Firewall Problems.......................................................................................5-8
TCP/IP............................................................................................................5-8
DNS Server...................................................................................................5-8
Persistent Problems...................................................................................5-9
6 E-mail.............................................................................................................6-1
Mail notice..............................................................................................................................6-1
Job completion notice........................................................................................................6-1
Preparations...........................................................................................................................6-2
Configuration procedure...................................................................................................6-3
Scan Service overview........................................................................................................7-1
E-mail...........................................................................................................................7-2
Store to Folder..........................................................................................................7-2
Scan to PC..................................................................................................................7-2
Store to USB.............................................................................................................7-2
Job Flow Scanning..................................................................................................7-2
Store and Send Link...............................................................................................7-2
Setting up Access Rights...................................................................................................7-2
Authentication.........................................................................................................7-3
Authorization............................................................................................................7-3
Personalization........................................................................................................7-3
Local Authentication..........................................................................................................7-4
User Information....................................................................................................7-4
Xerox
Color C75 Press
®
System Administration Guide
Protocol...................................................................................................6-5
Table of Contents
iii