Ricoh Aficio 3035 Operating Instructions Manual

Ricoh Aficio 3035 Operating Instructions Manual

Ricoh aficio 3035: operating instruction
Hide thumbs Also See for Aficio 3035:
Table of Contents

Advertisement

Quick Links

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in the "General Settings Guide" before using the machine.
1
Getting Started
Preventing Information Leaks
2
3
Preventing Unauthorized Use of Functions and Settings
Enhanced Network Security
4
5
Management Based on Authentication and Access Control
Specifying the Administrator/Security Functions
6
7
Troubleshooting
Appendix
8

Operating Instructions

Security Reference

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Aficio 3035

  • Page 1: Operating Instructions

    Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in the "General Settings Guide" before using the machine. Security Reference Getting Started Preventing Information Leaks Preventing Unauthorized Use of Functions and Settings Enhanced Network Security...
  • Page 2 PCL is a registered trademark of Hewlett-Packard Company. NetWare is a registered trademarks of Novell, Inc. Bluetooth is a Trademark of the Bluetooth SIG, Inc. (Special Interest Group) and licensed to Ricoh Company Limited. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 3: Manuals For This Machine

    Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as a PDF file.
  • Page 4 ❖ Scanner Reference (PDF file - CD-ROM1) Describes operations, functions, and troubleshooting for the machine's scan- ner function. ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Document Management Utility”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTop- Binder Lite in detail.
  • Page 5: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ... i How to Read This Manual ... 1 1. Getting Started Enhanced Security... 3 Glossary ...4 Setting Up the Machine...5 Security Measures Provided by this Machine... 6 Preventing Information Leaks ...6 Preventing Unauthorized Operation...7 Enhanced Network Security...8 2.
  • Page 6 4. Enhanced Network Security Preventing Unauthorized Access...45 Enabling/Disabling Protocols ...45 Access Control ...46 Specifying Network Security Level...47 Encrypting Transmitted Passwords...50 Driver Encryption Key ...50 Group Password for PDF files...52 IPP Authentication Password...53 Protection Using Encryption ... 54 SSL (Secure Sockets Layer) Encryption...55 User Settings for SSL (Secure Sockets Layer) ...58 Setting the SSL / TLS Encryption Mode...59 SNMPv3 Encryption ...61...
  • Page 7 6. Specifying the Administrator/Security Functions The Roles of Administrators... 99 Administrator Authentication ...101 Administrator Authentication ... 102 Registering the Administrator...104 Logging on Using Administrator Authentication ...106 Logging off Using Administrator Authentication ...107 Changing the Administrator... 107 Specifying the Extended Security Functions... 109 Changing the Extended Security Functions ...
  • Page 8 Document Server File Permissions...141 The Privilege for User Account Settings in the Address Book ... 142 User Settings... 145 Copier / Document Server Features ...145 Printer Functions ...148 Scanner Features... 150 Facsimile Features... 151 System Settings ...153 Web Image Monitor Setting... 159 Functions That Require Options ...173 INDEX...
  • Page 9: How To Read This Manual

    How to Read This Manual Symbols The following set of symbols is used in this manual. R WARNING: This symbol indicates a potentially hazardous situation that might result in death or serious injury when you misuse the machine without following the in- structions under this symbol.
  • Page 11: Getting Started

    Enhanced Security This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 12: Glossary

    Getting Started Glossary ❖ Administrator Administrators manage a specific area of machine usage, such as settings or user registration. There are four types of administrator: user administrator, network adminis- trator, machine administrator, and file administrator. One person can act as more than one type of administrator.
  • Page 13: Setting Up The Machine

    Setting Up the Machine If you want higher security, make the following setting before using the ma- chine: Turn the machine on. Press the {User Tools/Counter} key. Press {System Settings}. Press {Interface Settings}. Specify IP Address. Connect the machine to the network. Start the Web Image Monitor, and then log on to the machine as the admin- istrator.
  • Page 14: Security Measures Provided By This Machine

    Getting Started Security Measures Provided by this Machine Preventing Information Leaks ❖ Printing confidential files Using the printer’s Locked Print, you can store files in the machine as confi- dential files and then print them. You can print a file using the machine’s con- trol panel and collect it on the spot to prevent others from seeing it.
  • Page 15: Preventing Unauthorized Operation

    ❖ Managing Log Files You can improve data security by deleting log files stored in the machine. By transferring the log files, you can check the history data and identify unau- thorized access. Reference For details, see p.33 “Log Information and Deleting Data on the Hard Disk”.
  • Page 16: Enhanced Network Security

    Getting Started Enhanced Network Security ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings. Reference For details, see p.45 “Preventing Unauthorized Access”. ❖...
  • Page 17: Preventing Information Leaks

    2. Preventing Information Guarding Against Unauthorized Copying Using the printer driver, you can embed a pattern in the printed copy to discour- age or prevent unauthorized copying. If you enable data security for copying on the machine, printed copies of a doc- ument with data security for copying are grayed out to prevent unauthorized copying.
  • Page 18: Unauthorized Copy Prevention

    "No Copying") in the printed document. If the document is copied, scanned, or stored in a Document Server by a copier or multifunction printer, the embedded pattern appears clearly on the copy, dis- couraging unauthorized copying. Printed Documents...
  • Page 19: Data Security For Copying

    Data Security for Copying Using the printer driver to enable data security for the copying function, you can print a document with an embedded pattern of hidden text. Such a document is called a data security for copying document. If a data security for copying document is copied or stored in the Document Server using a copier or multi-function printer with the Copy Data Security Unit, protect- ed pages are grayed out in the copy, preventing confidential information being copied.
  • Page 20: Printing Limitations

