Ricoh MP 2553 Series Read Me First
Ricoh MP 2553 Series Read Me First

Ricoh MP 2553 Series Read Me First

Mp 2553/3053/3353 series
Hide thumbs Also See for MP 2553 Series:
Table of Contents

Advertisement

Quick Links

Read This First

Manuals Provided with This Machine
Safety Information for This Machine
Other Information for This Machine
Appendix
For information not in this manual, refer to
the HTML/PDF files on the supplied
CD-ROM.
Read this manual carefully before you use this machine and keep
it handy for future reference. For safe and correct use, be sure to
read the Safety Information in this manual before using the
machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh MP 2553 Series

  • Page 1: Read This First

    Read This First Manuals Provided with This Machine Safety Information for This Machine Other Information for This Machine Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS How to Read the Manuals..........................3 Symbols Used in the Manuals........................3 Disclaimer................................3 Notes................................4 Machine Types............................... 4 1. Manuals Provided with This Machine Manuals for This Machine..........................5 Manuals List..............................7 How to Use the Operating Instructions......................9 Formats of the Operating Instructions......................
  • Page 4 Trademarks............................... 37...
  • Page 5: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 6: Notes

    In no event will the manufacturer be responsible for any documents created by you using this machine or any results from the data executed by you. Notes Contents of this manual are subject to change without prior notice. The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products.
  • Page 7: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 8 1. Manuals Provided with This Machine Troubleshooting Provides a guide for resolving common usage-related problems. Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations.
  • Page 9: Manuals List

    Manuals for This Machine • Quick Reference Scan Guide • Manuals provided are specific to machine types. • Driver Installation Guide, HTML manuals, and manuals displayed on the Smart Operation Panel are available in English, German, French, Italian, Spanish, Dutch, and Russian. •...
  • Page 10 1. Manuals Provided with This Machine Manuals Printed HTML displayed on PDF Manuals Manual Name Manuals Manuals the MultiLink- Provided Provided Provided Panel Getting Started Paper Specifications and Adding Paper Convenient Functions Maintenance and Specifications Troubleshooting Copy/ Document Server Print Scan Connecting the Machine/ System Settings...
  • Page 11: How To Use The Operating Instructions

    How to Use the Operating Instructions How to Use the Operating Instructions This chapter describes the operating instructions of this machine. HTML and PDF manuals are included in the supplied CD-ROMs. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 12: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 13 How to Use the Operating Instructions MANUAL_DRIVER\(language) Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. To read Driver Installation Guide, click [Driver Installation Guide]. The manual opens. Click the title of the manual you want to view.
  • Page 14 1. Manuals Provided with This Machine...
  • Page 15: Safety Information For This Machine

    2. Safety Information for This Machine This chapter describes the safety precautions. Safety Information Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury.
  • Page 16: Handling Power Cords And Power Cord Plugs

    2. Safety Information for This Machine • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. • Do not place heavy objects on the machine. Doing so can cause the machine to topple over, possibly resulting in injury.
  • Page 17 Safety Information • Do not use power cords that are damaged, broken, or modified. Also, do not use power cords that have been trapped under heavy objects, pulled hard, or bent severely. Doing so could result in fire or electric shock. •...
  • Page 18: Handling The Main Machine

    2. Safety Information for This Machine • Be sure to disconnect the power cord from the wall outlet at least once a year and check for the following: • The power cord's inner wires are exposed, broken, etc. • The power cord's coating has a crack or dent. •...
  • Page 19 Safety Information • Be sure to locate the machine as close as possible to a wall outlet. This will allow easy disconnection of the power cord in the event of an emergency. • If the machine emits smoke or odours, or if it behaves unusually, you must turn off its power immediately.
  • Page 20 2. Safety Information for This Machine • If you have to move the machine when the optional paper tray unit is attached, do not push on the main unit's top section. Doing so can cause the optional paper tray unit to detach, possibly resulting in injury.
  • Page 21 Safety Information • Do not remove any covers or screws other than those explicitly mentioned in this manual. Inside this machine are high voltage components that are an electric shock hazard and laser components that could cause blindness. Contact your sales or service representative if any of the machine's internal components require maintenance, adjustment, or repair.
  • Page 22 2. Safety Information for This Machine • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame. • Do not store toner (new or used) or toner containers anywhere near naked flames. Doing so risks fire and burns.
  • Page 23 Safety Information • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible.
  • Page 24: Safety Labels Of This Machine

    2. Safety Information for This Machine Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated.
  • Page 25: Paper Trays

    Safety Labels of This Machine Paper trays CXT002 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 26 2. Safety Information for This Machine 1000-sheet finisher or Booklet Finisher CXT003 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam.
  • Page 27: Bridge Unit

    Safety Labels of This Machine Bridge unit CXT006 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. Do not touch the parts a label indicates. The inside of the bridge unit could be very hot. Caution should be taken when removing misfed paper.
  • Page 28: Power Switch Symbols

    2. Safety Information for This Machine When closing the finisher, keep hands clear of the finisher's upper surface. Power Switch Symbols The meanings of the symbols for the switches on this machine are as follows: • : POWER ON • : STANDBY...
  • Page 29: Other Information For This Machine

    3. Other Information for This Machine This chapter describes laws and regulations related to this machine. Laws and Regulations Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 30 (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Responsible party: Ricoh Americas Corporation Address: 5 Dedrick Place, West Caldwell, NJ 07006 Telephone number: 973-882-2000...
  • Page 31 7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is causing problems with your telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved.
  • Page 32: Important Safety Instructions For Facsimile Unit

    3. Other Information for This Machine The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device, including FAX machines, to send any message unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual.
  • Page 33: Notes To Canadian Users Of Facsimile Unit

    Laws and Regulations Notes to Canadian Users of Facsimile Unit This product meets the applicable Industry Canada technical specifications. The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.
  • Page 34: Other Information

    3. Other Information for This Machine Other Information ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ®...
  • Page 35: Notes To Users In The State Of California (Notes To Users In Usa)

    Other Information Specification Type 1 Type 2 Type 3 Reduced electrical consumption 0.5 W 0.5 W 0.5 W in Sleep mode Time of switch into Sleep mode 1 minute 1 minute 1 minute Time of switch out from Sleep 9.9 seconds 9.9 seconds 9.9 seconds mode...
  • Page 36 3. Other Information for This Machine...
  • Page 37: Appendix

    4. Appendix This appendix describes trademarks and specifications for the machine. Specifications For specifications not described in this manual, see "Specifications", Maintenance and Specifications . Warm-up time (23°C (73.4°F), rated voltage) 14.3 seconds First copy/print time 3.9 seconds (A4 , 8 ×...
  • Page 38 4. Appendix Type 1 Type 2 Type 3 Stand-by 40.0 dB (A) 40.0 dB (A) 42.9 dB (A) Copying 64.8 dB (A) 66.5 dB (A) 67.6 dB (A) • Complete system Type 1 Type 2 Type 3 Stand-by 44.0 dB (A) 44.0 dB (A) 44.0 dB (A) Copying...
  • Page 39 Trademarks Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the United States and other countries. Microsoft, Windows, Windows Server, Windows Vista, and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 40 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 41 MEMO...
  • Page 42 MEMO D184-7513...
  • Page 43 © 2013...
  • Page 44 D184-7513...
  • Page 45: User Guide

    User Guide Easy Search Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. For safe and correct use, be sure to read the Safety Information in "Read This First"...
  • Page 47 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. Easy Search Searching by What You Want to Do........................9 Reducing my Costs............................9 Using Scanned Files on the Computer....................... 10 Registering Destinations..........................11 Operating the Machine More Effectively....................
  • Page 48 Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel)................................41 Changing the Display Language........................43 Changing the Display Language (When Using the Smart Operation Panel)......... 43 How to Use the [Home] Screen (When Using the Standard Operation Panel)......... 44 Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)......
  • Page 49 Copying onto Envelopes..........................82 Sort..................................84 Changing the Number of Sets........................85 Storing Data in the Document Server......................87 4. Fax Basic Procedure for Transmissions (Memory Transmission)................89 Sending Originals Using the Exposure Glass (Memory Transmission)........... 91 Registering a Fax Destination........................92 Deleting a Fax Destination..........................
  • Page 50 Storing Documents in Document Server....................113 Managing Documents Stored in Document Server................114 6. Scan Basic Procedure When Using Scan to Folder..................... 115 Creating a Shared Folder on a Computer Running Windows/Confirming a Computer's Information..................................116 Registering an SMB Folder........................118 Deleting an SMB Registered Folder......................122 Entering the Path to the Destination Manually..................
  • Page 51 Sending Faxes or Scanned Documents When Toner Has Run Out............169 Disposing of used toner..........................169 10. Troubleshooting When a Status Icon Is Displayed........................171 When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing............. 172 When the Machine Makes a Beeping Sound.....................174 When You Have Problems Operating the Machine...................175 When Multiple Functions Cannot Be Executed Simultaneously............
  • Page 52: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 53: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CXV008 The following information is region-specific.
  • Page 54: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder • Large Capacity Tray...
  • Page 55: Easy Search

    1. Easy Search You can search for a description by what you want to do. Searching by What You Want to Do You can search for a procedure by what you want to do. Reducing my Costs BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server.
  • Page 56: Using Scanned Files On The Computer

    1. Easy Search Checking how much paper is saved ([Information] screen) See "How to Use the [Information] Screen", Getting Started. Reducing electricity consumption See "Saving Energy", Getting Started. See "Timer Settings", Connecting the Machine/ System Settings. Using Scanned Files on the Computer BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan.
  • Page 57: Registering Destinations

    Searching by What You Want to Do Managing and using documents converted to electronic formats (Document Server) See "Relationship between Document Server and Other Functions", Copy/ Document Server. Registering Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax.
  • Page 58: Operating The Machine More Effectively

    1. Easy Search Operating the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions. Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/FAX/Scanner)) See "Changing the Default Functions of the Initial Screen (When Using the Standard Operation Panel)", Convenient Functions.
  • Page 59: What You Can Do With This Machine

    What You Can Do with This Machine What You Can Do with This Machine This section describes the features of this machine. Customizing the [Home] Screen The icons of each function are displayed on the [Home] screen. CUM001 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 60: Making Copies Using Various Functions

    1. Easy Search Making Copies Using Various Functions CJQ601 • You can print stamps on copies. Stamps can include background numbers, scanned images, dates, page numbers, and texts. See "Stamps", Copy/ Document Server. • You can reduce or enlarge the copy image. Auto Reduce / Enlarge function enables the machine to detect the original size automatically.
  • Page 61: Printing Data Using Various Functions

    What You Can Do with This Machine Printing Data Using Various Functions CJQ614 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application. See "Printing a PDF File Directly", Print.
  • Page 62: Sending And Receiving Faxes Without Paper

    1. Easy Search CJQ603 • You can retrieve stored documents scanned in scanner mode to your computer. • Using the file format converter, you can download documents stored in copier, Document Server, or printer mode to your computer. • For details about how to use the Document Server, see "Storing Data in the Document Server", Copy/ Document Server.
  • Page 63 What You Can Do with This Machine CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents). • See "Confirming/Printing/Deleting Received and Stored Documents", Fax. Transmission You can send a fax from your computer over the network (Ethernet or wireless LAN) to this machine, which then forwards the fax via its telephone connection (LAN-Fax).
  • Page 64: Sending And Receiving Faxes Via The Internet

    1. Easy Search • For details about the machine's settings, see "Network Settings Requirements", Connecting the Machine/ System Settings. • For details about how to use the function, see "Sending Fax Documents from Computers", Fax. Sending and Receiving Faxes via the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx...
  • Page 65: Sending And Receiving Faxes By Using The Machine Without Fax Unit Installed

    What You Can Do with This Machine • This machine can receive documents sent via Internet Fax (IP-Fax Reception). See "Types of Reception", Fax. • Using a VoIP gateway, this machine can send to G3 facsimiles connected to the public switched telephone network (PSTN).
  • Page 66: Using The Facsimile And The Scanner In A Network Environment

    1. Easy Search Using the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax. See "Basic Procedure for Sending Scan Files by E-mail", Scan. •...
  • Page 67: Preventing Information Leakage (Security Functions)

    What You Can Do with This Machine CUL003 • To use this function, the OCR unit is required. • You can select a file type from [PDF], [High Compression PDF], or [PDF/A]. • This function can optically recognize characters in various languages and up to approximately 40,000 characters a page.
  • Page 68: Centrally Controlling Scan Conditions And Distribution

    1. Easy Search • You can limit the usage of functions for each user. • See Security Guide. Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2/2012 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data.
  • Page 69: Preventing Unauthorized Copying

    What You Can Do with This Machine CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 70 1. Easy Search • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy. This can minimize the risk of confidential information being copied. Protected fax messages are grayed out before being transmitted or stored.
  • Page 71: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components Guide to Components (mainly Europe and Asia) • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components.
  • Page 72 2. Getting Started 2. Vents Prevent overheating. 3. Main power switch To operate the machine, the main power switch must be on. If it is off, open the main power switch's cover and turn the switch on. 4. Exposure glass Place originals face down here.
  • Page 73 Guide to Names and Functions of Components Front and right view CXV002 1. ADF's extender Pull this extender to support large paper. 2. Vents Prevent overheating. 3. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 4.
  • Page 74: Guide To Components (Mainly North America)

    2. Getting Started 6. Envelope lever To load envelopes in Tray 1 or the bypass tray, push down this lever. 7. Lower right cover Open this cover when a paper jam occurs. 8. Right cover To remove paper jams or use the envelope lever, open this cover. Rear and left view CXV003 1.
  • Page 75 Guide to Names and Functions of Components Front and left view CXV001 1. ADF Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. The ADF scans both sides of an original one side at a time.
  • Page 76 2. Getting Started 8. Paper trays (Trays 1–2) Load paper here. 9. Lower paper trays Load paper here. Front and right view CXV002 1. ADF's extender Pull this extender to support large paper. 2. Vents Prevent overheating. 3. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper.
  • Page 77 Guide to Names and Functions of Components 5. Bypass tray Use to copy or print on OHP transparencies, adhesive labels, and paper that cannot be loaded in the paper trays. 6. Envelope lever To load envelopes in Tray 1 or the bypass tray, push down this lever. 7.
  • Page 78: Guide To Functions Of The Machine's Options

    2. Getting Started Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options External options (mainly Europe) CXV009 1. Exposure glass cover Lower this cover over originals. 2. ADF Load a stack of originals here. They will feed in automatically. 3.
  • Page 79 Guide to Functions of the Machine's Options 5. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 6. LCT Holds up to 2,000 sheets of paper. You can load paper even if the LCT is in use. It is okay to pull out the left half of the tray while the LCT is in use. 7.
  • Page 80 2. Getting Started External options (mainly Asia) CXV004 1. Exposure glass cover Lower this cover over originals. 2. ADF Load a stack of originals here. They will feed in automatically. 3. Smart Operation Panel This control panel is provided with advanced operativity. 4.
  • Page 81 Guide to Functions of the Machine's Options 7. LCT Holds up to 2,000 sheets of paper. You can load paper even if the LCT is in use. It is okay to pull out the left half of the tray while the LCT is in use. 8.
  • Page 82 2. Getting Started External options (mainly North America) CXV007 1. Smart Operation Panel This control panel is provided with advanced operativity. 2. Handset Used as a receiver when a fax unit is installed. Allows you to use the On Hook Dial and Manual Dial functions. It also allows you to use the machine as a telephone.
  • Page 83 Guide to Functions of the Machine's Options 7. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 8. Bridge unit Relays paper to the finisher. 9. Internal shift tray Sorts and stacks multiple sheets of paper.
  • Page 84: Guide To The Names And Functions Of The Machine's Control Panel (When Using The Standard Operation Panel)

    2. Getting Started Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel) This illustration shows the control panel of the machine with options fully installed. CUV012 1. [Home] key Press to display the [Home] screen. For details, see page 44 "How to Use the [Home] Screen (When Using the Standard Operation Panel)".
  • Page 85 Guide to the Names and Functions of the Machine's Control Panel (When Using the Standard Operation Panel) 5. [Program] key (copier, Document Server, facsimile, and scanner mode) • Press to register frequently used settings, or to recall registered settings. See "Registering Frequently Used Functions", Convenient Functions. •...
  • Page 86 2. Getting Started 17. Number keys Use to enter the numbers for copies, fax numbers and data for the selected function. 18. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs. You can also display the job history and the machine's maintenance information.
  • Page 87: Guide To The Names And Functions Of The Machine's Control Panel (When Using The Smart Operation Panel)

    Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel) Guide to the Names and Functions of the Machine's Control Panel (When Using the Smart Operation Panel) CXV208 1. [Home] key Press to display the [Home] screen. For details, see page 49 "How to Use the [Home] Screen (When Using the Smart Operation Panel)".
  • Page 88 2. Getting Started 5. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs. You can also display the job history and the machine's maintenance information. 6. Data In indicator (facsimile and printer mode) Flashes when the machine is receiving print jobs or LAN-Fax documents from a computer.
  • Page 89: Changing The Display Language

    Changing the Display Language Changing the Display Language You can change the language used on the display. English is set as default. Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. CXX005 •...
  • Page 90: How To Use The [Home] Screen (When Using The Standard Operation Panel)

    2. Getting Started How to Use the [Home] Screen (When Using the Standard Operation Panel) The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen.
  • Page 91: Adding Icons To The [Home] Screen (When Using The Standard Operation Panel)

    How to Use the [Home] Screen (When Using the Standard Operation Panel) Press to switch pages when the icons are not displayed on one page. 7. Shortcut icon You can add shortcuts to programs or Web pages to the [Home] screen. For details about how to register shortcuts, see page 45 "Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)".
  • Page 92: Operation Panel

    2. Getting Started • You can register up to 72 function and shortcut icons. Delete unused icons if the limit is reached. For details see "Deleting an Icon on the [Home] Screen", Convenient Functions. • You can change the position of icons. For details, see "Changing the Order of Icons on the [Home] Screen (When Using the Standard Operation Panel)", Convenient Functions.
  • Page 93 How to Use the [Home] Screen (When Using the Standard Operation Panel) Press [Edit Home]. Press [Add Icon]. Press the [Program] tab.
  • Page 94 2. Getting Started Make sure that [Copier Program] is selected. Select the program you want to add. Specify the position where [Blank] is displayed. Press [OK]. Press the [User Tools/Counter] key. • Press on the upper-right corner of the screen to check the position on the simple screen.
  • Page 95: How To Use The [Home] Screen (When Using The Smart Operation Panel)

    How to Use the [Home] Screen (When Using the Smart Operation Panel) How to Use the [Home] Screen (When Using the Smart Operation Panel) To display the [Home] screen, press the [Home] key on the control panel. One icon is assigned to each function, and these icons are displayed on the [Home] screen. You can add shortcuts to frequently used functions or Web pages to the [Home] screen.
  • Page 96: Adding Icons To The [Home] Screen (When Using The Smart Operation Panel)

    2. Getting Started 4. Icon display area Displays the function or application icons and widgets. Displayed icons differ between the five home screens. For details about icons on each screen, see "Main Icons on the [Home] Screen (When Using the Smart Operation Panel)", Getting Started.
  • Page 97 How to Use the [Home] Screen (When Using the Smart Operation Panel) Press [Applications] or [Machine Application]. Press [Machine Application] to select copier mode, fax mode, or some other of the machine's applications. Press [Applications] to select widgets, quick applications, or other Smart Operation Panel applications.
  • Page 98 2. Getting Started Press the [Home] key. CZP155 Select the screen to which you want to add a shortcut. Press and hold down an area on the screen where no icons are displayed. Press [Shortcuts] on the [Add to Home] screen. Press [Machine Application].
  • Page 99 How to Use the [Home] Screen (When Using the Smart Operation Panel) Adding widgets to the [Home] screen (when using the Smart Operation Panel) You can add widgets to the [Home] screen to show the remaining amount of toner or change the display language.
  • Page 100: Registering Frequently Used Functions

    2. Getting Started Registering Frequently Used Functions Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Original type, density, Special Original, paper tray, Store File (except for User Name, File Name,...
  • Page 101 Registering Frequently Used Functions CXX002 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [Copier] icon on the Home screen 4. Edit the copy settings so all functions you want to store in a program are selected.
  • Page 102 2. Getting Started Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit]. • The number of characters you can enter for a program name varies depending on the functions as follows: • Copier: 34 characters •...
  • Page 103: Example Of Programs

    Registering Frequently Used Functions • Program numbers with next to them already have settings made for them. • Programs can be registered to the [Home] screen, and can be recalled easily. For details, see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions and page 45 "Adding Icons to the [Home] Screen (When Using the Standard Operation Panel)".
  • Page 104 2. Getting Started Program name Program description Effect Storage copy: Specify a folder in [Target Folder to You can use folders to organize XXXX Store] in [Store File]. stored files by user name or intended use. (replace XXXX by a folder name) Scanner mode Program name...
  • Page 105 Registering Frequently Used Functions Program name Program description Effect High resolution Specify settings to save scanned Scanned documents maintain much scan data in TIFF format. Also, specify a of the detail of the originals, but the higher resolution in [Scan Settings]. size of the data may be quite large.
  • Page 106: Turning On/Off The Power

    2. Getting Started Turning On/Off the Power The main power switch is on the left side of the machine. When this switch is turned on, the main power turns on and the main power indicator on the right side of the control panel lights up. When this switch is turned off, the main power turns off and the main power indicator on the right side of the control panel goes out.
  • Page 107: Logging In The Machine

    Logging In the Machine Logging In the Machine When the Authentication Screen is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 108: Logging In Using The Control Panel (When Using The Smart Operation Panel)

    2. Getting Started Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging In Using the Control Panel (When Using the Smart Operation Panel) This section explains the procedure for logging in to the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 109: Logging Out Using The Control Panel (When Using The Standard Operation Panel)

    Logging In the Machine Logging Out Using the Control Panel (When Using the Standard Operation Panel) This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set. • To prevent use of the machine by unauthorized persons, always log out when you have finished using the machine.
  • Page 110: Placing Originals

    2. Getting Started Placing Originals Placing Originals on the Exposure Glass (mainly Europe and Asia) • Keep your hands away from the hinges and exposure glass when lowering the ADF. Not doing so may result in an injury if your hands or fingers are pinched. •...
  • Page 111: Placing Originals In The Auto Document Feeder

    Placing Originals • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF. Be sure to lift the ADF by more than 30 degrees. Otherwise, the size of the original might not be detected correctly.
  • Page 112 2. Getting Started Place the aligned originals squarely face up in the ADF. Do not stack originals beyond the limit mark. The first page should be on the top. CSN004 1. Limit mark 2. Original guide...
  • Page 113: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 114 3. Copy Make sure that no previous settings remain. When there are previous settings remaining, press the [Reset] key. Place the originals. Make desired settings. Enter the number of copies with the number keys. The maximum copy quantity that can be entered is 999. Press the [Start] key.
  • Page 115: Auto Reduce / Enlarge

    Auto Reduce / Enlarge Auto Reduce / Enlarge The machine automatically detects the original size and then selects an appropriate reproduction ratio based on the paper size you select. CKN008 • If you select a reproduction ratio after pressing [Auto Reduce / Enlarge], [Auto Reduce / Enlarge] is canceled and the image cannot be rotated automatically.
  • Page 116 3. Copy Press [Auto Reduce / Enlarge]. Select the paper size. Place the originals, and then press the [Start] key.
  • Page 117: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page. 2 Sided 2 Sided Copies one 2-sided page on one 2-sided page.
  • Page 118 3. Copy Original Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Dup./Combine/Series]. Make sure that [Duplex] is selected. If [Duplex] is not selected, press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output.
  • Page 119: Specifying The Original And Copy Orientation

    Duplex Copying Select the original orientation, and then press [OK]. Press the [Start] key. Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper.
  • Page 120 3. Copy Select [Top to Top] or [Top to Bottom] for [Original:] if the original is two-sided. Select [Top to Top] or [Top to Bottom] for [Copy:]. Press [OK].
  • Page 121: Combined Copying

    Combined Copying Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 122: One-Sided Combine

    3. Copy CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 There are six types of One-Sided Combine. 1 Sided 2 Originals Combine 1 Side Copies two 1-sided originals to one side of a sheet. 1 Sided 4 Originals Combine 1 Side Copies four 1-sided originals to one side of a sheet.
  • Page 123: Two-Sided Combine

    Combined Copying 2 Sided 4 Pages Combine 1 Side Copies two 2-sided originals to one side of a sheet. 2 Sided 8 Pages Combine 1 Side Copies four 2-sided originals to one side of a sheet. Press [Dup./Combine/Series]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original:].
  • Page 124 3. Copy CKN074 There are six types of Two-Sided Combine. 1 Sided 4 Originals Combine 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Combine 2 Sides Copies eight 1-sided originals to one sheet with four pages per side. 1 Sided 16 Originals Combine 2 Sides Copies 16 1-sided originals to one sheet with eight pages per side.
  • Page 125 Combined Copying Select [1 Sided] or [2 Sided] for [Original:]. Press [Combine 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original:] and/or [Copy:], and then press [OK]. Select the number of originals to combine. Press [OK]. Select the paper size.
  • Page 126 3. Copy Copying onto Custom Size Paper from Tray 1 or the Bypass Tray Paper that has a horizontal length of 148.0–432.0 mm (5.83–17.00 inches) and a vertical length of 100.0–297.0 mm (3.94–11.69 inches) can be fed in from Tray 1. Paper that has a horizontal length of 148.0–600.0 mm (5.83–23.62 inches) and a vertical length of 90.0–305.0 mm (3.55–12.00 inches) can be fed in from the bypass tray.
  • Page 127: Copying Onto Custom Size Paper From Tray 1 Or The Bypass Tray

    Copying onto Custom Size Paper from Tray 1 or the Bypass Tray Enter the horizontal size with the number keys, and then press [ ]. Tray 1 Bypass tray Enter the vertical size with the number keys, and then press [ ]. Press [OK] twice.
  • Page 128: Copying Onto Envelopes

    3. Copy Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Place the original on the exposure glass and place the envelope in Tray 1 or the bypass tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see page 153 "Recommended Paper Sizes and Types".
  • Page 129 Copying onto Envelopes CTA005 : Horizontal : Vertical Be sure to include the fully open flap in the horizontal dimension. Before using this function, select [Envelope] for the paper type under [Tray Paper Settings] in User Tools. For details, see "Tray Paper Settings", Connecting the Machine/ System Settings. Load the envelopes face up into Tray 1 or face down in the bypass tray.
  • Page 130: Sort

    3. Copy Sort The machine assembles copies as sets in sequential order. • You cannot use the bypass tray with Rotate Sort. Sort/Shift Sort Copies are assembled as sets in sequential order. To use Shift Sort, a finisher or the internal shift tray is required. Each time the copies of one set or a job are delivered, the next copy is shifted to separate each set or job.
  • Page 131: Changing The Number Of Sets

    Sort Press [Finishing]. Select [Sort] or [Rotate Sort], and then press [OK]. Enter the number of copy sets using the number keys. Place the originals. To confirm the type of finishing, press the [Sample Copy] key. Press the [Start] key. Changing the Number of Sets You can change the number of copy sets during copying.
  • Page 132 3. Copy Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 133: Storing Data In The Document Server

    Storing Data in the Document Server Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents on the Document Server screen.
  • Page 134 3. Copy...
  • Page 135: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 136 4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Make the scan settings such as scan size and resolution. Configure the transmission settings such as [TX Mode] as necessary. Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 137: Sending Originals Using The Exposure Glass (Memory Transmission)

    Basic Procedure for Transmissions (Memory Transmission) If you send documents to Internet Fax or e-mail destinations or enable the Email TX Results function, specify a sender. Press the [Start] key. Sending Originals Using the Exposure Glass (Memory Transmission) Make sure [Immed. TX] is not highlighted. Place the first page of the original face down on the exposure glass.
  • Page 138: Registering A Fax Destination

    4. Fax Registering a Fax Destination Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 139: Deleting A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". Press [OK]. Press [Exit]. Close the initial settings screen. •...
  • Page 140 4. Fax You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination. Press [Fax Dest.]. Press [Change] under "Fax Destination". Press [Delete All], and then press [OK] under "Fax Destination". Press [OK]. Press [Exit].
  • Page 141: Transmitting While Checking Connection To Destination (Immediate Transmission)

    Transmitting while Checking Connection to Destination (Immediate Transmission) Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 142: Sending Originals Using The Exposure Glass (Immediate Transmission)

    4. Fax Press [Immed. TX]. Place the original into the ADF. Select the scan settings you require. Specify a destination. If you make a mistake, press the [Clear] key, and then enter again. Press the [Start] key. Sending Originals Using the Exposure Glass (Immediate Transmission) Press [Immed.
  • Page 143 Transmitting while Checking Connection to Destination (Immediate Transmission) Press the [ ] key.
  • Page 144: Canceling A Transmission

    4. Fax Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Cancel sending. • When using the standard operation panel Press the [Reset] key.
  • Page 145: Canceling A Transmission After The Original Is Scanned

    Canceling a Transmission Press the [Stop] key. CXX006 Press [Cancel Scanning] or [Cancel TX]. Depending on the transmission mode and function you use, either [Cancel Scanning] or [Cancel TX] is displayed. Canceling a Transmission After the Original Is Scanned Use this procedure to cancel a transmission after the original is scanned. You can cancel transmission of a file while the file is being sent, stored in memory, or if it fails to transmit.
  • Page 146 4. Fax Press [OK]. To cancel another file, repeat steps 3 through 5. Press [Exit]. After pressing [Check / Stop Transmission File] under [TX/RX Status / Print] in step 1, press [Exit] twice.
  • Page 147: Storing A Document

    Storing a Document Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 148: Sending Stored Documents

    4. Fax Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 149 Storing a Document Press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [User Name] to place the documents in order by programmed user name. •...
  • Page 150: Printing The Journal Manually

    4. Fax Printing the Journal Manually To print the Journal manually, select the printing method: [All], [Print per File No.], or [Print per User]. Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 151: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 152: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 153: Standard Printing

    Standard Printing Standard Printing • The default setting is 2 sided printing. If you want to print on only one side, select [Off] for the 2 sided printing setting. • If you send a print job via USB 2.0 while the machine is in Sleep mode, an error message might appear when the print job is complete.
  • Page 154: Printing On Both Sides Of Sheets

    5. Print Printing on Both Sides of Sheets This section explains how to print on both sides of each page using the printer driver. • The types of paper that can be printed on both sides are as follows: • Plain (60 to 81 g/m2), Recycled, Special, Middle Thick (82 to 105 g/m2), Thin (52 to 59 g/m2), Color, Letterhead, Preprinted, Prepunched, Bond, Cardstock When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click...
  • Page 155: Combining Multiple Pages Into Single Page

    Combining Multiple Pages into Single Page Combining Multiple Pages into Single Page This section explains how to print multiple pages onto a single sheet. The combine printing function allows you to economize on paper by printing multiple sheets at reduced size onto a single sheet. When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click [Print].
  • Page 156 5. Print 4 Pages per Sheet Right, then Down Down, then Right Left, then Down Down, then Left...
  • Page 157: Printing On Envelopes

    Printing on Envelopes Printing on Envelopes Configure the paper settings appropriately using both the printer driver and the control panel. Configuring Envelope Settings Using the Control Panel Load envelopes in the paper tray. Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key.
  • Page 158: Printing On Envelopes Using The Printer Driver

    5. Print Printing on Envelopes Using the Printer Driver When using the PCL 6 printer driver Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the [Select Printer] list, select the printer you want to use. Click [Preferences].
  • Page 159: Saving And Printing Using The Document Server

    Saving and Printing Using the Document Server Saving and Printing Using the Document Server The Document Server enables you to store documents on the machine's hard disk, and allows you to edit and print them as necessary. • Applications with their own drivers, such as PageMaker, do not support this function. •...
  • Page 160: Managing Documents Stored In Document Server

    5. Print If the folder is protected by a password, enter the password in the "Folder Password:" box. Click [OK]. Change any other print settings if necessary. Click [OK]. Start printing from the application's [Print] dialog box. • You can print the documents stored in the Document Server using the control panel. For details, see "Printing Stored Documents", Copy/ Document Server.
  • Page 161: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 162: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan Press the [Folder] tab. Place originals. If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 163 Basic Procedure When Using Scan to Folder Step 1: Confirming the user name and computer name Confirm the user name and the name of the computer you will send scanned documents to. On the [Start] menu, point to [All Programs], then [Accessories], and then click on [Command Prompt].
  • Page 164: Registering An Smb Folder

    6. Scan Specify one or more object types, select a location, and then click [Find Now]. When using Windows XP, click [Find Now]. From the list of results, select the groups and users you want to grant access to, and then click [OK].
  • Page 165 Basic Procedure When Using Scan to Folder Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4. Press [Address Book Mangmnt]. Check that [Program / Change] is selected.
  • Page 166 6. Scan Press [Change] under "Login User Name". Enter the login user name of the destination computer, and then press [OK]. Press [Change] under "Login Password". Enter the password of the destination computer, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [Folder].
  • Page 167 Basic Procedure When Using Scan to Folder If the network does not allow automatic obtaining of IP addresses, include the destination computer's IP address in the path. For example: if the IP address of the destination computer is "192.168.0.191", and the folder name is "Share", the path will be \\192.168.0.191\Share. Press [OK].
  • Page 168: Deleting An Smb Registered Folder

    6. Scan Deleting an SMB Registered Folder Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 169: Entering The Path To The Destination Manually

    Basic Procedure When Using Scan to Folder Entering the Path to the Destination Manually Press [Manual Entry]. Press [SMB]. Press [Manual Entry] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 170: Basic Procedure For Sending Scan Files By E-Mail

    6. Scan Basic Procedure for Sending Scan Files by E- mail Display the initial scanner screen. • When using the standard operation panel Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen.
  • Page 171: Registering An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 172 6. Scan Enter the name, and then press [OK]. Press [ Next]. Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. •...
  • Page 173: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail Press [OK]. Select [E-mail / Internet Fax Destination] or [Internet Fax Destination Only]. If [E-mail / Internet Fax Destination] is specified, registered e-mail addresses appear in both Internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 174: Entering An E-Mail Address Manually

    6. Scan Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. Entering an E-mail Address Manually Press [Manual Entry].
  • Page 175: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 176: Checking A Stored File Selected From The List

    6. Scan Press [Store File]. Press [Store to HDD]. If necessary, specify the stored file's information, such as [User Name], [File Name], [Password], and [Select Folder]. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name.
  • Page 177 Basic Procedure for Storing Scan Files Press [Select Stored File]. Specify the folder where the file is stored. From the list of stored files, select the file you want to check. You can select more than one file. Press [Preview].
  • Page 178: Specifying The File Type

    6. Scan Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a memory storage device.
  • Page 179: Specifying Scan Settings

    Specifying Scan Settings Specifying Scan Settings Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 180 6. Scan...
  • Page 181: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 182 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the screen. CXX002 Press [To Scanning Screen]. Press [Target Fldr. to Store]. Specify a folder in which to store the document, and then press [OK]. Press [User Name].
  • Page 183: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [Finishing] ([Sort], [Rotate Sort], [Stack], [Staple], [Punch], [Half Fold: Print Outside]) •...
  • Page 184 7. Document Server...
  • Page 185: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 186 8. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 187: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Loading Paper Precautions for Loading Paper • When loading paper, take care not to trap or injure your fingers. •...
  • Page 188: Loading Paper Into The Bypass Tray

    9. Adding Paper and Toner Check that paper in the paper tray is not being used, and then pull the tray carefully out until it stops. CXV013 Square the paper and load it print side up. Do not stack paper over the limit mark. CXV015 Carefully push the paper tray fully in.
  • Page 189 Loading Paper • The maximum number of sheets you can load at the same time depends on paper type. Do not stack paper over the limit mark. For the maximum number of sheets you can load, see page 153 "Recommended Paper Sizes and Types". Open the bypass tray.
  • Page 190: Printing From The Bypass Tray Using The Printer Function

    9. Adding Paper and Toner • You can load envelopes into the bypass tray. Envelopes must be loaded in a specific orientation. For details, see page 161 "Envelopes". • Specify the sizes of paper that are not automatically detected. For details about the sizes that can be detected automatically, see page 153 "Recommended Paper Sizes and Types".
  • Page 191 Loading Paper CXX005 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4. Press [Tray Paper Settings].
  • Page 192 9. Adding Paper and Toner CXX005 • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4. Press [Tray Paper Settings].
  • Page 193 Loading Paper Specifying thick paper, thin paper, or OHP transparencies for paper type using the control panel • Use A4 or 8 × 11 size OHP transparencies, and specify their size. • Usually only one side of OHP transparencies can be used for printing. Be sure to load them with the print side down.
  • Page 194: Loading Paper Into Large Capacity Tray (Lct)

    9. Adding Paper and Toner Press [OK]. Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. •...
  • Page 195 Loading Paper Carefully pull out the LCT until it stops. CXV016 Square the paper and load it print side up. Do not stack paper over the limit mark. • Whole tray pulled out CXV017 • Left half of the tray pulled out CXV018 Carefully push the LCT fully in.
  • Page 196: Loading Orientation-Fixed Paper Or Two-Sided Paper

    9. Adding Paper and Toner Loading Orientation-fixed Paper or Two-sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not be printed correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 197 Loading Paper Original orientation Exposure glass Unreadable • Copy orientation • Scanner • Paper orientation • Copier mode Copy side Paper trays Bypass tray One-sided Two-sided • Printer mode Print side Paper trays Bypass tray One-sided Two-sided...
  • Page 198 9. Adding Paper and Toner • In copier mode: • For details about how to make two-sided copies, see page 71 "Duplex Copying". • In printer mode: • To print on letterhead paper when [Auto Detect] is specified for [Letterhead Setting], you must specify [Letterhead] as the paper type in the printer driver's settings.
  • Page 199: Recommended Paper

    Recommended Paper Recommended Paper Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use paper that curls, either because it is too dry or too damp, a staple clogging or paper jam may occur. •...
  • Page 200 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–157 g/m (14–42 lb. Select the paper size using the Tray 500 sheets Bond) Paper Settings menu: Thin Paper–Thick Paper B6 JIS , 11 × 17 , 8 ×...
  • Page 201 Recommended Paper Paper type and weight Paper size Paper capacity Envelopes Select the paper size using the Tray • : 50 sheets Paper Settings menu: • × 9 × 7 , C5 Double flap: 15 , C6 Env , DL Env sheets Single flap: 25 sheets *1 When loading paper with a vertical length of 279 mm (11.0 inches) or more in Tray 1, use paper that...
  • Page 202 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–157 g/m (14–42 lb. Select the paper size using the Tray 550 sheets Bond) Paper Settings menu: Thin Paper–Thick Paper 11 × 17 , 8 × 14 , 8 ×...
  • Page 203 Recommended Paper Bypass tray Paper type and weight Paper size Paper capacity 52–157 g/m (14–42 lb. Paper sizes that can be detected • Thin Paper–Middle Bond) automatically: Thick: 100 sheets Thin Paper–Thick Paper • Thick Paper : 40 sheets A3 , A4 , A5 , B4 JIS , B5 , B6 JIS...
  • Page 204 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–157 g/m (14–42 lb. Custom size • Thin Paper–Middle Bond) Thick: 100 sheets Thin Paper–Thick Paper • Thick Paper : 40 Vertical: 90.0–305.0 mm sheets Horizontal: 148.0–600.0 mm Vertical: 3.55–12.00 inches Horizontal: 5.83–23.62 inches Translucent paper...
  • Page 205 Recommended Paper Large capacity tray (LCT) Paper type and weight Paper size Paper capacity 52–157 g/m (14–42 lb. 1,000 sheets × 2 Bond) Thin Paper–Thick Paper × 11 52–157 g/m (14–42 lb. 1,000 sheets × 2 Bond) Thin Paper–Thick Paper ×...
  • Page 206 9. Adding Paper and Toner • Flatten out curled sheets before loading them. • Depending on the paper sizes and types, the copy/print speed may be slower than usual. • When loading thick paper of 106–157 g/m (28–42 lb. Bond), see page 161 "Thick paper". •...
  • Page 207: Thick Paper

    Recommended Paper Thick paper This section gives you various details about and recommendations concerning thick paper. When loading thick paper of 106–157 g/m (28–42 lb. Bond), follow the recommendations below to prevent misfeeds and loss of image quality. • Store all your paper in the same environment - a room where the temperature is 20–25°C (68– 77°F) and the humidity is 30–65%.
  • Page 208 9. Adding Paper and Toner • Only envelopes that are at least 148 mm (5.9 inches) wide and whose flaps are open can be loaded in the orientation. • When loading envelopes in the orientation, load them with flaps fully open. Otherwise, they might not feed into the machine.
  • Page 209 Recommended Paper Orientation of Exposure glass Tray 1 envelopes Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of envelopes: • Bottom side of envelopes: toward the back of the toward the back of the machine machine • Side to be scanned: face •...
  • Page 210 9. Adding Paper and Toner Orientation of Exposure glass Bypass tray envelopes Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of envelopes: • Bottom side of envelopes: toward the front of the toward the front of the machine machine •...
  • Page 211 Recommended Paper Types of envelopes Tray 1 Bypass tray Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of envelopes: • Bottom side of envelopes: toward the back of the toward the front of the machine machine • Side to be printed: face up •...
  • Page 212 9. Adding Paper and Toner • Certain types of envelopes might come out creased, dirtied, or misprinted. If you are printing a solid color on an envelope, lines may appear where the overlapped edges of the envelope make it thicker.
  • Page 213: Adding Toner

    Adding Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 214 9. Adding Paper and Toner • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing.
  • Page 215: Sending Faxes Or Scanned Documents When Toner Has Run Out

    Adding Toner • For details about how to check contact number where you can order supplies, see "Inquiry", Maintenance and Specifications. Sending Faxes or Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send faxes or scanned documents.
  • Page 216 9. Adding Paper and Toner Pack used toner containers in the container's box or a bag to prevent the toner from leaking out of the container when you dispose of it. (mainly Europe and Asia) If you want to discard your used toner container, please contact your local sales office. If you discard it by yourself, treat it as general plastic waste material.
  • Page 217: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. When a Status Icon Is Displayed This section describes the status icons displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Status Icon Status : Paper Misfeed icon Appears when a paper misfeed occurs.
  • Page 218: When The Indicator Lamp For The [Check Status] Key Is Lit Or Flashing

    10. Troubleshooting When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing If the indicator lamp for the [Check Status] key lights up or flashes, press the [Check Status] key to display the [Check Status] screen. Check the status of each function in the [Check Status] screen. [Check Status] screen CYG003 1.
  • Page 219 When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper.
  • Page 220: When The Machine Makes A Beeping Sound

    10. Troubleshooting When the Machine Makes a Beeping Sound The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep Panel/screen input A control panel or screen key was accepted.
  • Page 221: When You Have Problems Operating The Machine

    When You Have Problems Operating the Machine When You Have Problems Operating the Machine Problem Causes Solutions When the machine is turned Functions other than the Wait a little longer. on, the only icon that copier function are not yet appears on the home screen ready.
  • Page 222 10. Troubleshooting Problem Causes Solutions The user code entry screen is Users are restricted by User For details about how to log in when displayed. Code Authentication. User Code Authentication is enabled, see "When the Authentication Screen is Displayed", Getting Started. The Authentication screen Basic Authentication, Enter your login user name and user...
  • Page 223 When You Have Problems Operating the Machine Problem Causes Solutions Misfeeds occur frequently. Using curled paper often • Take the stiffness out of the paper causes misfeeds, soiled with your hands to straighten out paper edges, or slipped the curl. positions while performing •...
  • Page 224 10. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. Paper of undetectable size • Remove misfed paper. For details has been loaded. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting. • If you load a paper size that is not selected automatically, you need to specify the paper size with the control panel.
  • Page 225 When You Have Problems Operating the Machine Problem Causes Solutions The address book cannot be The address book cannot be • Wait until the address book has changed from the display changed while it is being finished being backed up, and panel.
  • Page 226: When Multiple Functions Cannot Be Executed Simultaneously

    10. Troubleshooting When Multiple Functions Cannot Be Executed Simultaneously If you are not able to carry out your job, it may be that the machine is being used by another function. Wait until the current job is completed before trying again. In certain cases, you can carry out another job using a different function while the current job is being performed.
  • Page 227: Messages Displayed When Using The Copy/Document Server Function

    Messages Displayed When Using the Copy/Document Server Function Messages Displayed When Using the Copy/ Document Server Function • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper. For details about recommended paper, see page 153 "Recommended Paper Sizes and Types".
  • Page 228 10. Troubleshooting Message Causes Solutions "Cannot display preview of The image data may have Press [Exit] to display the preview this page." been corrupted. screen without a thumbnail. If the selected document contains several pages, press [Switch] on the "Display Page" area to change the page, and then a preview of the next page will appear.
  • Page 229 Messages Displayed When Using the Copy/Document Server Function Message Causes Solutions "Magazine or Booklet mode You selected the Make sure originals for the is not available due to mixed "Magazine" or "Booklet" "Magazine" or "Booklet" function are image mode." function for originals scanned using the same function.
  • Page 230 10. Troubleshooting Message Causes Solutions "The selected folder is An attempt was made to edit For details about locked folders, see locked. Please contact the or use a locked folder. Security Guide. file administrator." • If you set [Memory Full Auto Scan Restart] in [Input / Output] of User Tools to [On], even if the memory becomes full, the memory overflow message will not be displayed.
  • Page 231: Messages Displayed When Using The Facsimile Function

    Messages Displayed When Using the Facsimile Function Messages Displayed When Using the Facsimile Function Message Causes Solutions "Cannot find the specified The name of the computer or Check that the computer name and the path. Please check the folder entered as the folder name for the destination are settings."...
  • Page 232: When There Is A Problem Specifying The Network Settings

    10. Troubleshooting Message Causes Solutions "Some page(s) are near The first page of the The original's blank side might have blank." document is almost blank. been scanned. Be sure to place your originals correctly. For details about determining the cause of blank pages, see "Detecting Blank Pages", Fax.
  • Page 233 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are Registering of user name is • Correct that the correct SIP Server any network problems." rejected by SIP server. IP Address and SIP User Name are listed in [SIP Settings] of [13-17] [Facsimile Features].
  • Page 234 10. Troubleshooting Message Causes Solutions "Check whether there are The "Effective Protocol" and • Check that the correct IP address any network problems." "SIP Server IP Address" is specified for the machine in settings are different, or an [System Settings]. For details [13-26] incorrect IP address has been about IP address, see "Interface...
  • Page 235 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or login listed correctly.
  • Page 236 10. Troubleshooting Message Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3 / IMAP4 Settings] of [15-01] [System Settings]. For details about POP3 / IMAP4 Settings, see "File Transfer", Connecting the Machine/ System Settings.
  • Page 237 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 238: When The Remote Fax Function Cannot Be Used

    10. Troubleshooting • Settings that can be confirmed in System Settings or Facsimile Features on the control panel can also be confirmed from Web Image Monitor. For details about how to confirm the settings from Web Image Monitor, see Web Image Monitor Help. •...
  • Page 239 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are • An IP address has not • Check that the correct IP address any network problems." been registered for the is specified for the machine in main machine.
  • Page 240 10. Troubleshooting Message Causes Solutions "Connection with the remote The settings or machine For details about the settings and machine has failed. There is configuration for using the machine configuration for using the a problem with the remote remote fax function to remote fax function to connect to a machine structure.
  • Page 241: Messages Displayed When Using The Printer Function

    Messages Displayed When Using the Printer Function Messages Displayed When Using the Printer Function This section describes the principal messages that appear on the display panel, error logs or reports. If other messages appear, follow their instructions. Messages Displayed on the Control Panel When Using the Printer Function •...
  • Page 242 10. Troubleshooting Message Causes Solutions "Load following paper in n. The printer driver settings are Check that the printer driver settings To cancel job, press [Job incorrect or the tray does not are correct, and then load paper of Reset]." contain paper of the size the size selected in the printer driver selected in the printer driver.
  • Page 243 Messages Displayed When Using the Printer Function Message Causes Solutions "Printer font error." An error has occurred in the Contact your service representative. font settings. "Problems with the wireless The machine has detected a Check that the Bluetooth unit is card.
  • Page 244: Messages Printed On The Error Logs Or Reports When Using The Printer Function

    10. Troubleshooting Message Causes Solutions "Unable to access the • An error occurred Save the file to a different memory specified memory storage when the machine storage device, and then try to print device." accessed the memory again. storage device or a file stored on the memory storage device.
  • Page 245 Messages Displayed When Using the Printer Function Message Causes Solutions "An error occurred while The resolution is set to a On the printer driver, set the resolution processing an Unauthorized value less than 600 dpi to 600 dpi or higher, or deselect Copy Prevention job.
  • Page 246 10. Troubleshooting Message Causes Solutions "Classification Code is The classification code is not Select [Optional] for classification incorrect." supported with the printer code. For details about how to specify driver. classification code settings, see "Configuring Classification Codes", Print. "Duplex has been Duplex printing was •...
  • Page 247 Messages Displayed When Using the Printer Function Message Causes Solutions "Staple has been cancelled." Stapling printing was Check the paper orientation, paper canceled. quantity, print orientation, and staple position. Certain settings can produce print results that might not be as expected.
  • Page 248 10. Troubleshooting Message Causes Solutions "Exceeded max. number of While using the error job Delete unneeded files stored in the pages. (Auto)" store function to store machine. Normal Print jobs as Hold Reduce the number of pages to print. Print files, the maximum page capacity was exceeded.
  • Page 249 Messages Displayed When Using the Printer Function Message Causes Solutions "HDD is full." The hard disk became full Delete unneeded files stored in the while printing a Sample machine. Print, Locked Print, Hold Alternatively, reduce the data size of Print, or Stored Print file. the Sample Print, Locked Print, Hold Print, or Stored Print file.
  • Page 250 10. Troubleshooting When the user lacks privileges to perform an operation Message Causes Solutions "No response from the A timeout occurred while Check the status of the server. server. Authentication has connecting to the server for failed." LDAP authentication or Windows Authentication.
  • Page 251 Messages Displayed When Using the Printer Function Message Causes Solutions "Information for user The user name for LDAP or For details about user authentication, authentication is already Integration Server see Security Guide. registered for another user." authentication was already registered in a different server with a different ID, and a duplication of the user name occurred due to a...
  • Page 252 10. Troubleshooting Message Causes Solutions "Command Error" An RPCS command error Check using the following procedure: occurred. • Check if the communication between the computer and the machine is working correctly. • Check if the correct printer driver is being used. •...
  • Page 253 Messages Displayed When Using the Printer Function Message Causes Solutions "Failed to obtain file system." PDF direct printing could not Turn off the power, and then back on be performed because the again. If the message appears again, file system could not be contact your service representative.
  • Page 254: Messages Displayed When Using The Scanner Function

    10. Troubleshooting Messages Displayed When Using the Scanner Function Messages Displayed on the Control Panel When Using the Scanner Function This section describes likely causes of and possible solutions for the error messages that appear on the control panel. If a message not described here appears, act according to the message. Message Causes Solutions...
  • Page 255 Messages Displayed When Using the Scanner Function Message Causes Solutions "Exceeded max. number of The maximum enterable Check the maximum number of alphanumeric characters." number of alphanumeric characters which can be entered, and characters has been then enter it again. For details about exceeded.
  • Page 256 10. Troubleshooting Message Causes Solutions "The program is recalled. The program contains a For details about how to set Cannot recall the destination for which the permissions, see Security Guide. destination(s) for which currently logged-in user access privileges are does not have permission to required."...
  • Page 257 Messages Displayed When Using the Scanner Function Message Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity." maximum data capacity. again. Note that it may not be possible to scan very large originals at a high "Check scanning resolution, resolution.
  • Page 258 10. Troubleshooting Message Causes Solutions "Not all of the image will be Using [Specify Reproduction Specify a large size in [Specify Size], scanned." Ratio] to scale down a large and then try to scan the original again. document may cause part of If displaying the entire image is not the image to be lost.
  • Page 259 Messages Displayed When Using the Scanner Function Message Causes Solutions "Memory is full. Scanning Because there is not enough Specify whether to use the data or not. has been cancelled. Press free hard disk space in the [Send] to send the scanned machine for delivering or data, or press [Cancel] to sending by e-mail while...
  • Page 260 10. Troubleshooting Message Causes Solutions "Transmission has failed. Transmission has failed. Allocate sufficient space. Insufficient memory in the There was not enough free destination hard disk. To space on the hard disk of the check the current status, SMTP server, FTP server, or press [Scanned Files client computer at the Status]."...
  • Page 261 Messages Displayed When Using the Scanner Function Message Causes Solutions "Some of selected files are You cannot delete a file Cancel transmission ("Waiting..." status currently in use. They could which is waiting to be cleared) or the DeskTopBinder setting, not be deleted." transmitted ("Waiting..."...
  • Page 262 10. Troubleshooting When the WSD scanner function cannot be used Message Causes Solutions "Cannot communicate with WSD (Device) protocol or For details about how to enable or PC. Contact the WSD (Scanner) protocol is disable the WSD protocol, see Security administrator."...
  • Page 263 Messages Displayed When Using the Scanner Function When documents cannot be stored on a memory storage device Message Causes Solutions "Cannot write on the The memory storage device • Replace the memory storage memory storage device is full and scan data cannot device.
  • Page 264: Messages Displayed On The Client Computer

    10. Troubleshooting Message Causes Solutions "Memory is full. Press [Write] The scan could not be Select whether or not to save the to write the current scanned completed because there scanned document to the memory data to the memory storage was insufficient hard disk storage device.
  • Page 265 Messages Displayed When Using the Scanner Function Message Causes Solutions "Cannot specify any more The maximum number of The maximum number of scanning scanning area." registerable scan areas has areas that can be stored is 100. Delete been exceeded. unneeded scanning areas. "Clear Misfeed(s) in ADF."...
  • Page 266 10. Troubleshooting Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help. The problem may be due to the following cause: •...
  • Page 267 Messages Displayed When Using the Scanner Function Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such •...
  • Page 268 10. Troubleshooting Message Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly. network correctly. ("XXX"...
  • Page 269 Messages Displayed When Using the Scanner Function Message Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool.
  • Page 270: When Other Messages Appear

    10. Troubleshooting When Other Messages Appear Message Causes Solutions "Cannot connect with the • The wireless LAN Turn off the power, and then confirm wireless card. Turn the main board was not inserted the wireless LAN board is inserted power switch off, then check when the machine was correctly.
  • Page 271: When There Is A Problem Scanning Or Storing Originals

    When Other Messages Appear Message Causes Solutions "Self checking..." The machine is performing The machine may perform periodic image adjustment maintenance during operations. The operations. frequency and duration of maintenance depends on the humidity, temperature, and printing factors such as number of prints, paper size, and paper type.
  • Page 272: When The Home Screen Cannot Be Edited (When Using The Standard Operation Panel)

    10. Troubleshooting Message Causes Solutions "Captured file exceeded The maximum number of Reduce the number of pages in the max. number of pages per pages per file has been transmitted file, and then resend the file. Cannot send the exceeded. file.
  • Page 273: When The Address Book Is Updated

    When Other Messages Appear When the Address Book Is Updated Message Causes Solutions "Updating the destination list A network error has • Check whether the server is has failed. Try again?" occurred. connected. • Antivirus programs and firewalls can prevent client computers from establishing connection with this machine.
  • Page 274: When Data Cannot Be Sent Due To A Problem With The Destination

    10. Troubleshooting When Data Cannot Be Sent Due to a Problem with the Destination Message Causes Solutions "Some invalid destination(s) The specified group contains In the message that appears at each contained. Do you want to fax destinations, e-mail transmission, press [Select]. select only valid destinations, and/or folder destination(s)?"...
  • Page 275 When Other Messages Appear Message Causes Solutions "XXX cannot be YYY The device certificate (S/ A new device certificate (S/MIME) because the device MIME) has expired. must be installed. For details about certificate used for the S/ how to install a device certificate (S/ MIME signature is not MIME), see Security Guide.
  • Page 276: When Problems Occur While Logging In

    10. Troubleshooting When Problems Occur While Logging In Message Causes Solutions "Authentication has failed." The entered login user name For details about the correct login user or login password is not name and login password, see correct. Security Guide. "Authentication has failed." The machine cannot perform For details about authentication, see authentication.
  • Page 277 When Other Messages Appear Message Causes Solutions "Exceeded time limit for A network error has • Try the operation again. If the LDAP server search. Check occurred and connection message is still shown, the the server status." has failed. network may be busy. •...
  • Page 278 10. Troubleshooting...
  • Page 279: Index

    INDEX Destination..........123, 228 Display language..........1000-sheet finisher........33, 35, 37 Display panel..........38, 41 2 Sided Print............Distributed scan management......Document Server..10, 15, 45, 87, 113, 114, 135 DSM............... Address Book........11, 92, 93, 227 Duplex..............Address Book Management......... Duplex Copy.............
  • Page 280 Message..175, 181, 185, 195, 198, 199, 201, 202, 203, 204, 205, 208, 210, 212, 213, 214, 215, 216, 217, 218, 221, 224, 225, 226, 227, Immediate transmission........95, 96 228, 230 Indicator............... Model-Specific Information........Information screen........... Initial settings............Internal finisher......... 33, 35, 37 Names of Major Features........
  • Page 281 Registering destinations......... Tray 1............26, 30, 80 Remote Fax............ Tray 2............... 19, 192 26, 30 Reset key..............Turning On/Off the Power........Return key............... Two-Sided Combine..........Right cover............Two-sided paper..........28, 31 Running out of toner..........Unauthorized copy prevention......Sample Copy key..........Used toner............
  • Page 282 MEMO D184-7503A...
  • Page 283 © 2013...
  • Page 284 D184-7503A...
  • Page 285: Operating Instructions

    Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 287 TABLE OF CONTENTS 1. Introduction Start Installer................................3 Software and Utilities Included on the CD-ROM.....................5 Printer Drivers..............................5 TWAIN Driver..............................7 LAN-Fax Driver...............................8 Font Manager..............................8 For Mac OS X Users............................10 2. Installing the Printer Driver Confirming the Connection Method....................... 11 Network Connection........................... 11 Local Connection............................
  • Page 288 Configuring Option Settings for the Facsimile................... 49 5. Troubleshooting Messages Displayed When Installing the Printer Driver................51 If USB Connection Fails........................... 53 6. Installing the Printer Driver Under Mac OS X Installing the PPD Files............................55 Registering the Printer............................56 USB Connection............................56 Network Connection...........................
  • Page 289: Introduction

    1. Introduction This chapter explains the software included on the supplied CD-ROM. Start Installer To connect this machine to a client computer and use its printer, scanner, and fax functions, the software included on the provided CD-ROM must be installed on the client computer. The installer starts automatically when you insert the provided CD-ROM into the CD-ROM drive of a client computer running under Windows or Windows Server.
  • Page 290 1. Introduction Browse This CD-ROM Browses the contents of this CD-ROM. Exit Quits Installer. • Manage Printers permission is required to install the driver. Log on as an Administrators group member. • Auto Run might not work automatically with certain OS settings. If this is the case, double-click "Setup.exe", located on the CD-ROM root directory, or click [Run SETUP.EXE] in the [AutoPlay] dialog box.
  • Page 291: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD-ROM This section explains the software and utilities CD-ROM provided with this machine. • For the latest information on the corresponding operating system, see "Readme.txt" file, located on the CD-ROM root directory.
  • Page 292 1. Introduction *6 Microsoft Windows Server 2003 Standard Edition/Microsoft Windows Server 2003 Enterprise Edition/ Microsoft Windows Server 2003 R2 Standard Edition/Microsoft Windows Server 2003 R2 Enterprise Edition *7 Microsoft Windows Server 2008 Standard/Microsoft Windows Server 2008 Enterprise/Microsoft Windows Server 2008 R2 Standard/Microsoft Windows Server 2008 R2 Enterprise *8 Microsoft Windows Server 2012 Foundation/Microsoft Windows Server 2012 Essentials/Microsoft Windows Server 2012 Standard *9 Mac OS X 10.5 or later...
  • Page 293: Twain Driver

    Software and Utilities Included on the CD-ROM Printer Language Supported languages PCL 5e PCL 6 PostScript 3 PPD (Mac OS X) Danish Finnish Hungarian Czech Polish Portuguese Russian Catalan Turkish Brazilian Portuguese Greek : Supported : Supported, but the printer language is displayed in English *1 The PCL 5e printer driver does not support Brazilian Portuguese and Greek.
  • Page 294: Lan-Fax Driver

    1. Introduction Windows Server 2003/2003 R2/2008/2008 R2/2012 *1 TWAIN scanner runs on a 64-bit operating system, but is not compatible with 64-bit applications. Use it with 32-bit applications. Supported languages The TWAIN driver uses the same interface language as the one specified by your operating system.
  • Page 295 Software and Utilities Included on the CD-ROM • For details about installing the software, see page 42 "Installing Font Manager".
  • Page 296: For Mac Os X Users

    1. Introduction For Mac OS X Users If you are using Mac OS X, the following limitations apply to each function: • When using the scanner function, the TWAIN driver cannot be used. • When using the fax function, the LAN-Fax Driver cannot be used. •...
  • Page 297: Installing The Printer Driver

    2. Installing the Printer Driver This chapter explains how to install and configure the printer drivers for use on the Windows operating system. Installing procedures on Windows 7 is shown as an example except where indicated. Confirming the Connection Method This machine supports network and local connection.
  • Page 298 2. Installing the Printer Driver Windows 8, Windows Server 2012 Connection Method Available Ports • Ethernet • Standard TCP/IP port • Wireless LAN • IPP port • LPR port • WSD port • For details about how to install the printer driver for each type of port, see page 16 "Installing the Printer Driver for the Selected Port".
  • Page 299: Local Connection

    Confirming the Connection Method • For details about how to install the printer driver to print server, see page 26 "Using as a Network Printer". Local Connection Local connections can be established via USB, parallel and Bluetooth connections. • For details about how to install the printer driver for each method of connections, see page 30 "Installing the Printer Driver for a Local Connection".
  • Page 300: Quick Install

    2. Installing the Printer Driver Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set. •...
  • Page 301 Quick Install • If the [Windows Security] dialog box appears during the driver installation procedure, click [Install this driver software anyway]. • A message appears if there is a newer version of the printer driver already installed. If there is, you cannot install the printer driver using Auto Run.
  • Page 302: Installing The Printer Driver For A Network Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Network Connection This section describes the installation procedure of the printer drivers for network connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 303 Click [Next]. Enter the machine name or IP address, and then click [Next]. When the device type selection appears, select "RICOH Network Printer C model". Click [Finish]. Select the [Printer Name:] check box of the machine model you want to use.
  • Page 304 2. Installing the Printer Driver Using the IPP port • To print via IPP-SSL, use the SmartDeviceMonitor for Client port. • Installation of the certificate is especially necessary for users who want to print via IPP-SSL from Windows Vista/7/8 or Windows Server 2008/2008 R2/2012. For details, consult your administrator.
  • Page 305 Installing the Printer Driver for a Network Connection 64-bit driver D:\X64\DRIVERS\PCL5E\X64\(Language)\DISK1 • PCL 6 32-bit driver D:\X86\DRIVERS\PCL6\XP_VISTA\MUI\DISK1 64-bit driver D:\X64\DRIVERS\PCL6\X64\MUI\DISK1 • PostScript 3 32-bit driver D:\X86\DRIVERS\PS\XP_VISTA\MUI\DISK1 64-bit driver D:\X64\DRIVERS\PS\X64\MUI\DISK1 For details about the languages supported in the printer drivers, see page 6 "Supported languages".
  • Page 306 2. Installing the Printer Driver Select [Specify a new port], and then click [Next]. Select [LPR Port], and then click [Next]. Enter the machine name or IP address in the [Name or address of server providing lpd:] box. Enter "lp" in the [Name of printer or print queue on that server:] box, and then click [OK]. Select the [Printer Name:] check box of the machine model you want to use.
  • Page 307 Installing the Printer Driver for a Network Connection Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Close]. Click [Browse...], and then specify the location of the INF file. If the CD-ROM drive is D, the source files of the printer driver are stored in the following locations: •...
  • Page 308 2. Installing the Printer Driver Click [Have Disk...]. Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Close]. Click [Browse...], and then specify the location of the INF file. If the CD-ROM drive is D, the source files of the printer driver are stored in the following locations: •...
  • Page 309 Installing the Printer Driver for a Network Connection Click [Add a printer]. Click [The printer that I want isn't listed]. Click [Add a local printer or network printer with manual settings]. Check the [Use an existing port:] check box, and select WSD port. Click [Next].
  • Page 310 2. Installing the Printer Driver Using the SmartDeviceMonitor for Client port To use this function, you must first download SmartDeviceMonitor for Client from the manufacturer's Web site and install it on your computer. Contact your local dealer for information on downloading SmartDeviceMonitor for Client.
  • Page 311 Installing the Printer Driver for a Network Connection Click [Detailed Settings] to make necessary settings. For details about the settings, see SmartDeviceMonitor for Client Help. Click [OK]. Select the [Printer Name:] check box of the machine model you want to use. Configure the user code, default printer, and shared printer as necessary.
  • Page 312: Using As A Network Printer

    2. Installing the Printer Driver • For details about these settings, see SmartDeviceMonitor for Client Help. Using as a Network Printer Describes the driver installation procedure for each print server. See the installation procedure for the print server you are using. Server OS Client OS Printer Driver Type...
  • Page 313 Installing the Printer Driver for a Network Connection Click [Continue]. The installation starts. Click [Finish]. Select one of the options to restart the computer either now or later, and then click [Finish]. • The [Auto Play] dialog box is displayed only for a few seconds under Windows 8 and Windows Server 2012.
  • Page 314 2. Installing the Printer Driver Check that the port of the selected printer is displayed in [Port :]. Click [Continue]. The installation starts. Click [Finish] in the [Select Program] dialog box. After the installation is completed, select one of the options to restart the computer either now or later, and then click [Finish].
  • Page 315 Installing the Printer Driver for a Network Connection 3. Click the [Device Settings] tab. 4. Select [No] on the [Send CTRL-D Before Each Job:] and [Send CTRL-D After Each Job:], and then click [Apply]. 5. Click [OK]. Printing after Resetting the Printer Printer to print server connection requires 30–40 seconds to resume after the printer is reset.
  • Page 316: Installing The Printer Driver For A Local Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Local Connection This section describes the installation procedure of the printer drivers for USB, parallel, or Bluetooth connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 317 Installing the Printer Driver for a Local Connection Connect the machine and computer using the USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Select [No, not this time], and then click [Next].
  • Page 318 2. Installing the Printer Driver Check that the power of the machine is off. Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. In the [Found New Hardware] window, click [Locate and install driver software (recommended)].
  • Page 319 Installing the Printer Driver for a Local Connection Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Click [Devices and Printers] from the [Start] menu.
  • Page 320: Parallel Connection

    2. Installing the Printer Driver Click [Close]. If the printer driver has already been installed and plug and play is enabled, the icon of the printer connected to the "USB001" port is added to the [Printers], [Printers and Faxes], or [Devices and Printers] window.
  • Page 321: Bluetooth Connection

    Installing the Printer Driver for a Local Connection 2. Double-click the CD-ROM drive in which the provided CD-ROM is set, and then click "Setup.exe". Bluetooth Connection • The Bluetooth unit and the wireless LAN unit cannot be used simultaneously. Supported profiles and restrictions Supported Profiles •...
  • Page 322 2. Installing the Printer Driver • To connect to a Bluetooth printer, your computer must have a Bluetooth device installed. Make sure a Bluetooth device is installed on your computer. Windows XP, Windows Server 2003/2003 R2 Quit all applications. (Do not close this manual.) On the [Start] menu, click [Printers and Faxes].
  • Page 323 Installing the Printer Driver for a Local Connection In the [Add Printer] window, select [Add a network, wireless or Bluetooth printer], and then click [Next]. The computer begins searching for available Bluetooth devices. From the list of discovered devices, select the machine you want to use, and then click [Next].
  • Page 324 2. Installing the Printer Driver • After printing the test page, check it. If there is a problem with the test page, click [Troubleshooting] in the test print window. If there is no problem with the test page, click [Close] to close the window. Windows 8, Windows Server 2012 Quit all applications.
  • Page 325: Configuring Option Settings For The Printer

    Configuring Option Settings for the Printer Configuring Option Settings for the Printer When bidirectional communication works correctly, your computer obtains information about option, paper size and paper feed direction settings from the machine automatically. Bidirectional communication also allows you to monitor machine status. When bidirectional communication is disabled, you have to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 326: If Bidirectional Communication Is Disabled

    2. Installing the Printer Driver • The PCL 5e printer driver supports bidirectional communication. You can update the printer status manually. If Bidirectional Communication is Disabled This section describes how to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 327 Configuring Option Settings for the Printer • For details about making option settings for the machine using a Mac OS X, see page 58 "Configuring Option Settings for the Printer Under Mac OS X".
  • Page 328: Installing Font Manager

    2. Installing the Printer Driver Installing Font Manager • Manage Printers permission is required to install Font Manager. Log on as an Administrators group member. • The operating systems compatible with Font Manager are Windows XP/Vista. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 329: Installing The Scanner Driver

    3. Installing the Scanner Driver This chapter explains how to install the TWAIN driver on a client computer. Installing procedures on Windows 7 is shown as an example except where indicated. Installing the TWAIN Driver To use the network TWAIN scanner, you must install the TWAIN driver on a client computer. Quit all applications.
  • Page 330: Installing A Twain-Compliant Application On The Same Client Computer

    3. Installing the Scanner Driver Installing a TWAIN-Compliant Application on the Same Client Computer To use this machine as a network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder, must be installed on the client computer. You can download DeskTopBinder from the manufacturer's Web site and then install it on the client computer.
  • Page 331: Installing The Facsimile Driver

    4. Installing the Facsimile Driver This chapter explains how to install and configure the LAN-Fax Driver on a client computer. Installing procedures on Windows 7 is shown as an example except where indicated. Installing the LAN-Fax Driver Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps you edit LAN-Fax transmission destinations.
  • Page 332: Specifying The Port When Installing The Lan-Fax Driver

    4. Installing the Facsimile Driver Click [Continue]. The installation starts. Click [Finish]. Select one of the options to restart the computer either now or later, and then click [Finish]. • The [Auto Play] dialog box is displayed only for a few seconds under Windows 8 and Windows Server 2012.
  • Page 333 Installing the LAN-Fax Driver Procedure/description in the Procedure/description in the Items to be replaced printer driver LAN-Fax Driver Select the check box of the The procedures in the [Install Select [Printer Name : <LAN- machine model you want to Printer Driver] dialog box Fax Generic>].
  • Page 334: Setting Lan-Fax Driver Properties

    4. Installing the Facsimile Driver Setting LAN-Fax Driver Properties • Manage Printers permission is required to set the properties for the LAN-Fax Driver. Log on as an Administrators group member. • The method for selecting the LAN-Fax Driver will vary according to your operating system. For details, see Windows Help.
  • Page 335: Configuring Option Settings For The Facsimile

    Setting LAN-Fax Driver Properties Configuring Option Settings for the Facsimile Open the printer windows. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Printers and Faxes]. • Windows Vista, Windows Server 2008: On the [Start] menu, select [Control Panel], and then click [Printers] in [Hardware and Sound] category.
  • Page 336 4. Installing the Facsimile Driver • Check Destination Select the check box to confirm the destinations before sending. IP-Fax To use IP-Fax, select the [Enable IP-Fax] check box, and then specify the protocol in [Valid protocol:]. • If the options on this machine are not configured as instructed, LAN-Fax functions may fail. •...
  • Page 337: Troubleshooting

    5. Troubleshooting This chapter provides solutions for driver installation and USB connection problems. Messages Displayed When Installing the Printer Driver This section describes what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using Add Printer Wizard.
  • Page 338 5. Troubleshooting For details about the languages supported in the printer drivers, see page 6 "Supported languages". Specify a port. • Available ports vary according to your Windows operating system or the type of interface. For details, see page 11 "Confirming the Connection Method".
  • Page 339: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section describes how to troubleshoot a problem related to USB connections. Problem Causes Solutions The machine is not The USB cable is not Disconnect the USB cable from the automatically recognized. connected properly.
  • Page 340 5. Troubleshooting...
  • Page 341: Installing The Printer Driver Under Mac Os

    6. Installing the Printer Driver Under Mac OS X This chapter explains how to install and configure the printer drivers for use on the Mac OS X operating system. Installing the PPD Files To print using the printer specific features under Mac OS X, install the PPD files. •...
  • Page 342: Registering The Printer

    6. Installing the Printer Driver Under Mac OS X Registering the Printer To use the machine, the printer must be registered in the printer list. Make sure the machine and computer are connected and turned on, and perform the following procedure.
  • Page 343: Network Connection

    Registering the Printer Network Connection Start System Preferences. Click [Print & Fax] or [Print & Scan]. Click the [ ] button. Click [Default]. Select the printer that has "Bonjour" indicated in the [Kind] column. If the printer name is not displayed, select the icon that corresponds to your network environment (TCP/IP, etc.).
  • Page 344 6. Installing the Printer Driver Under Mac OS X Configuring Option Settings for the Printer Under Mac OS X This section explains how to configure the printer driver. Start System Preferences. Click [Print & Fax] or [Print & Scan]. Select the printer you are using, and then click [Options & Supplies...]. Click [Driver], and then configure settings as needed.
  • Page 345: Appendix

    7. Appendix Updating or Deleting the Driver • Administrator permission is required to update or delete the driver in use. Log on as an Administrators group member. • For driver updates, select a driver that is compatible with the printer and driver type you are using. An error may result if you select a driver that is not compatible with the printer and driver type.
  • Page 346: Deleting The Driver

    7. Appendix Right-click the machine's icon, and then click [Printer properties]. Click the [Advanced] tab. Click [New Driver...], and then click [Next]. Click [Have Disk...]. Click [Browse...], and then select the driver location. Click [OK]. Select the machine model, and then click [Next]. Click [Finish].
  • Page 347 Updating or Deleting the Driver On the [File] menu, point to [Run as administrator], and then click [Server Properties...]. Click the [Drivers] tab. Select the driver you want to delete, and then click [Remove...]. Select [Remove driver and driver package.], and then click [OK]. Click [Yes].
  • Page 348 7. Appendix TWAIN driver Start uninstaller. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Control Panel], and then click [Add or Remove Programs]. • Windows Vista/7, Windows Server 2008/2008 R2: On the [Start] menu, select [Control Panel], and then click [Uninstall a program]. •...
  • Page 349: Trademarks

    Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license. IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States or other countries.
  • Page 350 7. Appendix ® ® Microsoft Windows 8 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition • The product names of Windows Server 2003 R2 are as follows: ®...
  • Page 351: Index

    INDEX Network printer..........12, 26 Bidirectional communication........ BIP................Option settings.......... 39, 49, 58 Bluetooth..............Bluetooth printer............ Parallel connection..........PCL............5, 14, 16, 26 CD-ROM..............PostScript 3..........5, 16, 26 Confirming the connection method...... PPD................Connection fails............. Printer driver..........5, 16, 30 Printer port type.............
  • Page 352 MEMO...
  • Page 353 MEMO...
  • Page 354 MEMO D184-7555...
  • Page 356 D184-7555 © 2013...
  • Page 357 Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in Read This First before using the machine.
  • Page 359 TABLE OF CONTENTS Functions That Require Options......................... 9 Main Software Names............................ 10 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators and Users..........................14 Administrators..............................15 Configuring Administrator Authentication...................... 16 Specifying Administrator Privileges......................17 Registering and Changing Administrators....................19 Using Web Image Monitor to Configure Administrator Authentication..........
  • Page 360 Creating the Server Certificate........................51 If the Fax Number Cannot be Obtained....................51 LDAP Authentication............................53 Integration Server Authentication........................58 Printer Job Authentication..........................63 Printer Job Authentication Levels.........................63 Printer Job Types............................63 "authfree" Command........................... 66 Auto Registration to the Address Book......................67 Automatically Registered Address Book Items..................67 Data Carry-over Setting for Address Book Auto-program...............67 User Lockout Function............................
  • Page 361 Printing a List of Print Volume Use Counters....................89 Clearing Print Volume Use Counters......................90 Configuring the Auto-Reset Function......................91 4. Preventing Leakage of Information from Machines Protecting the Address Book........................... 93 Specifying Address Book Access Permissions................... 93 Encrypting Data in the Address Book......................95 Encrypting Data on the Hard Disk........................
  • Page 362 Enabling SSL/TLS............................134 User Setting for SSL/TLS...........................135 Setting the SSL/TLS Encryption Mode.....................136 Enabling SSL for SMTP Connections....................... 137 Configuring S/MIME............................139 E-mail Encryption............................139 Attaching an Electronic Signature......................141 Specifying Checking of the Certificate Valid Period................143 Configuring PDFs with Electronic Signatures....................145 Configuring IPsec............................146 Encryption and Authentication by IPsec....................
  • Page 363 Configuring Access Permission for Each User for Stored Files.............. 183 Specifying Passwords for Stored Files..................... 185 Unlocking Stored Files..........................186 Managing Locked Print Files.........................188 Deleting Locked Print Files........................188 Changing the Password of a Locked Print File..................190 Unlocking a Locked Print File........................191 Unauthorized Copy Prevention / Data Security for Copying..............
  • Page 364 Troubleshooting............................243 Managing Device Information........................245 Exporting Device Information........................246 Importing Device Information........................247 Troubleshooting............................249 Managing Eco-friendly Counter........................251 Configuring the Display of Eco-friendly Counters.................. 251 Clearing a Machine's Eco-friendly Counter....................252 Clearing Users’ Eco-friendly Counters....................252 Managing the Address Book........................253 Specifying Auto Deletion of Address Book Data..................253 Deleting All Data in the Address Book....................
  • Page 365 System Settings...............................294 Edit Home............................... 304 Copier / Document Server Features......................305 Facsimile Features............................310 Printer Functions............................. 313 Printer Features...............................314 Scanner Features............................318 Browser Features............................320 Extended Feature Settings..........................321 Maintenance..............................322 Web Image Monitor: Display Eco-friendly Counter...................323 Web Image Monitor: Job..........................324 Web Image Monitor: Device Settings......................326 Web Image Monitor: Printer.........................335 Web Image Monitor: Fax..........................
  • Page 366 List of Operation Privileges for Address Books....................366 Trademarks..............................370 INDEX ................................373...
  • Page 367: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Detect Data Security for Copying Copy Data Security Unit • Viewing Web pages on the display (Browser function) Either one or a combination of the following options is required: •...
  • Page 368: Main Software Names

    Main Software Names Product name Names in the text DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise *1 This product is no longer sold.
  • Page 369: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. •...
  • Page 370: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. For details about turning on the main power, see "Turning On/Off the Power", Getting Started.
  • Page 371 Before Using This Machine Change the administrator's user name and password. For details about specifying administrators' user names and passwords, see page 19 "Registering and Changing Administrators". Connect the machine to the general usage network environment. • To enable higher security, see page 265 "Additional Information for Enhanced Security".
  • Page 372: Administrators And Users

    1. Getting Started Administrators and Users This section explains the terms "administrator", "supervisor", "user", and "owner" as used in this manual. Administrator There are four types of administrators for the machine: user administrator, machine administrator, network administrator, and file administrator. Their main role is to specify the settings for operating the machine.
  • Page 373: Administrators

    Administrators Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 374: Configuring Administrator Authentication

    1. Getting Started Configuring Administrator Authentication Administrator authentication requires the login user name and password for verifying administrators attempting to specify the machine's settings or access them from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book. Administrators are handled differently from the users registered in the Address Book.
  • Page 375: Specifying Administrator Privileges

    Configuring Administrator Authentication Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again. 2.
  • Page 376 1. Getting Started Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press the [Home] key on the top left of the control panel. Flick the screen to the left, and then press the [User Tools] icon ( ) on the Home screen 4.
  • Page 377: Registering And Changing Administrators

    Configuring Administrator Authentication Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. The available settings depend on the administrator type. To specify administrator authentication for more than one category, repeat Steps 6 to 8. Press [OK].
  • Page 378 1. Getting Started Press [Program / Change Administrator]. In the line for the administrator whose privilege you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. When allocating administrators' privileges to one person each, select one administrator under each category as shown below.
  • Page 379 Configuring Administrator Authentication Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Follow the password policy to strengthen the login password. For details about the password policy and how to specify it, see page 254 "Specifying the Extended Security Functions".
  • Page 380: Using Web Image Monitor To Configure Administrator Authentication

    1. Getting Started about specifying the password policy, see "Password Policy" in page 254 "Specifying the Extended Security Functions". Using Web Image Monitor to Configure Administrator Authentication Using Web Image Monitor, you can log in to the machine and change the administrator settings. For details about logging in and logging out with administrator authentication, see page 23 "Administrator Login Method"...
  • Page 381: Administrator Login Method

    Administrator Login Method Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Display the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key.
  • Page 382: Logging In Using Web Image Monitor

    1. Getting Started Enter the login user name, and then press [OK]. The default login name for administrators is "admin" and "supervisor" for supervisors. Enter the login password, and then press [OK]. There is no preset default password for administrators or supervisors. Therefore, leave the password field blank and press [OK].
  • Page 383: Administrator Logout Method

    Administrator Logout Method Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the logout key. • When using the standard operation panel Press the [Login/Logout] key, and then press [Yes].
  • Page 384: Supervisor

    1. Getting Started Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If you have logged in using the supervisor's user name and password, you cannot use normal functions or specify system settings.
  • Page 385: Changing The Supervisor

    Supervisor Press [Change] for the administrator you wish to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK] twice. You will be automatically logged out. •...
  • Page 386 1. Getting Started Press [OK] twice. You will be automatically logged out.
  • Page 387: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the information in the machine's Address Book, and can only use the functions they are permitted to access by administrators.
  • Page 388: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a system requiring the login user name and password for verifying users to operate the machine or access the machine over the network. CJC010 1. User A user performs normal operations on the machine, such as copying and printing. 2.
  • Page 389: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 390 2. Configuring User Authentication Type Details Basic authentication Authentication is performed using the machine's address book. It is necessary to register users in the machine's address book in advance. Authentication can be applied to each user. Windows authentication Authentication is performed using the domain controller of the Windows server on the same network as the machine.
  • Page 391 Configuring User Authentication • From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you are not going to use, or set up a login password. For details about deleting accounts, see "Deleting a Registered Name", Connecting the Machine/ System Settings.
  • Page 392: User Code Authentication

    2. Configuring User Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Registering a User Code", Connecting the Machine/ System Settings.
  • Page 393 User Code Authentication In "Functions to Restrict", select the functions that you want to restrict. The selected functions are subject to User Code authentication. User Code authentication is not applied to the functions not selected. For details about limiting available functions for individuals or groups, see page 80 "Limiting Available Functions".
  • Page 394 2. Configuring User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 395: Basic Authentication

    Basic Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 396 2. Configuring User Authentication In "Available Functions", select which of the machine's functions you want to permit. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book. For details about specifying available functions for individuals or groups, see page 80 "Limiting Available Functions".
  • Page 397: Authentication Information Stored In The Address Book

    Basic Authentication Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 398: Specifying Login User Names And Passwords

    2. Configuring User Authentication Specifying Login User Names and Passwords In "Address Book Management", specify the login user name and login password to be used for "User Authentication Management". For the characters that can be used for login user names and passwords, see page 21 "Usable characters for user names and passwords".
  • Page 399: Specifying Login Details

    Basic Authentication • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4. Specifying Login Details The login user name and password specified in "Address Book Management" can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication".
  • Page 400 2. Configuring User Authentication • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4.
  • Page 401: Windows Authentication

    Windows Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 402 2. Configuring User Authentication • Windows Server 2003/2003 R2 • Windows Server 2008/2008 R2 • Windows Server 2012 To use Kerberos authentication under Windows Server 2008, Service Pack 2 or later must be installed. • Transmission between the machine and the KDC server is encrypted if Kerberos authentication is enabled.
  • Page 403: Specifying Windows Authentication

    Windows Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". Log in as the machine administrator from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [User Authentication Management].
  • Page 404 2. Configuring User Authentication Select Kerberos authentication realm and proceed to step 10. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters. For details about registering a realm, see "Programming the Realm", Connecting the Machine/ System Settings.
  • Page 405 Windows Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 406 2. Configuring User Authentication Press [ Next]. Under "Group", press [Program / Change], and then press [* Not Programmed]. Press [Change] for "Group Name", and then enter the group name. Press [OK]. In "Available Functions", select which of the machine's functions you want to permit. Windows Authentication will be applied to the selected functions.
  • Page 407: Installing Internet Information Services (Iis) And Certificate Services

    Windows Authentication Installing Internet Information Services (IIS) and Certificate Services Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory. We recommend you install Internet Information Services (IIS) and Certificate services as the Windows components.
  • Page 408 2. Configuring User Authentication Installation under Windows Server 2012 On the Start screen, click [Server Manager]. On the [Manage] menu, click [Add Roles and Features]. Click [Next>]. Select [Role-based or feature-based installation], and then click [Next>]. Select a server, and then click [Next>]. Select the "Active Directory Certificate Services"...
  • Page 409: Creating The Server Certificate

    Windows Authentication Creating the Server Certificate After installing Internet Information Services (IIS) and Certificate services Windows components, create the Server Certificate as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrative Tools], and then click [Internet Information Services (IIS) Manager].
  • Page 410 2. Configuring User Authentication Click [Active Directory Schema] in the left column, and then open the [Attributes] folder. Right-click [facsimileTelephoneNumber], and then click [Properties]. Select the "Replicate this attribute to the Global Catalog" check box, and then click [Apply]. Click [OK]. On the [File] menu, click [Save].
  • Page 411: Ldap Authentication

    LDAP Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 412 2. Configuring User Authentication • When SSL is being used, TLSv1 or SSLv3 can function on the LDAP server. • The LDAP server must be registered in the machine. • When registering the LDAP server, the following setting must be specified. •...
  • Page 413 LDAP Authentication Press [ Next]. Press [User Authentication Management]. Select [LDAP Auth.]. If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication. Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see page 63 "Printer Job Authentication".
  • Page 414 2. Configuring User Authentication Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 415 LDAP Authentication When authenticating using the DN format, login attributes do not need to be registered. The method for selecting the user name depends on the server environment. Check the server environment and enter the user name accordingly. Press [Change] for "Unique Attribute". Enter the unique attribute and then press [OK].
  • Page 416: Integration Server Authentication

    2. Configuring User Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server authentication, single sign-on is possible using DeskTopBinder.
  • Page 417 Integration Server Authentication Press [Change] for "Server Name". Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IPv4 address or host name. In "Authentication Type", select the authentication system for external authentication. Select an available authentication system.
  • Page 418 2. Configuring User Authentication If you set "Authentication Type" to [Windows (Native)] or [Windows (NT Compatible)], you can use the global group. If you set "Authentication Type" to [Notes], you can use the Notes group. If you set "Authentication Type" to [Basic (Integration Server)], you can use the groups created using the Authentication Manager.
  • Page 419 Integration Server Authentication Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see page 63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 25. If you select [Simple (Limitation)], proceed to step 22. Press [Change].
  • Page 420 2. Configuring User Authentication Press [On] for "Use Secure Connection (SSL)", and then press [OK]. To not use secure sockets layer (SSL) for authentication, press [Off]. Press [OK]. Log out. • When using the standard operation panel Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 421: Printer Job Authentication

    Printer Job Authentication Printer Job Authentication Printer job authentication is a function allowing user authentication to be applied to print jobs. User authentication is supported by the PCL and PostScript3 drivers. The PostScript3 driver supports User Code authentication only. Printer Job Authentication Levels The security level for "Entire"...
  • Page 422 2. Configuring User Authentication When user authentication is disabled, printing is possible for all job types. Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver.
  • Page 423 Printer Job Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 424: Authfree" Command

    2. Configuring User Authentication "authfree" Command If [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command can be used to specify exceptions to the printer job authentication. The default user name for logging into telnet is "admin". The password is not configured by default. For details about logging into and using telnet, see "Remote Maintenance Using telnet", Connecting the Machine/ System Settings.
  • Page 425: Auto Registration To The Address Book

    Auto Registration to the Address Book Auto Registration to the Address Book The personal information of users logging in via Windows, LDAP or Integration Server authentication is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 426 2. Configuring User Authentication Press [Data Carry-over Setting for Address Book Auto-program]. Press [Carry-over Data]. Use the number keys to enter the registration number of the Address Book to apply the specified setting, and then press [ ]. Press [OK]. Log out.
  • Page 427: User Lockout Function

    User Lockout Function User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 428: Specifying The User Lockout Function

    2. Configuring User Authentication Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 429: Auto Logout

    Auto Logout Auto Logout After you log in, the machine automatically logs you out if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 430 2. Configuring User Authentication • When using the Smart Operation Panel Press [Logout]. A confirmation message appears. If you press [OK], you will be automatically logged out. • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function.
  • Page 431: Authentication Using An External Device

    Authentication Using an External Device Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 432 2. Configuring User Authentication...
  • Page 433: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The use of the destination list can be restricted separately under the scanner and fax functions. Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) You can prohibit the sending of faxes and scanned documents to addresses other than those registered in the Address Book.
  • Page 434 3. Restricting Machine Usage If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear. Similarly, if you set "Restrict Use of Destinations (Scanner)" to [On], "Restrict Adding of User Destinations (Scanner)" will not appear. Press [OK].
  • Page 435: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings Limiting the Settings that Can Be Changed by Each Administrator The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 436: Specifying Menu Protect

    3. Restricting Machine Usage Specifying Menu Protect Menu Protect allows you to limit user permission to access the settings in the User Tools menu except for the System Settings. This setting can be used regardless of user authentication. To change the menu protect setting, first enable administrator authentication.
  • Page 437: Scanner Function

    Specifying Menu Protect Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function Log in as the machine administrator from the control panel. Press [Scanner Features]. Press [Initial Settings]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out.
  • Page 438: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Specify the functions available to registered users. By making this setting, you can limit the functions available to users.
  • Page 439 Limiting Available Functions In "Available Functions", select the functions you want to specify. Press [OK]. Log out. • When using the Smart Operation Panel, you can display the Address Book screen by pressing the [Address Book Management] icon on the Home screen 4.
  • Page 440: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 441: Managing Print Volume Per User

    Managing Print Volume per User Managing Print Volume per User This function limits how much each user can print. If users reach their maximum print volume, their print jobs are canceled and/or a message indicating so is displayed. Print volume The print volume is calculated by multiplying the number of pages by a unit count.
  • Page 442: Specifying Limitations For Print Volume

    3. Restricting Machine Usage • The login user name or user code registered in the Address Book is changed while the user is logged in and authenticated. If the following occurs, print volume management will not function correctly: • Under Windows or LDAP authentication, a user logs in to the same user account by using multiple login user names, and these multiple login names are registered in the Address Book as separate users.
  • Page 443 Managing Print Volume per User Press [Print Volume Use Limitation: Unit Count Setting]. For each print condition, use the number keys to enter a per-page unit count between "0" and "200", and then press [ ]. If you specify "0" for a print condition, no volume restriction is applied to jobs matching that condition.
  • Page 444: Specifying The Default Maximum Use Count

    3. Restricting Machine Usage Under User Code authentication, users cannot check the print volume they have made, using either the control panel or Web Image Monitor. Under User Code authentication, administrators can inform users of the print volume they have made. •...
  • Page 445 Managing Print Volume per User Select the user whose maximum available print volume you want to specify. Press [Auth. Info]. Press [ Next] twice. Press [Limit] in "Print Volum. Use Limit.". "Print Volum. Use Limit." does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached".
  • Page 446: Checking Print Volume Per User

    3. Restricting Machine Usage Press [OK]. Log out. • The maximum print volume for an individual user can also be specified in [Address Book] in Web Image Monitor. • You can search for users by entering a name in the text box at the top of the control panel, and then pressing [Search].
  • Page 447: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User After confirming the settings, log out. • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters. Printing a List of Print Volume Use Counters Log in as the machine administrator from the control panel.
  • Page 448: Clearing Print Volume Use Counters

    3. Restricting Machine Usage Select the counter you want to print in the list, and then press [Print]. Log out. • Print volume use counter lists can be printed only if the following paper sizes is loaded in the paper tray: A4, 8 ×...
  • Page 449: Configuring The Auto-Reset Function

    Managing Print Volume per User To clear the print volume use counters of every user, press [Clear] under "All Users". To clear the print volume use counters of selected users only, select the users whose counters you want to clear, and then press [Clear] under "Per User". To select all the users displayed on the page, press [Select All on the Page].
  • Page 450 3. Restricting Machine Usage Log in as the machine administrator from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next] four times. Press [Volume Use Counter: Scheduled/Specified Reset Settings]. Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions.
  • Page 451: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 452 4. Preventing Leakage of Information from Machines Press [Program/Change/Delete] for "Permissions for Users / Groups", under "Protect Destination". Press [New Program]. Select the users or groups to which to apply the access permission. You can select more than one user. By pressing [All Users], you can select all the users.
  • Page 453: Encrypting Data In The Address Book

    Protecting the Address Book Encrypting Data in the Address Book • The machine cannot be used during encryption. The time it takes to encrypt the data in the Address Book depends on the number of registered users. Encrypting the data in the Address Book may take a long time. Log in as the user administrator from the control panel.
  • Page 454 4. Preventing Leakage of Information from Machines If you press [Stop] during decryption, the data stays encrypted. Normally, once encryption is complete, "Encryption / Decryption is successfully complete. Press [Exit]." appears. Press [Exit]. Press [OK]. Log out. • If you register additional users after encrypting the data in the Address Book, those users are also encrypted.
  • Page 455: Encrypting Data On The Hard Disk

    Encrypting Data on the Hard Disk Encrypting Data on the Hard Disk • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written.
  • Page 456 4. Preventing Leakage of Information from Machines Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approx. 1 hour Only Architecture (stored documents in 15 minutes applications' Document Server, program/log Locked Print files / Sample Print files /...
  • Page 457: Enabling The Encryption Settings

    Encrypting Data on the Hard Disk Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 458 4. Preventing Leakage of Information from Machines Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 459: Backing Up The Encryption Key

    Encrypting Data on the Hard Disk Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 460: Updating The Encryption Key

    4. Preventing Leakage of Information from Machines Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally. • The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption key safely for retrieving backup data.
  • Page 461: Canceling Data Encryption

    Encrypting Data on the Hard Disk Press [OK]. Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 462: Deleting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 463 Deleting Data on the Hard Disk The copier, fax and printer functions take priority over the Auto Erase Memory function. If a copy, fax or print job is in progress, overwriting will only be done after the job is completed. Overwrite icon When Auto Erase Memory is set to [On], the Data Overwrite icon will be indicated in the bottom right hand corner of the panel display of your machine.
  • Page 464 4. Preventing Leakage of Information from Machines Each item of data is overwritten by a random number, then by its complement, then by another random number, and is then verified. • Random Numbers Temporary data is overwritten multiple times with random numbers. The number of overwrites can be selected from 1 to 9.
  • Page 465 Deleting Data on the Hard Disk Press [Auto Erase Memory Setting]. Press [On]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 466 4. Preventing Leakage of Information from Machines Types of data that can or cannot be overwritten The following are the types of data that can or cannot be overwritten by "Auto Erase Memory". Data overwritten by Auto Erase Memory Copier •...
  • Page 467: Erase All Memory

    Deleting Data on the Hard Disk Erase All Memory You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. The following data will also be erased by Erase All Memory. For details about using the machine after executing Erase All Memory, contact your sales representative.
  • Page 468 4. Preventing Leakage of Information from Machines Press [Erase All Memory]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 469 Deleting Data on the Hard Disk • Erase All Memory cannot be canceled. Press [Suspend] while Erase All Memory is in progress. Press [Yes]. Erase All Memory is suspended. Turn off the main power. For details about turning off the main power, see "Turning On/Off the Power", Getting Started. •...
  • Page 470 4. Preventing Leakage of Information from Machines...
  • Page 471: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 472: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel or by using Web Image Monitor, telnet, SmartDeviceMonitor for Admin/Device Manager NX Lite or Remote Communication Gate S.
  • Page 473 Enabling and Disabling Protocols Protocol Port Setting method When disabled TCP:21 • Web Image Monitor Functions that require FTP cannot be used. • telnet You can restrict personal information • SmartDeviceMonitor from being displayed by making for Admin settings on the control panel using •...
  • Page 474 5. Enhanced Network Security Protocol Port Setting method When disabled HTTP TCP:80 • Web Image Monitor Functions that require HTTP cannot be used. • telnet Cannot print using IPP on port 80. • SmartDeviceMonitor for Admin • Device Manager NX Lite HTTPS TCP:443...
  • Page 475 Enabling and Disabling Protocols Protocol Port Setting method When disabled SNMPv3 UDP:161 • Web Image Monitor Functions that require SNMPv3 cannot be used. • telnet You can also make settings to require • SmartDeviceMonitor SNMPv3 encrypted transmission and for Admin restrict the use of other transmission •...
  • Page 476 5. Enhanced Network Security Protocol Port Setting method When disabled IP-Fax TCP:1720 (H. • Control panel IP-Fax connecting functions using H. 323) 323, SIP and T.38 cannot be used. • Web Image Monitor UDP:1719 • SmartDeviceMonitor (Gatekeeper) for Admin TCP/UDP: •...
  • Page 477 Enabling and Disabling Protocols Protocol Port Setting method When disabled DIPRINT TCP:9100 • Web Image Monitor DIPRINT functions cannot be used. • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP:10021 • Control panel You can attempt to update firmware via FTP.
  • Page 478 5. Enhanced Network Security Protocol Port Setting method When disabled WSD (Printer) TCP:53001 • Web Image Monitor WSD (Printer) functions cannot be used. (variable) • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP-53002 •...
  • Page 479: Enabling And Disabling Protocols Using The Control Panel

    Enabling and Disabling Protocols Enabling and Disabling Protocols Using the Control Panel Log in as the network administrator from the control panel. Press [System Settings]. Press [Interface Settings]. Press [Effective Protocol]. Set the desired protocols to active/inactive. Press [OK]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor.
  • Page 480 5. Enhanced Network Security "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], wait for a while, and then click the web browser's refresh button. Log out.
  • Page 481: Specifying Network Security Level

    Specifying Network Security Level Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 482: Specifying Network Security Level Using Web Image Monitor

    5. Enhanced Network Security Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 483 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 IPP > Port 631 Open Open Close Close SSL/TLS > Port 443 Open Open Open Open SSL/TLS > Permit SSL/TLS Ciphertext Ciphertext Ciphertext Ciphertext Communication Priority Priority Only Only SSL/TLS Version >...
  • Page 484 5. Enhanced Network Security Function Level 0 Level 1 FIPS 140 Level 2 WSD (Scanner)/DSM Active Active Active Active WSD (Encrypted Communication of Inactive Inactive Active Active Device) RHPP Active Active Inactive Inactive The same settings are applied to IPv4 and IPv6. TCP/IP setting is not governed by the security level.
  • Page 485 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 S/MIME > Encryption 3DES-168 bit 3DES-168 bit 3DES-168 bit AES-256 bit Algorithm S/MIME > Digest SHA1 SHA1 SHA1 SHA-256 bit Algorithm SNMPv3 > SHA1 SHA1 SHA1 Authentication Algorithm SNMPv3 >...
  • Page 486: Protecting The Communication Path Via A Device Certificate

    5. Enhanced Network Security Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. It can also protect PDFs by means of a PDF or PDF/A digital signature.
  • Page 487: Creating And Installing A Device Certificate From Web Image Monitor (Self-Signed Certificate)

    Protecting the Communication Path via a Device Certificate Press [Program / Delete Device Certificate]. Check that [Program] is selected. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. To use the device certificate for S/MIME, PDF Digital Signature, or PDF/A Digital Signature, enter the machine's administrator’s e-mail address in the e-mail address setting.
  • Page 488: Creating The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Check the radio button next to the number of the certificate you want to create. To use SSL/TLS, select [Certificate 1]. To use any other protocol, select the certificate number desired. Click [Create]. Click [Delete] to delete the device certificate from the machine. Make the necessary settings.
  • Page 489: Installing The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Apply to the certificate authority for the device certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority. For the application, click Web Image Monitor Details icon and use the information that appears in "Certificate Details".
  • Page 490: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority. If you do not have the intermediate certificate issued by the certificate authority, a warning message will appear during communication.
  • Page 491: Configuring Ssl/Tls

    Configuring SSL/TLS Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so helps prevent data from being intercepted, cracked or tampered with during transmission. Flow of SSL/TLS encrypted communications 1. To access the machine from a user's computer, request the SSL/TLS device certificate and public key.
  • Page 492: Enabling Ssl/Tls

    5. Enhanced Network Security Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 493: User Setting For Ssl/Tls

    Configuring SSL/TLS Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 494: Setting The Ssl/Tls Encryption Mode

    5. Enhanced Network Security • If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store location with the certificate authority. • To change the host name or IP address in [Common Name] of the device certificate when using the operating system's standard IPP port under Windows Vista/7/8 or Windows Server 2008/2008 R2/2012, delete any previously configured PC printer beforehand and re-install it after changing [Common Name].
  • Page 495: Enabling Ssl For Smtp Connections

    Configuring SSL/TLS Press [Permit SSL / TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 496 5. Enhanced Network Security In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out.
  • Page 497: Configuring S/Mime

    Configuring S/MIME Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 498 5. Enhanced Network Security 3. Specify the encryption algorithm using Web Image Monitor. 4. Using the shared key, encrypt the e-mail message. 5. The shared key is encrypted using the user's public key. 6. The encrypted e-mail is sent. 7. The receiver decrypts the shared key using a secret key that corresponds to the public key. 8.
  • Page 499: Attaching An Electronic Signature

    Configuring S/MIME Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 500 5. Enhanced Network Security 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 501: Specifying Checking Of The Certificate Valid Period

    Configuring S/MIME Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending Email by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax"...
  • Page 502 5. Enhanced Network Security Operation mode Description Performance Priority Performing (b) and (c) are omitted. If it takes a long time to verify the validity period when the address is selected or when the [Start] key is pressed, the time taken can be shortened by selecting "Performance Priority".
  • Page 503: Configuring Pdfs With Electronic Signatures

    Configuring PDFs with Electronic Signatures Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 504: Configuring Ipsec

    5. Enhanced Network Security Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine uses automatic key exchange to configure the pre-shared key for both parties. Using the auto exchange setting, you can renew the shared key exchange settings within a specified validity period, and achieve higher transmission security.
  • Page 505: Encryption Key Auto Exchange Settings

    Configuring IPsec • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 506: Ipsec Settings

    5. Enhanced Network Security When IPsec is enabled, set 1 has the highest priority and 4 has the lowest. You can use this priority system to target IP addresses more securely. For example, set the broadest IP range at the lowest priority (4), and then set specific IP addresses at a higher priority level (3 and higher).
  • Page 507 Configuring IPsec Security level Security level features Select this level if you want to encrypt the data packets as well as authenticate the transmission partner and prevent Authentication and Low Level unauthorized packet tampering. Packet encryption helps Encryption prevent eavesdropping attacks. This level provides less security than "Authentication and High Level Encryption".
  • Page 508 5. Enhanced Network Security Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption HMAC-SHA1-96/ HMAC-SHA1-96/ HMAC- HMAC- Phase 2 SHA256-128/ HMAC-SHA256-128/ SHA256-128/ Authentication HMAC- HMAC-SHA384-192/ HMAC- Algorithm SHA384-192/ HMAC-SHA512-256 SHA384-192/ HMAC- HMAC-SHA512-256 SHA512-256 Phase 2 Encryption Cleartext (NULL 3DES/AES-128/ AES-128/AES-192/...
  • Page 509 Configuring IPsec Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 510 5. Enhanced Network Security Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners.
  • Page 511 Configuring IPsec Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 512: Encryption Key Auto Exchange Settings Configuration Flow

    5. Enhanced Network Security Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings...
  • Page 513 Configuring IPsec Make encryption key auto exchange settings in [Settings 1]. If you want to make multiple settings, select the settings number and add settings. Click [OK]. Select [Active] for "IPsec" in "IPsec". Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission.
  • Page 514 5. Enhanced Network Security On the [Start] menu, click [Control Panel], click [System and Security], and then click [Administrative Tools]. Under Windows 8, hover the mouse pointer over the top- or bottom-right corner of the screen, and then click [Settings], [Control Panel], [System and Security], and then [Administrative Tools]. If you are using Windows XP, on the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then click [Administrative Tools].
  • Page 515 Configuring IPsec In [Name], enter an IP Filter name, and then click [Add]. The IP Filter Wizard appears. Click [Next]. If required, enter a description of the IP filter, and then click [Next]. For Windows XP, go to Step 22. Select "My IP Address"...
  • Page 516: Telnet Setting Commands

    5. Enhanced Network Security Select the filter action that was just created, and then click [Next]. If you set "Encryption Key Auto Exchange Settings" to "Authentication and High Level Encryption", select the IP filter action that was just created, click [Edit], and then check "Use session key perfect forward secrecy (PFS)"...
  • Page 517 Configuring IPsec Displays the following IPsec settings information: • IPsec settings values • Encryption key auto exchange settings, IKE setting 1-4 values • Encryption key auto exchange settings, IKE default setting values Display current settings portions msh> ipsec -p • Displays IPsec settings information in portions. ipsec exclude To display or specify protocols excluded by IPsec, use the "ipsec exclude"...
  • Page 518 5. Enhanced Network Security • To set the local or remote address values, specify masklen by entering [/] and an integer 0-32 when settings an IPv4 address. When setting an IPv6 address, specify masklen by entering [/] and an integer 0-128. •...
  • Page 519 Configuring IPsec Tunnel end point setting msh> ipsec ike {1|2|3|4|default} tunneladdr "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address. • Not specifying either the beginning or ending address displays the current setting. IKE partner authentication method setting msh>...
  • Page 520 5. Enhanced Network Security ISAKMP SA (phase 1) validity period setting msh> ipsec ike {1|2|3|4|default} ph1 lifetime "validity period" • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity period. • Enter the validity period (in seconds) from 300 to 172800. •...
  • Page 521 Configuring IPsec Reset setting values msh> ipsec ike {1|2|3|4|default|all} clear • Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying [all] resets all of the settings, including default.
  • Page 522: Configuring Ieee 802.1X Authentication

    5. Enhanced Network Security Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 523: Selecting The Device Certificate

    Configuring IEEE 802.1X Authentication Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see page 128 "Protecting the Communication Path via a Device Certificate".
  • Page 524 5. Enhanced Network Security • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 525: Setting Items Of Ieee 802.1X For Wireless Lan

    Configuring IEEE 802.1X Authentication • If there is a problem with settings, you might not be able to communicate with the machine. In such a case, access [Print List] in [Interface Settings] on the control panel, and then print the network summary to check the status.
  • Page 526 5. Enhanced Network Security PEAP • Click [Change] in "Password", and then enter the password set in the RADIUS server. If [TLS] is selected for "Phase 2 Method", you do not need to specify a password. • Click [Change] on "Phase 2 User Name", and then enter the user name set in the RADIUS server.
  • Page 527: Snmpv3 Encryption

    SNMPv3 Encryption SNMPv3 Encryption When using SmartDeviceMonitor for Admin/Device Manager NX Lite or another application that communicates via SNMPv3, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Log in as the network administrator from the control panel. Press [System Settings].
  • Page 528: Encrypting Transmitted Passwords

    5. Enhanced Network Security Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security against password cracking. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together. Also, encrypt the login password for administrator authentication and user authentication.
  • Page 529: Specifying An Ipp Authentication Password

    Encrypting Transmitted Passwords Press [Extended Security]. For "Driver Encryption Key", press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 530 5. Enhanced Network Security Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password"...
  • Page 531: Kerberos Authentication Encryption Setting

    Kerberos Authentication Encryption Setting Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 532 5. Enhanced Network Security Log out.
  • Page 533: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Managing Folders This section explains how to manage the folders in Document Server: how to delete folders, change their passwords, and unlock them when locked.
  • Page 534: Changing The Password Of A Folder

    6. Preventing the Leaking of Documents CXX002 Press [Edit Folder]. Select the folder. Press [Delete]. If a password entry screen appears, enter the password of the folder, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Delete].
  • Page 535: Unlocking Folders

    Managing Folders Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. If the message "You do not have the privileges to use this function." appears, press [Exit]. Press the [Home] key on the control panel, and press the [Document Server] icon on the screen.
  • Page 536 6. Preventing the Leaking of Documents If you specify [On] for "Enhance File Protection", the folder will be locked and become inaccessible if an invalid password is entered ten times. This section explains how to unlock folders. "Enhance File Protection" is one of the extended security functions. For details about this and other extended security functions, see page 254 "Specifying the Extended Security Functions".
  • Page 537: Managing Stored Files

    Managing Stored Files Managing Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server. This can prevent activities such as printing or sending of stored files by unauthorized users. You can also specify which users can change or delete stored files.
  • Page 538: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents Configuring Access Permission for Each Stored File This can be specified by the file administrator or owner. Specify the users and their access permissions for each stored file. • If files become inaccessible, reset their access permission as the owner. This can also be done by the file administrator.
  • Page 539 Managing Stored Files Select the folder. Select the file. Press [Change File Info.]. Press [Change Access Priv.].
  • Page 540 6. Preventing the Leaking of Documents Press [Program/Change/Delete]. Press [New Program]. Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 541: Changing The Owner Of A Document

    Managing Stored Files Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. • The "Edit", "Edit / Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 542 6. Preventing the Leaking of Documents Specify the users and their access permission to files stored by a particular user. This makes managing access permission easier than specifying and managing access permissions for each stored file. • If files become inaccessible, be sure to enable the user administrator, so that the user administrator can reset the access permission for the files in question.
  • Page 543: Specifying Passwords For Stored Files

    Managing Stored Files Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit]. Press [OK]. Press [Exit]. Log out. • The "Edit", "Edit / Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 544: Unlocking Stored Files

    6. Preventing the Leaking of Documents Select the file. Press [Change File Info.]. Press [Change Password]. Enter the new password for the stored file, and then press [OK]. You can use 4 to 8 numbers as the password for the stored file. Re-enter the password for confirmation, and then press [OK].
  • Page 545 Managing Stored Files Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen. If the message "You do not have the privileges to use this function." appears, press [Exit]. Press the [Home] key on the control panel, and press the [Document Server] icon on the screen.
  • Page 546: Managing Locked Print Files

    6. Preventing the Leaking of Documents Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function.
  • Page 547 Managing Locked Print Files Press the [Home] key on the control panel, and press the [Printer] icon on the screen. CXX002 Press [Print Jobs]. Press [Locked Print Job]. Select the file.
  • Page 548: Changing The Password Of A Locked Print File

    6. Preventing the Leaking of Documents Press [Delete]. If a password entry screen appears, enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 549: Unlocking A Locked Print File

    Managing Locked Print Files Press [Locked Print Job]. Select the file. Press [Change Password]. If a password entry screen appears, enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK].
  • Page 550 6. Preventing the Leaking of Documents Log in as the file administrator from the control panel. Close the initial settings screen. • When using the standard operation panel Press the [User Tools/Counter] key. • When using the Smart Operation Panel Press [User Tools/Counter] ( ) on the top right of the screen.
  • Page 551: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying The copier, Document Server, and printer functions let you embed a pattern in a printed copy to discourage or prevent unauthorized copying. If the Unauthorized Copy Prevention function is enabled, embedded text patterns (for instance, a warning message such as "No Copying") are displayed when documents are copied illegally.
  • Page 552: Enabling Pattern Printing

    6. Preventing the Leaking of Documents Enabling Pattern Printing You can enable embedded pattern printing to discourage or prevent unauthorized copying. Enabling embedded pattern printing in the Copier/Document Server functions Log in as the machine administrator from the control panel. Press [System Settings].
  • Page 553: Enabling Detect Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Unauthorized Copy Prevention Printing: Printer]. Press [Change] for "Unauthorized Copy Prevention Setting". Press [On], and then press [OK]. Press [Change] for "Compulsory Unauthorized Copy Prevention". Specify whether or not to make printing of the embedded pattern mandatory.
  • Page 554 6. Preventing the Leaking of Documents Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Detect Data Security for Copying]. Press [On]. If you do not want to specify "Detect Data Security for Copying", select [Off]. Press [OK]. Log out.
  • Page 555: Printing User Information On Paper

    Printing User Information on Paper Printing User Information on Paper The start time of the print job, information on the person who prints it (name or login user name), machine number and machine's IP address can be compulsorily embedded on printed sheets. This function is called Compulsory Security Stamp.
  • Page 556 6. Preventing the Leaking of Documents • Machine ID The numbers displayed as the "Serial No. of Machine" in [Inquiry] will be printed. • Machine IP Address The machine's IP address will be printed. If there are both IPv4 and IPv6 addresses, the IPv4 address will be printed.
  • Page 557: Enforced Storage Of Documents To Be Printed On A Printer

    Enforced Storage of Documents to be Printed on a Printer Enforced Storage of Documents to be Printed on a Printer By making it compulsory to keep jobs in the machine before printing them, you can prevent information leakage due to users failing to collect prints or leaving prints unattended. The following print jobs are subject to compulsory storage.
  • Page 558 6. Preventing the Leaking of Documents...
  • Page 559: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 560: Using Web Image Monitor To Manage Log Files

    7. Managing the Machine Using Web Image Monitor to Manage Log Files You can specify the types of log to store in the machine and the log collection level. You can also encrypt, bulk delete, or download log files. Logs That Can Be Managed Using Web Image Monitor The following tables explain the items in the job log and access log that the machine creates when you enable log collection using Web Image Monitor.
  • Page 561 Using Web Image Monitor to Manage Log Files Job Log Item Log Type Attribute Content Scanner: Stored File Scanner: Stored File Details of scan files stored in Document Server Downloading Downloading and downloaded using Web Image Monitor, DeskTopBinder or Desk Top Editor For Production.
  • Page 562 7. Managing the Machine Job Log Item Log Type Attribute Content Printer: Stored File Printer: Stored File Details of Stored Print files printed from the Printing Printing control panel or Web Image Monitor. Printer: Document Printer: Document Details of files stored in Document Server Server Sending Server Sending when "Job Type:"...
  • Page 563 Using Web Image Monitor to Manage Log Files Access log information items Access Log Item Log Type Attribute Content Login Login Times of login and identity of logged in users. Logout Logout Times of logout and identity of logged out users.
  • Page 564 7. Managing the Machine Access Log Item Log Type Attribute Content Firmware: Structure Firmware: Structure Details of checks for changes to firmware module structure made at times such as when the machine was switched on. Machine Data Machine Data Details of changes made to encryption keys Encryption Key Encryption Key using "Machine Data Encryption Key...
  • Page 565 Using Web Image Monitor to Manage Log Files Access Log Item Log Type Attribute Content Counter Clear Result: Counter Clear Result: Log of when the counters for all users are All Users All Users cleared. Import Device Setting Import Device Setting Log of when a device setting information file is Information Information...
  • Page 566: Attributes Of Logs You Can Download

    7. Managing the Machine Attributes of Logs You Can Download If you use Web Image Monitor to download logs, a CSV file containing the information items shown in the following table is produced. Note that a blank field indicates an item is not featured in a log. File output format •...
  • Page 567 Using Web Image Monitor to Manage Log Files Common items (Job log and Access log) Start Date/Time Indicates the start date and time of an operation or event. End Date/Time Indicates the end date and time of an operation or event. Log Type Details of the log type.
  • Page 568 7. Managing the Machine Value Content Completed The operation or event completed successfully on a job log entry. Failed The operation or event was unsuccessful on a job log entry. Succeeded The operation or event completed successfully on an access log entry.
  • Page 569 Using Web Image Monitor to Manage Log Files Value Content Write Error to Remote Machine An error occurred in writing to an output destination. Specified File: Incompatible The specified file is incompatible. Specified File: Format Error A format error occurred with the specified file. Specified File: Not Exist The specified file cannot be found.
  • Page 570 7. Managing the Machine Value Content Insufficient No. of Original for Pages are missing from a manuscript during execution of the Overlay overlaid copying. Exceed Max. Stored Page (File The storage capacity of pages on Document Server is Storage) exceeded. Exceed Max.
  • Page 571 Using Web Image Monitor to Manage Log Files Value Content Over Job Limit The number of jobs that can be received is exceeded. Specifying Destination Error An illegal address or an address with 41 or more digits is specified. Specifying Line Error An error occurred in the line specified.
  • Page 572 7. Managing the Machine Value Content Invalid Expiration Date: The valid period of the destination certificate is expired. Destination's Certificate Invalid Device/Destination's Both the destination certificate and the device certificate are Certificate invalid. Print Cancelled (Error) The print job has been cancelled because of a system error. User Entry ID Indicates the user's entry ID.
  • Page 573 Using Web Image Monitor to Manage Log Files Access log information items Access Log Type Indicates the type of access. Value Content Authentication User authentication access Stored File Stored file access System System access Network Attack Detection/ Network attack or encrypted communication access Encrypted Communication Firmware Firmware verification access...
  • Page 574 7. Managing the Machine Value Content Control Panel The login was performed through the control panel. via Network The login was performed remotely through a network computer. Others The login was performed through another method. Login User Type Indicates the type of login user. Value Content User...
  • Page 575 Using Web Image Monitor to Manage Log Files Address Book Operation Mode Indicates the method applied for changing the data registered in the Address Book. Address Book Change Item Indicates which item in the Address Book is changed. Address Book Change Request IP Address Indicates the IP address type (IPv4/IPv6) of the user using the Address Book.
  • Page 576 7. Managing the Machine Value Content Program (Copier) Program (Copier) Program (Scanner) Program (Scanner) Program (Document Server) Program (Document Server) Browser Features Browser Features Web Image Monitor Setting Web Image Monitor Setting Web Service Settings Web Service Settings System/Copier SP System/Copier SP Scanner SP Scanner SP...
  • Page 577 Using Web Image Monitor to Manage Log Files File Location Region of all file deletion. "Document Server" indicates a deletion of all files from the machine's hard disk. Collect Job Logs Indicates the status of the job log collection setting. Value Content Active...
  • Page 578 7. Managing the Machine Value Content Inactive Log transfer setting is disabled. Not Changed No changes have been made to the log transfer setting. Encrypt Logs Indicates the status of the log encryption setting. Value Content Active Log encryption setting is enabled. Inactive Log encryption setting is disabled.
  • Page 579 Using Web Image Monitor to Manage Log Files Value Content Cleartext Communication Encryption is disabled. Machine Port No. Indicates the machine's port number. Protocol Destination protocol. "Unknown" indicates the destination's protocol could not be identified. IP Address Destination IP address. Port No.
  • Page 580 7. Managing the Machine Communication Start/End Indicates the times at which the communication started and ended. Network Attack Status Indicates the machine's status when network attacks occur. Value Content Violation Detected An attack on the network was detected. Recovered from Violation The network recovered from an attack.
  • Page 581 Using Web Image Monitor to Manage Log Files Value Content Attack from Other than Control Attack by means other than an unauthorized operation using Panel the machine's control panel Login User Name used for Network Attack Identifies the login user name that the network attack was performed by. Add/Update/Delete Firmware Indicates the method used to add, update, or delete the machine's firmware.
  • Page 582 7. Managing the Machine Value Content Clear NVRAM The NVRAM was cleared. Start Updating Machine Data An encryption key update was started. Encryption Key Finish Updating Machine Data An encryption key update was finished. Encryption Key Machine Data Encryption Key Type Identifies the type of the encryption key.
  • Page 583 Using Web Image Monitor to Manage Log Files Attribute Description Lockout Whether the lockout is active (Active) or inactive (Inactive) is recorded. Number of Attempts before The number of times a user may enter a login password is Lockout recorded. Lockout Release Timer Whether the lockout release timer is active (Active) or inactive (Inactive) is recorded.
  • Page 584 7. Managing the Machine Attribute Description Encryption Key Auto The security level is recorded. Exchange: Setting1-4, Default: When [Authentication Only] is selected, "Authentication Only" Security Level is recorded. When [Authentication and Low Level Encryption] is selected, "Authentication and Low Level Encryption" is recorded. When [Authentication and High Level Encryption] is selected, "Authentication and High Level Encryption"...
  • Page 585 Using Web Image Monitor to Manage Log Files HDD Format Partition Indicates the initial status of each hard disk partition. Access Result Indicates the results of logged operations. Value Content Completed An operation completed successfully. Failed An operation completed unsuccessfully. Job log (source) Source Indicates the source of the job file.
  • Page 586 7. Managing the Machine Folder Name Indicates the name of the folder in which the file has been stored. Print File Name Name of "Printer" files. Job log (target) Printing stored faxes from the Fax screen before transmission will not be recorded in the job log. Target Type of the job target.
  • Page 587 Using Web Image Monitor to Manage Log Files Folder Name Indicates the name of the folder in which you have stored the file. Eco-friendly log information items Start Date/Time The event start date and time is recorded. End Date/Time The event end date and time is recorded. Log Type The type of eco-friendly log is recorded.
  • Page 588 7. Managing the Machine Log ID Identifies the ID that is assigned to the log. This is a hexadecimal ID that identifies the log. Power Mode The power status of the machine (after state transition) is logged. Value Content Standby Standby status Low Power Low power status...
  • Page 589: Specifying Log Collect Settings

    Using Web Image Monitor to Manage Log Files Large size means A3 (11 × 17 inches) or larger. Paper Usage (2 Sided: Small Size) Indicates the number of two-sided prints per hour on small paper. Small size means smaller than A3 (11 × 17 inches). Detected Power The power consumption status of the machine is measured and registered in the log while the machine is being used.
  • Page 590: Specifying Log Encryption

    7. Managing the Machine • HDD Format • All Logs Deletion • Log Setting Change • Log Collection Item Change If "Access Log Collect Level" is set to [Level 2], all access logs are collected. Eco-friendly Log Collect Level If "Eco-friendly Log Collect Level" is set to [Level 1], eco-friendly logs are not collected. If "Eco-friendly Log Collect Level"...
  • Page 591: Downloading Logs

    Using Web Image Monitor to Manage Log Files Point to [Device Management], and then click [Configuration]. Click [Logs] under "Device Settings". Select [Active] in the [Encrypt Logs] area under "Common Settings for All Logs". To disable log encryption, select [Inactive]. Click [OK].
  • Page 592: Number Of Logs That Can Be Kept On The Machine

    7. Managing the Machine • Downloaded log files use UTF-8 character encoding. To view a log file, open it using an application that supports UTF-8. • For details about the items contained in the logs, see page 208 "Attributes of Logs You Can Download".
  • Page 593: Notes On Operation When The Number Of Log Entries Reaches Maximum

    Using Web Image Monitor to Manage Log Files Manage downloaded log files appropriately under the responsibility of the machine administrator. • During log downloads, do not perform operations that will create log entries, as logs that are in the process of downloading cannot be updated with new entries. •...
  • Page 594 7. Managing the Machine 3. Download 4. Downloaded logs If logs are downloaded during overwriting CJD007 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs.
  • Page 595: Printer Job Logs

    Using Web Image Monitor to Manage Log Files Printer Job Logs Print Log entries are made before the login entry is made in the Access Log. Details of series of jobs (including reception, processing, and output of the jobs' data) are combined into single entries.
  • Page 596: Deleting All Logs

    7. Managing the Machine 9. Information about the outputting of the print job is recorded as an entry in the Job Log (using the same ID). 10. Authentication (logout) data is recorded as an entry in the Access Log. Deleting All Logs Use the following procedure to delete all logs stored in the machine.
  • Page 597: Managing Logs From The Machine

    Managing Logs from the Machine Managing Logs from the Machine You can specify settings such as whether or not to transfer logs to the log collection server and whether or not to delete all logs. Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer from the machine to the log collection server.
  • Page 598: Managing Logs From The Log Collection Server

    7. Managing the Machine Managing Logs from the Log Collection Server For details about using the log collection server to manage Log Files, see the manual supplied with the log collection server.
  • Page 599: Configuring The Home Screen For Individual Users

    Configuring the Home Screen for Individual Users Configuring the Home Screen for Individual Users This allows each user to use their own home screen. When a user logs in, their personalized home screen is displayed. You cannot use this setting when using the Smart Operation Panel. Log in as the machine administrator from the control panel.
  • Page 600 7. Managing the Machine • When Menu Protect has been set to [Level 1] or [Level 2], have the administrator create any necessary programs. • Only the icons of functions an administrator has permitted to be used are displayed. • When a user is deleted from the Address Book, that user's home screen information is also deleted. •...
  • Page 601: Configuring The Browser Functions

    Configuring the Browser Functions Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 602 7. Managing the Machine Messages • "This site has a security problem. The certificate has expired." • "This site has a security problem. The root certificate for verification does not exist." • "This site has a security problem. Verification of the server to connect to cannot be performed." •...
  • Page 603: Managing Device Information

    Managing Device Information Managing Device Information • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. The machine's device information can be set by an administrator with privileges to manage everything — devices, users, networks and files.
  • Page 604: Exporting Device Information

    7. Managing the Machine • @Remote-related data • Counters • EFI printer unit settings • Settings that can only be specified via Web Image Monitor or Web Service (for example, Bonjour, SSDP setting) • The file format for exports is CSV. •...
  • Page 605: Importing Device Information

    Managing Device Information Press [System Settings]. Press [Administrator Tools]. Press [ Next] four times. Press [Device Setting Information: Export (Memry Strge Devc)]. Set the export conditions. • Specify whether to [Include] or [Exclude] the "Device Unique Information". "Device Unique Information" includes the IP address, host name, fax number, etc. •...
  • Page 606 7. Managing the Machine Insert an SD card into the media slot on the side of the control panel. For details about inserting the SD card, see "Inserting/Removing a Memory Storage Device", Getting Started. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 607: Troubleshooting

    Managing Device Information Troubleshooting If an error occurs, check the log's result code first. Values other than 0 indicate that an error occurred. The result code will appear in the circled area illustrated below. Example of a log file "1.0.0" "ExecType", "Date", "SerialNo",PnP", "Model", "Destination","IP","Host","Storage","FileNam e","FileID","TotalItem","NumOfOkItem","ResultCode","ResultName","Identifier"...
  • Page 608 7. Managing the Machine ResultCode Cause Solutions 9 (DEVICE ERROR) Failed to write or read Check whether the path to the folder for storing the log file. the file or the folder in which the file is stored is missing. 10 (LOG ERROR) Failed to write the log Contact your service representative.
  • Page 609: Managing Eco-Friendly Counter

    Managing Eco-friendly Counter Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter displays the ratio of use of duplex and combine printing to the total number of printed sheets. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 610: Clearing A Machine's Eco-Friendly Counter

    7. Managing the Machine Default: [Fixed Message] Display Information Screen Specify whether or not to display the information screen at user login. Default: [Off] Display Time Specify the timing for displaying the information screen. Default: [Every Time Login] Clearing a Machine's Eco-friendly Counter A machine's eco-friendly counter can be cleared.
  • Page 611: Managing The Address Book

    Managing the Address Book Managing the Address Book Specifying Auto Deletion of Address Book Data Specify how the machine handles a request for auto registration after the registered data in the address book has reached the limit. If you set this to [On], new user accounts are added by automatically deleting old user accounts. Accounts that have not been used for the longest time are deleted first.
  • Page 612: Specifying The Extended Security Functions

    7. Managing the Machine Specifying the Extended Security Functions In addition to providing basic security through user authentication and each administrator's specified limits to access the machine, security can also be increased by encrypting transmitted data and data in the Address Book. Log in from the control panel as an administrator with privileges.
  • Page 613 Specifying the Extended Security Functions If [Simple Encryption] is specified, all jobs that pass user authentication are accepted. If [DES] is specified, jobs encrypted with DES or AES are accepted. If [AES] is specified, jobs encrypted with AES are accepted. If you select [AES] or [DES], specify the encryption settings using the printer driver.
  • Page 614 7. Managing the Machine Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) This can be specified by the user administrator. The available fax and scanner destinations are limited to the destinations registered in the Address Book. A user cannot directly enter the destinations for transmission. If "Restrict Use of Destinations (Scanner)"...
  • Page 615 Specifying the Extended Security Functions For details, see "Reception Functions", Fax. Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 616 7. Managing the Machine The administrator can confirm if the updated structure change is permissible or not by checking the firmware version displayed on the control panel screen. If the firmware structure change is not permissible, contact your service representative before logging in. When "Change Firmware Structure"...
  • Page 617 Specifying the Extended Security Functions Specify the time to limit repeated access by a user. Use the number keys to enter the time between "0" and "60", and then press [ ]. Default: [15] • Managed User Host Limit Specify the number of user accounts to manage under "Security Setting for Access Violation".
  • Page 618 7. Managing the Machine • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values. Device Access Violation This can be specified by the machine administrator.
  • Page 619 Specifying the Extended Security Functions • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values.
  • Page 620: Other Security Functions

    7. Managing the Machine Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 621: Scanner Function

    Other Security Functions Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 622: Restricting A Customer Engineer Operation

    7. Managing the Machine Restricting a Customer Engineer Operation You can restrict the customer engineer's access to the service mode. Service mode is used by a customer engineer for inspection or repair. If you set "Service Mode Lock" to [On], service mode cannot be used unless the machine administrator logs on to the machine and cancels the service mode lock to allow a customer engineer to operate the machine for inspection and repair.
  • Page 623: Additional Information For Enhanced Security

    Additional Information for Enhanced Security Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 624 7. Managing the Machine Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See page 254 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See page 254 "Specifying the Extended Strength Security Functions". Administrator Extended Security Access Privilege Tools...
  • Page 625: Settings You Can Configure Using Web Image Monitor

    Additional Information for Enhanced Security Scanner Features Item Setting Initial Settings Menu Protect Level 2 See page 78 "Specifying Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 626 7. Managing the Machine Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see page 69 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 627: Settings You Can Configure When Ipsec Is Available/Unavailable

    Additional Information for Enhanced Security Settings You Can Configure When IPsec Is Available/Unavailable All communication to and from machines on which IPsec is enabled is encrypted. If your network supports IPsec, we recommend you enable it. Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network.
  • Page 628 7. Managing the Machine • You can set "IPsec" and "Permit SSL/TLS Communication" using Web Image Monitor. Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. •...
  • Page 629 Additional Information for Enhanced Security • For details about specifying the IPsec setting via Web Image Monitor, see page 146 "Configuring IPsec".
  • Page 630 7. Managing the Machine...
  • Page 631: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication. If a message not shown below is displayed, follow the message to resolve the problem. "You do not have the privileges to use this function."...
  • Page 632 8. Troubleshooting "Failed to obtain URL." The machine is connected to the server, but the UA service is not responding properly. • Make sure the UA service is specified correctly. "Failed to obtain URL." SSL is not specified correctly on the server. •...
  • Page 633: If An Error Code Is Displayed

    If an Error Code is Displayed If an Error Code is Displayed When authentication fails, the message "Authentication has failed." appears with an error code. The following lists provide solutions for each error code. If the error code that appears is not on the lists, write down the error code and contact your service representative.
  • Page 634: Windows Authentication

    8. Troubleshooting B0206-002 : Case 1 A login user name or password error occurred. • Make sure the login user name and password are entered correctly and then log in. B0206-002 : Case 2 The user attempted authentication from an application on the "System Settings" screen, where only the administrator has authentication ability.
  • Page 635 If an Error Code is Displayed Make sure that the encryption key is correctly specified on the driver. W0105-000 A login user name was not specified but a DeskTopBinder operation was performed. • Set the DeskTopBinder login user name correctly. W0206-002 The user attempted authentication from an application on the "System Settings"...
  • Page 636 8. Troubleshooting • If a user enters sAMAccountName as the login user name, ldap_bind fails in a parent/subdomain environment. Use UserPrincipleName for the login name instead. W0406-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark (").
  • