1394 (IP over 1394) (optional), and IEEE 802.11b (Wireless LAN) (optional) 914mm (36.0") ×...
  • Page 614 INDEX Adjusting Scanner Features , 97 LDAP server , 5 Administrator Tools , 96 , 103 Login (Using the Control Panel) , 12 Log Off (Using the Control Panel) , 13 Checking the status of delivery , 67 {Check Modes} } } } key , 3 Main power indicator and power indicator , 3 {Clear Modes} } } } key , 3 Max.
  • Page 615 Save , 71 When a Time Limit Is Not Specified for Additional Originals , 78 Scanner Features , 95 When a Time Limit Is Specified Scanning Multiple Pages into a Single File , 77 for Additional Originals , 77 Scanning originals , 70 Scan Settings , 95 , 98 Scan Size , 74 Scan to Folder , 6 , 31 , 113...
  • Page 616 B765-8707...
  • Page 617 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Declaration of Conformity Product Name: Scanner Option Type 480 Model Number: 4800WD/LW411/A080/Aficio 480W Responsible party: Ricoh Corporation Address: 5 Dedrick Place, West Caldwell, NJ 07006 Telephone number: 973-882-2000 This device complies with Part 15 of the FCC Rules.
  • Page 618 EN USA B765-8707...

This manual is also suitable for:

Lw411A080Aficio 480w

Table of Contents