    Preventing Information Leaks Note ❒ You can also embed pattern in a document protected by data security for cop- ying. However, if such a document is copied or stored in the Document Serv- er using a copier or multi-function printer with the Copy Data Security Unit, the copy is grayed out, so the embedded pattern does not appear on the copy.
  • Page 21: Notice

    Notice 1.The supplier does not guarantee that unauthorized copy prevention and data security for copying will always work. Depending on the paper, the model of copier or multi-function printer, and the copier or printer settings, unauthorized copy prevention and data security for copying may not work properly. 2.The supplier is not liable for any damage caused by using or not being able to use unauthorized copy prevention and data security for copying.
  • Page 22 Preventing Information Leaks Specifying Printer Settings for Data security for copying (Printer Driver Setting) If a document printed using this function is copied or stored in the Document Server by a copier or multi-function printer, the copy is grayed out. Using the printer driver, specify the printer settings for data security for copy- ing.
  • Page 23 Specifying Data Security for Copying (Machine Setting) This can be specified by the machine administrator. To use this function, the Copy Data Security Unit must be installed. If a document printed is copied or stored in the Document Server, the copy is grayed out.
  • Page 24: Printing A Confidential Document

    Preventing Information Leaks Printing a Confidential Document Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine’s output trays. When printing confidential documents, use the Locked Print function. ❖ Locked Print Using the printer’s Locked Print function, store files in the machine as Locked Print files and then print them from the control panel and retrieve them im- mediately, preventing others from viewing them.
  • Page 25: Printing A Locked Print File

    Perform Locked Print. Reference For details, see the printer driver Help. Printing a Locked Print File To print a Locked Print file, face the machine and print the file using the control panel. To print Locked Print files, the password is required. If you do not enter the cor- rect password, you cannot print the files.
  • Page 26: Deleting Locked Print Files

    Preventing Information Leaks Deleting Locked Print Files This can be specified by the file creator (owner). To delete Locked Print files, you must enter the password for the files. If the password has been forgotten, ask the file administrator to delete the password. This can also be specified via Web Image Monitor.
  • Page 27: Unlocking Locked Print Files

    Select the file. Press [Delete Password]. Press [Yes]. Unlocking Locked Print Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files.
  • Page 28: Specifying Access Permission For Stored Files

    Preventing Information Leaks Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. You can prevent activities such as the printing or sending of stored files by un- authorized users.
  • Page 29: Assigning Users And Access Permission For Stored Files

    Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files.
  • Page 30: Assigning The User And The Access Permission For The User's Stored Files

    Preventing Information Leaks Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission.
  • Page 31 Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the user or group. Press [Protection]. Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users/Groups".
  • Page 32 Preventing Information Leaks Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission.
  • Page 33: Specifying Passwords For The Stored Files

    Specifying Passwords for the Stored Files This can be specified by the file creator (owner) or file administrator. Specify passwords for the stored files. Provides increased protection against unauthorized use of files. Preparation For details about logging on and logging off with administrator authentica- tion, see p.106 “Logging on Using Administrator Authentication”, p.107 “Logging off Using Administrator Authentication”.
  • Page 34: Unlocking Files

    Preventing Information Leaks Unlocking Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files. For details about “Enhance File Protection”, see p.109 “Specifying the Extended Security Functions”.
  • Page 35: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 36 Preventing Information Leaks Press [Administrator Tools]. Press [Extended Security]. Press [On] for “Restrict Use of Destinations”. Press [OK]. Press the {User Tools/Counter} key. Reference This can also be specified using Web Image Monitor or SmartDeviceMon- itor for Admin. For details, see the Help for each application.
  • Page 37: Protecting The Address Book

    Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 38 Preventing Information Leaks Select the user or group. Press [Protection]. Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups". Press [New Program]. Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 39: Encrypting The Data In The Address Book

    Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book. Reference See p.109 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentica- tion, see p.106 “Logging on Using Administrator Authentication”, p.107 “Logging off Using Administrator Authentication”.
  • Page 40 Preventing Information Leaks Press [Administrator Tools]. Press [Extended Security]. Press [On] for “Encrypt Address Book”. Press [Change] for [Encryption Key]. Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt / Decrypt]. Press [Yes].
  • Page 41: Log Information And Deleting Data On The Hard Disk

    Log Information and Deleting Data on the Hard Disk Hard Disk The machine’s optional hard disk lets you store data under the copy, printer, fax, scanner, and document server functions, as well as the address book and counters stored under each user code. For details about deleting data on the hard disk, see p.35 “Overwriting the Data on the Hard Disk”.
  • Page 42: Specifying Delete All Logs

    Preventing Information Leaks Specifying Delete All Logs This can be specified by the machine administrator. By deleting log files stored in the machine, you can prevent information leakage. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Delete All Logs]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings.
  • Page 43: Overwriting The Data On The Hard Disk

    Press [System Settings]. Press [Administrator Tools]. Press [Transfer Log Setting]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [OK]. Press the {User Tools/Counter}key. Overwriting the Data on the Hard Disk To use this function, the optional DataOverwriteSecurity unit must be installed.
  • Page 44: Auto Erase Memory Setting

    Preventing Information Leaks ❖ Methods of Erasing the Data You can select the method of erasing the data from the following: The default is “NSA”. Random Numbers National Security Agency Department of Defense Reference For details, see the manual supplied with the DataOverwriteSecurity unit. “Auto Erase Memory Setting”...
  • Page 45 Press [Administrator Tools]. Press [Auto Erase Memory Setting]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [On], and then select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. When you select “Random Numbers”...
  • Page 46 Preventing Information Leaks Types of Data that Can or Cannot Be Overwritten The following table shows the types of data that can or cannot be overwritten by Auto Erase Memory. Data overwritten by Auto Erase Memory Data not overwritten by Auto Erase Memory A Sample Print, Locked Print, or Stored Print job can only be overwritten after it has been executed.Stored print jobs can be overwritten by Auto Erase Memory only if...
  • Page 47: Erase All Memory

    “Erase All Memory” This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on and logging off with administrator authentica- tion, see p.106 “Logging on Using Administrator Authentication”, p.107 “Logging off Using Administrator Authentication”.
  • Page 48 Preventing Information Leaks Select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. When you select “Random Numbers” A Press [Change]. B Enter the number of times that you want to overwrite using the number keys, and then press [#].
  • Page 49: Preventing Unauthorized Use Of Functions And Settings

    3. Preventing Unauthorized Use of Functions and Settings Preventing Modification of Machine Settings The machine settings that can be modified depend on the type of administrator. Users cannot change the administrator settings. Register the administrators before using the machine. ❖ Type of Administrator Register the administrator on the machine, and then authenticate the admin- istrator using the administrator’s login user name and login password.
  • Page 50: Limiting Available Functions

    Preventing Unauthorized Use of Functions and Settings Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ Available Functions Specify the available functions from the copier, Document Server, fax, scan- ner, and printer functions.
  • Page 51 Press [Auth. Info]. In [Available Functions], select the functions you want to specify. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Limiting Available Functions...
  • Page 52 Preventing Unauthorized Use of Functions and Settings...
  • Page 53: Enhanced Network Security

    4. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Mon- itor to specify the network security level to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator.
  • Page 54: Access Control

    Enhanced Network Security Press [Invalid] for the protocol you want to disable. Press [OK]. Press the {User Tools/Counter} key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help. Access Control This can be specified by the network administrator.
  • Page 55: Specifying Network Security Level

    Click [Apply]. Access control is set. Log off from the machine. Reference For details, see the Web Image Monitor Help. Specifying Network Security Level This can be specified by the network administrator. This setting lets you change the security level to limit unauthorized access. Set the security level to [Level 0], [Level 1], or [Level 2].
  • Page 56 Enhanced Network Security Press [Administrator Tools]. Press [Network Security Level]. If the setting you want to specify does not appear, press [TNext] to scroll down to other settings. Select the network security level. Select [Level 0], [Level 1], or [Level 2]. Press [OK].
  • Page 57 Function Interface IEEE1394 SBP-2 Bluetooth IP over 1394 TCP/IP TCP/IP HTTP DIPRINT RSH/RCP SNMP SNMP v1v2 SNMP v3 TELNET SSDP mDNS NetWare NetWare AppleTalk AppleTalk Preventing Unauthorized Access Network Security Level Level 0 Level 1 ❍ ❍ ❍ ❍ ❍ ❍...
  • Page 58: Encrypting Transmitted Passwords

    Enhanced Network Security Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ Driver Encryption Key To encrypt the login password, specify the driver encryption key for the driv- er used for the machine and the user’s computer.
  • Page 59 Press [System Settings]. Press [Administrator Tools]. Press [Extended Security]. For [Driver Encryption Key], press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. Note ❒ The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 60: Group Password For Pdf Files

    Enhanced Network Security Group Password for PDF files This can be specified by the network administrator. On the machine, specify the group password for PDF files. By using a PDF group password, you can enhance security and so protect pass- words from being analyzed.
  • Page 61: Ipp Authentication Password

    Note ❒ The network administrator must give users the group password for PDF files that is already registered on the machine. The users can then register it in DeskTopBinder on their computers.For details, see the DeskTopBind- er Help ❒ Make sure to enter the same character string as that specified on the ma- chine for the group password for PDF files.
  • Page 62: Protection Using Encryption

    Enhanced Network Security Protection Using Encryption When you access the machine using a Web Image Monitor or IPP, you can estab- lish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish en- crypted communication using SNMPv3 or SSL.
  • Page 63: Ssl (Secure Sockets Layer) Encryption

    SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-cer- tificate using the machine, or request a certificate from a certificate authority and install it.
  • Page 64 Enhanced Network Security Click [Configuration], click [Security], and then click [Certificates]. Click [Create]. Make the necessary settings. Reference For details about the displayed items and selectable items, see Web Image Monitor Help. Click [OK]. The setting is changed. Click [OK]. A security warning dialog box appears.
  • Page 65 Click [OK]. [Requesting] appears for [Certificate Status] in the [Certificates] area. Use the data in the [Certificate Request Contents:] dialog box to apply to the cer- tificate authority. Log off from the machine. Apply to the certificate authority for the server certificate. The application procedure depends on the certificate authority.
  • Page 66: User Settings For Ssl (Secure Sockets Layer)

    Enhanced Network Security Click [OK]. [Installed] appears under [Certificate Status] to show that a server certificate for the machine has been installed. Log off from the machine. Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a cer- tificate authority.
  • Page 67: Setting The Ssl / Tls Encryption Mode

    On the [General] tab, click [Install Certificate...]. Certificate Import Wizard starts. Install the certificate by following the Certificate Import Wizard instruc- tions. Note ❒ For details about how to install the certificate, see the Web Image Monitor Help. ❒ If a certificate issued by a certificate authority is installed in the printer, confirm the certificate store location with the certificate authority.
  • Page 68 Enhanced Network Security Press [System Settings]. Press [Interface Settings]. Press [Permit SSL / TLS Communication] If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Clear Text] as the en- crypted communication mode.
  • Page 69: Snmpv3 Encryption

    SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on and logging off with administrator authentica- tion, see p.106 “Logging on Using Administrator Authentication”, p.107...
  • Page 70 Enhanced Network Security Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMP V3 Communication] on the machine.
  • Page 71: The Management Function

    5. Management Based on Authentication and Access Control There are four types of administrator according to the administered function: Machine administrator, network administrator, file administrator, and user ad- ministrator.By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single ad- ministrator.
  • Page 72: About User Authentication

    Management Based on Authentication and Access Control ❒ Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will to have to return the ma- chine to its default state. This will result in all data in the machine being lost and the service call may not be free of charge.
  • Page 73: About Administrator Authentication

    About Administrator Authentication There are four types of administrator according to the administered function: user administrator, machine administrator, network administrator, and file ad- ministrator. User Administrator This administrator manages personal in- formation in the address book. You can register/delete users in the address book or change users’...
  • Page 74: Administrators And Users

    Management Based on Authentication and Access Control Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 75: User

    User Users are managed using the personal information managed in the machine’s address book. By enabling user authentication, you can allow only people registered in the ad- dress book to use the machine. Users can be managed in the address book by the user administrator.
  • Page 76: Enabling Authentication

    Management Based on Authentication and Access Control Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be en- abled.
  • Page 77: User Authentication

    Set "Admin. Authentication" to [On]. [Available Settings] appears. Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. Note ❒ To specify administrator authentication for more than one category, repeat steps Press [OK]. Press the {User Tools/Counter} key. User Authentication There are five types of user authentication method: user code authentication, ba- sic authentication, Windows authentication, Integration Server Authentication,...
  • Page 78 Management Based on Authentication and Access Control User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒...
  • Page 79 Select which of the machine’s functions you want to limit. The selected settings will be available to users. Press [OK]. Press the {User Tools/Counter} key. Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you can not only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 80 Management Based on Authentication and Access Control Select the "Printer Job Auth." level. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)].
  • Page 81 C Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication. D Press [OK]. Press [OK]. Press the {User Tools/Counter} key. Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server.
  • Page 82 Management Based on Authentication and Access Control Note ❒ Enter the login password correctly, keeping in mind that it is case-sensitive. ❒ In a network environment with a WINS server, where other networks can be accessed via a router, you must specify WINS. ❒...
  • Page 83 Select [Windows Authentication]. Note ❒ If you do not want to use user authentication management, select [Off]. Press [Change] for “Domain Name”, enter the name of the domain controller to be authenticated, and then press [OK]. Select the "Printer Job Auth." level. Note ❒...
  • Page 84 Management Based on Authentication and Access Control Specifying [Simple(Limitation)] A Press [Simple(Limitation)] B Press [Change]. C Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication. D Press [OK]. If global groups have been registered: If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 85 A Under “Group”, press [Program / Change], and then press [*Not Programmed]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. B Press [Change], and then enter the group name. C Select which of the machine’s functions you want to limit. D Press [OK].
  • Page 86: Creating The Server Certificate

    Management Based on Authentication and Access Control Enter the Certificate Authority name (optional) in [CA Identifying Information], and then click [Next]. Leave [Data Storage Location] at its default, and then click [Next]. -Creating the Server Certificate After installing Internet Information Services (IIS) and Certificate services Win- dows components, create the Server Certificate as follows: Start [Internet Services Manager].
  • Page 87 LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book.
  • Page 88 Management Based on Authentication and Access Control Specifying LDAP Authentication Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [User Authentication Management]. Select [LDAP Authentication]. Note ❒ If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication.
  • Page 89 ❒ If you select [Simple (All)] or [Simple(Limitation)], you can print even with un- authenticated printer drivers or devices.Specify this setting if you want to print with a printer driver or device that cannot be identified by the ma- chine or if you do not require authentication for printing.However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users.
  • Page 90 Management Based on Authentication and Access Control Enter the login name attribute in the [Login Name Attribute] box. Note ❒ When using OpenLDAP, register the login name attribute using an at- tribute name such as “uid”. However, you do not need to register this if you want to authenticate using the DN.
  • Page 91 Specifying Integration Server Authentication Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [User Authentication Management]. Select [Integration Svr. Auth.]. Note ❒ If you do not wish to use User Authentication Management, select [Off]. Press [Change] for “Server Name”. Specify the name of the server for external authentication.
  • Page 92 Management Based on Authentication and Access Control Enter the domain name, and then press [OK]. Note ❒ You cannot specify a domain name under an authentication system that does not support domain login. If global groups have been registered: If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 93 ❒ If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Sim- ple] and the clients’ IP address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticat- ed printer drivers or without any printer driver.
  • Page 94 Management Based on Authentication and Access Control -Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication levels and printer job types. Depending on the combination of printer job authentication level and printer job type, the machine may not print properly.
  • Page 95 ❖ Printer Job Types In the RPCS printer driver dialog box, the [Confirm authentication information when printing] and [Encrypt] check boxes are selected. In the PCL printer driver dialog box, the [User Authentication] and [With En- cryption] check boxes are selected. Personal authentication information is added to the printer job.
  • Page 96: Authentication Information Stored In The Address Book

    Management Based on Authentication and Access Control Authentication Information Stored in the Address Book Preparation For details about logging on and logging off with administrator authentica- tion, see p.106 “Logging on Using Administrator Authentication”, p.107 “Logging off Using Administrator Authentication”. You need to register a user in the address book.
  • Page 97: Specifying Authentication Information To Log On

    Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Specifying Authentication Information to Log on In [User Authentication Management], specify the login user name and password. The login user name and password specified in [User Authentication Management] can be used as the login information for “SMTP Authentication", “Folder Au- thentication", “Integration Server Authentication"...
  • Page 98 Management Based on Authentication and Access Control Select [Use Auth. Info at Login] in “SMTP Authentication”. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Limitation ❒ When using [Use Auth. Info at Login] for “SMTP Authentication”, “Folder Authentication”, or “LDAP Authentication”, a user name other than “oth- er”...
  • Page 99: If User Authentication Has Been Specified

    If User Authentication Has Been Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authen- tication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations.
  • Page 100: Login (Using The Control Panel)

    Management Based on Authentication and Access Control Login (Using the Control Panel) Follow the procedure below to log on when Basic Authentication, Windows Au- thentication, LDAP Authentication, or Integration Server Authentication is set. Follow the procedure below to log on when basic authentication, Windows au- thentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 101: Login (Using A Printer Driver)

    Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help.
  • Page 102 Management Based on Authentication and Access Control Press [Timer Settings]. Press [Auto Logout Timer]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select [On], and then enter “10” to “999” (seconds) using the number keys. Note ❒...
  • Page 103: Menu Protect

    Menu Protect The administrator can also limit users’ access permission to the machine’s set- tings. The machine’s System Settings menu and the printer’s regular menus can be locked so they cannot be changed. This function is also effective when man- agement is not based on user authentication.
  • Page 104 Management Based on Authentication and Access Control Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key. Fax Functions Note ❒ To specify [Menu Protect] in [Facsimile Features]: Under [System Settings], [Admin- istrator Tools], [Administrator Authentication Management], set [Machine Manage- ment], [File Management], and [Network Management] to [On].
  • Page 105 Printer Functions Note ❒ To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. Press the {User Tools/Counter} key. Press [Printer Features]. Press [Maintenance]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key.
  • Page 106 Management Based on Authentication and Access Control Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key.
  • Page 107: Specifying The Administrator/Security Functions

    Administrator/Security Functions The Roles of Administrators By limiting the functions available to each user, you can protect the data in the machine from leaks and from being tampered with or deleted. The administra- tors each manage the access limits to the functions they are responsible for. There are four types of administrator, as shown below.
  • Page 108 Specifying the Administrator/Security Functions ❖ File Administrator This is the administrator who manages permission to access stored files. You can specify passwords to allow only registered and permitted users to view and edit files stored in Document Server. By making this setting, you can pre- vent data leaks and tampering due to unauthorized users viewing and using the registered data.
  • Page 109: Administrator Authentication

    Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name and login password already registered in the address book. Windows Authentica- tion and LDAP Authentication are not performed for an administrator, so an ad- ministrator can log on even if the server is unreachable because of a network problem.
  • Page 110: Administrator Authentication

    Specifying the Administrator/Security Functions Administrator Authentication To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. If you have not registered any administrator, you can obtain each administra- tor’s authority with the “Administrator 1”...
  • Page 111 Specifying Machine Management Authentication A Press [Machine Management], and then press [On]. B Press the item for which you want to specify management. The selected settings will be unavailable to users. Specifying Network Management Authentication A Press [Network Management], and then press [On]. B Press the item for which you want to specify management.
  • Page 112: Registering The Administrator

    Specifying the Administrator/Security Functions B To specify file management, press [Administrator Tools]. Press [OK]. Press the {User Tools/Counter} key. Registering the Administrator If administrator authentication has been specified,We recommend only one per- son take each administrator role. By sharing the administrative work among different administrators, you can spread the workload and limit unauthorized operation by a single administra- tor.
  • Page 113 In the line for the administrator whose authority you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. If you allocate each administrator’s authority to a different person, the screen appears as follows: Press [Change] for the login user name.
  • Page 114: Logging On Using Administrator Authentication

    Specifying the Administrator/Security Functions If a password reentry screen appears, enter the encryption password, and then press [OK]. Press [OK]. Press [OK]. Press the {User Tools/Counter} key. Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administra- tor’s user name and password.This section describes how to log on.
  • Page 115: Logging Off Using Administrator Authentication

    Press [Enter] next to “Login Password”. Note ❒ If assigning the administrator for the first time, proceed to step pressing [Enter]. Enter the login password, and then press [OK]. Enter [Login]. “ Authenticating... Please wait. specifying the default. Logging off Using Administrator Authentication If administrator authentication has been specified, be sure to log off after com- pleting settings.
  • Page 116 Specifying the Administrator/Security Functions Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. In the line for the administrator you want to change, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. Press [Change] for the setting you want to change, and re-enter the setting. Press [OK].
  • Page 117: Specifying The Extended Security Functions

    Specifying the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 118: Settings

    Specifying the Administrator/Security Functions Settings ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication. If you register the encryp- tion key specified with the machine in the driver, passwords are encrypted. •...
  • Page 119 ❖ Restrict Adding of User Destinations This can be specified by the user administrator. When “Restrict Use of Destinations” is set to [Off]. After entering a fax or scan- ner destination directly, you can register it in the address book by pressing [ProgDest].
  • Page 120 Specifying the Administrator/Security Functions ❖ Settings by SNMP V1 and V2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 121 Reference For details, see Facsimile Reference <Advanced Features>. ❖ Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for op- erations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 122: Other Security Functions

    Specifying the Administrator/Security Functions Other Security Functions Fax Function ❖ Not Displaying Destinations and Senders in Reports and Lists You can specify whether or not to display destinations and senders by click- ing [Facsimile Features], [Administrator Tools], [Parameter Setting] and specifying “Bit No.
  • Page 123: Limiting Machine Operation To Customers Only

    Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 124 Specifying the Administrator/Security Functions Press [On] and then [OK]. A confirmation message appears. Press [Yes]. Press the {User Tools/Counter} key. Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock.
  • Page 125: Troubleshooting

    Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 126 Troubleshooting Messages Failed to obtain URL. Authentication has failed. The selected file(s) which you do not have access privileges to could not be delet- Causes Solutions The machine cannot connect Make sure the server's set- to the server or cannot estab- tings, such as the IP Address lish communication.
  • Page 127: Machine Cannot Be Operated

    Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Cannot print using the printer User authentication has been driver or connect using the rejected. TWAIN driver.
  • Page 128 Troubleshooting Condition Cannot connect to the Scan- Router delivery software. Cannot access the machine us- ing ScanRouter EX Profes- sional V2. Cannot log off when using the copying or scanner functions. [ProgDest] does not appear on the fax or scanner screen for specifying destinations.
  • Page 129: Appendix

    Operations by the Supervisor The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 130: Logging On As The Supervisor

    Appendix Logging on as the Supervisor If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on. Press the {User Tools/Counter} key. Press [Login]. Press [Enter] for [Login User Name]. Enter a login user name, and then press [OK].
  • Page 131: Changing The Supervisor

    Changing the Supervisor Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. Under “Supervisor”, click [Change]. Press [Change] for the login user name. Enter the login user name, and then press [OK]. Press [Change] for the login password. Enter the login password, and then press [OK].
  • Page 132: Resetting An Administrator's Password

    Appendix Resetting an Administrator’s Password Press the {User Tools/Counter} key. Press [Login]. Log on as the supervisor. You can log on in the same way as an administrator. Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. Press [Change] for the administrator you wish to reset. Press [Change] for the login password.
  • Page 133: Machine Administrator Settings

    Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Tray Paper Settings All the settings can be specified. ❖...
  • Page 134 Appendix • Default User Name / Password (Send) SMB User Name / SMB Password FTP User Name / FTP Password NCP User Name / NCP Password Password • Program / Change / Delete E-mail Message • Program / Change / Delete Subject •...
  • Page 135: Copier / Document Server Features

    • Auto Erase Memory Setting • Erase All Memory • Transfer Log Setting • Data Security for Copying File Format Converter option must be installed. The DataOverwriteSecurity unit option must be installed. Copier / Document Server Features The following settings can be specified. ❖...
  • Page 136: Printer Features

    Appendix ❖ Administrator Tools The following settings can be specified. • Program / Change / Delete Standard Message • Store / Change / Delete Auto Document • Program / Change / Delete Scan Size • Print Journal • Forwarding • Memory Lock RX •...
  • Page 137: Scanner Features

    ❖ PS Menu All the settings can be specified. ❖ PDF Menu All the settings can be specified. The PostScript 3 unit option must be installed. Scanner Features The following settings can be specified. ❖ Scan Settings All the settings can be specified. ❖...
  • Page 138: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Top Page • Reset Printer Job • Reset Device ❖ Device Settings • System Spool Printing Protect Printer Operation Panel Output Tray Paper Tray Priority Cover Sheet Tray Slip Sheet Tray •...
  • Page 139 ❖ Printer • System All the settings can be specified. • Host Interface All the settings can be specified. • PCL Settings All the settings can be specified. • PS Settings All the settings can be specified. • PDF Settings The following settings can be specified.
  • Page 140: Settings Via Smartdevicemonitor For Admin

    Appendix Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ Device Information • Reset Device • Reset Current Job • Reset All Jobs ❖ User Management Tool The following settings can be specified. • User Page Count •...
  • Page 141: Network Administrator Settings

    Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Interface Settings • Network All the settings can be specified. • IEEE 1394 All the settings can be specified. •...
  • Page 142: Facsimile Features

    Appendix Facsimile Features The following settings can be specified. ❖ E-mail Settings • Max. E-mail Size ❖ IP-Fax Settings All the settings can be specified. Scanner Features The following settings can be specified. ❖ Send Settings • Max. E-mail Size •...
  • Page 143 ❖ Fax • E-mail Settings Maximum E-mail Size • IP-Fax Settings All the settings can be specified. • Gateway Settings All the settings can be specified. ❖ Interface • Change Interface • IEEE 802.11b Communication Mode SSID Channel WEP Setting Authentication Type WEP Key Status Confirm Key...
  • Page 144: Settings Via Smartdevicemonitor For Admin

    Appendix • SSDP All the settings can be specified. • Rendezvous All the settings can be specified. ❖ Webpage All the settings can be specified. ❖ Security • Network Security All the settings can be specified. • Access Control All the settings can be specified. •...
  • Page 145: File Administrator Settings

    File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator • Extended Security Enhance File Protection •...
  • Page 146 Appendix ❖ Device Settings • Auto E-mail Notification All the settings can be specified. • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator • Program/Change Administrator You can specify the following administrator settings for the file adminis- trator.
  • Page 147: User Administrator Settings

    User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator • Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book...
  • Page 148: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Address Book All the settings can be specified. ❖ Device Settings • Auto E-mail Notification All the settings can be specified. • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator •...
  • Page 149: Document Server File Permissions

    Document Server File Permissions The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned “Read-only” authority. • Edit This is a user assigned “Edit”...
  • Page 150: The Privilege For User Account Settings In The Address Book

    Appendix The Privilege for User Account Settings in the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned “Read-only” authority. •...
  • Page 151 Settings User Read- only Registration No. Key Display Name Select Title Auth. Info User Code Login User Name Login Password SMTP Authenti- cation Folder Authenti- cation LDAP Authenti- cation Available Functions Protection Use Name as Protection Code Protection Object Protect Dest.: Per- missions for Us-...
  • Page 152 Appendix Settings FaxDest. Transmis- sion Format Facsimile Number Interna- tional TX Mode Header Label In- sertion E-mail E-mail Address Address Folder SMB/FT Destina- P/NCP tion SMB: Path FTP: Port FTP: Server Name FTP: Path NCP: Path NCP: Connec- tion type You can only enter the password.
  • Page 153: User Settings

    User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting.
  • Page 154 Appendix Tab Names Settings Stamp Back- Size ground Density Num- bering Preset Stamp Position: COPY Stamp Stamp Position: URGENT Stamp Position: PRIORITY Stamp Position: For Your Info. Stamp Position: PRELIMINARY Stamp Position: For Internal Use Only Stamp Position: CONFIDENTIAL Stamp Position: DRAFT Stamp Language User Program / Delete Stamp...
  • Page 155 Tab Names Settings Stamp Page Font Num- Size bering Duplex Back Page Stamping Position Page Numbering in Combine Stamp on Designating Slip Sheet Stamp Position: P1, P2… Stamp Position: 1/5, 2/5… Stamp Position: 1, 2… Stamp Position: -1-, -2-… Stamp Position: P.1,P.2... Stamp Position: 1-1, 1-2…...
  • Page 156: Printer Functions

    Appendix Printer Functions The default for [Menu Protect] is [Level 2]. ❖ Normal Printer Screen Functions Print Jobs ❖ Printer Features Tab Names Settings System Print Error Report Auto Continue Memory Overflow Job Separation Auto Delete Temporary Print Jobs Auto Delete Stored Print Jobs Initial Print Job List Memory Usage Duplex...
  • Page 157 Tab Names Settings PCL Menu Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution Data Format PS Menu Resolution Change PDF Password PDF Menu PDF Group Password Resolution The PostScript 3 unit option must be installed.
  • Page 158: Scanner Features

    Appendix Scanner Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Destination List Destination List Priority 1 Settings Destination List Priority 2 Select Title Update Delivery Server Destination List Send Settings TWAIN Standby Time File Type Priority Compression (Black &...
  • Page 159: Facsimile Features

    Facsimile Features Which functions can be used and specified depend on which administrators are set to [On] in [Menu Protect] in [Facsimile Features]. The default for [Menu Protect] is [Off]. Names Settings Gen. Settings / Memory / Immed. Transmission Switch Adjust Text Size Priority Original Type Priority...
  • Page 160 Appendix Names Settings E-mail Settings Internet Fax Settings Max. E-mail Size SMTP RX File Delivery Settings IP-Fax Settings Enable H.323 Enable SIP H.323 Settings SIP Settings Program / Change / Delete Gateway Administrator Program / Change / Delete Standard Message Tools Store / Change / Delete Auto Document Program / Change / Delete Scan Size...
  • Page 161: System Settings

    System Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Tab Names Settings General Features Panel Tone...
  • Page 162 Appendix Tab Names Settings Timer Settings Auto Off Timer Panel Off Timer System Auto Reset Timer Copier/ Document Server Auto Reset Timer Facsimile Auto Reset Timer Printer Auto Reset Timer Scanner Auto Reset Timer Set Date Set Time Auto Logout Timer Admin- Administrator istrator...
  • Page 163 Tab Names Settings Inter- Network IP Address face Gateway Address Settings DNS Configuration DDNS Configuration Domain Name WINS Configuration Effective Protocol NCP Delivery Protocol NW Frame Type SMB Computer Name SMB Work Group Ethernet Speed Ping Command Permit SNMP V3 Communication Permit SSL / TLS Communication Host Name Machine Name...
  • Page 164 Appendix Tab Names Settings Inter- IEEE IP Address face 1394 DDNS Configuration Settings Host Name Domain Name WINS Configuration IP over 1394 SCSI print (SBP-2) Bidirectional SCSI print IEEE Communication Mode 802.11b Transmission Speed SSID Setting Channel WEP (Encryption) Setting (Encryp- Transmission Speed tion)
  • Page 165 Tab Names Settings File Transfer Delivery Option FAX RX File Transmission SMTP Server SMTP Authentication POP before SMTP Reception Protocol POP3 / IMAP4 Settings Administrator's E-mail Address E-mail Communication Port E-mail Reception Interval Max. Reception E-mail Size E-mail Storage in Server Default User Name / Password (Send) Program / Change / Delete E-mail Message Program / Change / Delete Subject...
  • Page 166 Appendix Tab Names Settings Administrator User Authentication Management Tools Administrator Authentication Management Key Counter Management Extended Security External Charge Unit Management Display / Clear / Print Counter per User Print Address Book: Destination List Address Book Management Address Book: Program / Change / Delete Group Address Book: Program / Change / Delete Transfer Request...
  • Page 167: Web Image Monitor Setting

    You can only view Main Delivery Server IP Address and Sub Delivery Server IP Ad- dress. You can only specify the password. The IEEE1394 interface board option must be installed. The IEEE802.11b interface unit option must be installed. File Format Converter option must be installed. The IEEE 1284 interface board option must be installed.
  • Page 168 Appendix Category Settings Paper Paper Size Paper Type Apply Auto Paper Select Copying Method in Duplex Large Capacity Tray - Paper Type Large Capacity Tray - Apply Auto Paper Select Large Capacity Tray - Copying Method in Duplex Bypass Tray - Paper Size Bypass Tray - Custom Paper Size Bypass Tray - Paper Type Date/Time...
  • Page 169 Category Settings E-mail Administrator E-mail Address Reception Protocol E-mail Reception Interval Max. Reception E-mail Size E-mail Storage in Server SMTP Server Name SMTP Port No. SMTP Authentication SMTP Auth. E-mail Address SMTP Auth. User Name SMTP Auth. Password SMTP Auth. Encryption POP before SMTP POP E-mail Address POP User Name...
  • Page 170 Appendix Category Settings Receive E-mail Notification E-mail E-mail Notification User Name E-mail Notification Password Auto E-mail Notification Message Notification Address List Call Service Out of Toner Toner Almost Empty Waste Toner Bottle is Full Add Staple Paper Misfeed Cover Open Out of Paper Hole Punch Receptacle is Full...
  • Page 171 Category Settings On-demand E-mail Notification Subject Notification Notification Message Restriction to System Config. Info. Restriction to Network Config. Info. Restriction to Printer Config. Info. Restriction to Supply Info. Restriction to Device Status Info. Receivable E-mail Address/Domain Name E-mail Language File Transfer SMB User Name SMB Password FTP User Name...
  • Page 172 Appendix Category Settings User Authenti- User Authentication Management cation Manage- User Code - Available Function ment Basic Authentication - Printer Job Authentication Windows Authentication - Printer Job Au- thentication Windows Authentication - Domain Name Windows Authentication - Group Settings for Windows Authentication LDAP Authentication - Printer Job Authentication LDAP Authentication - LDAP Authentication LDAP Authentication - Login Name Attribute...
  • Page 173 ❖ Printer The default for [Menu Protect] is [Level 2]. Category Settings System Print Error Report Auto Continue Memory Overflow Job Separation Auto Delete Temporary Print Jobs Auto Delete Stored Print Jobs Initial Print Job List Memory Usage Duplex Copies Blank Page Print Printer Language Edge Smoothing...
  • Page 174 Appendix Category Settings PCL Settings Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution Duplex PS Settings Blank Page Print Data Format Resolution Resolution PDF Settings PDF Temporary Password PDF Fixed Password PDF Group Password...
  • Page 175 ❖ Fax Functions that can be used and specified via Web Image Monitor depend on which administrators are set to [On] in [Menu Protect], [Facsimile Features]. Names Settings General Fax Information Reception Settings Transmission Settings Administrator Program Confidential ID Tools Program Polling ID Memory Lock Reception Program Memory Lock ID...
  • Page 176 Appendix Names Settings Gateway Settings Prefix 1-5 Select Protocol 1-5 Gateway Address 1-5 Parameter Settings Just Size Printing Combine 2 originals Indial Convert to PDF When Transferring to Folder Journal Immediate Transmission Result Report Communication Result Report Memory Storage Report Polling TX Clear Report Polling RX Result Report Polling RX Reserve Report...
  • Page 177 ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Change Interface...
  • Page 178 Appendix ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Protocol...
  • Page 179 Category Settings TCP/IP Host Name DHCP Domain Name IP Address Subnet Mask DDNS WINS Primary WINS Server Secondary WINS Server Scope ID Default Gateway Address DNS Server RSH/RCP DIPRINT IPP Timeout User Settings Admin- Administrator istrator authentication authen- has been speci- tication fied.
  • Page 180 Appendix Category Settings NetWare NetWare Print Server Name Logon Mode File Server Name NDS Tree NDS Context Name Operation Mode Remote Printer No. Job Timeout Frame Type Print Server Protocol NCP Delivery Protocol AppleTalk AppleTalk Printer Name Zone Name Workgroup Name Computer Name Comment Notify Print Completion...
  • Page 181: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity unit • Data security for copying function Copy Data Security Unit • PDF Direct Print function PostScript unit Functions That Require Options...
  • Page 182: Index

    INDEX Access Control , 46 Access Permission , 20 Address Book , 140 Address Management Tool , 140 Administrator , 4 Administrator Authentication , 4 Administrator Tools , 126 , 127 , 128 , 129 , 131 , 133 , 137 , 139 AppleTalk , 135 Authenticate Current Job , 113 Authentication and Access Limits , 3...
  • Page 183 Parallel Interface , 125 Parameter Settings , 131 Password for IPP Authentication , 50 Password for Stored Files , 20 Password Policy , 113 PCL Menu , 128 PDF Menu , 129 Printer , 131 , 138 , 165 Printer Job Authentication , 86 Protocol , 135 PS Menu , 129 RC Gate , 131...
  • Page 184 MEMO...
  • Page 185 MEMO...
  • Page 186 MEMO B198-6707...
  • Page 187 Copyright © 2005...
  • Page 188 Printed in China EN USA B198-6707 B1986707...

Table of Contents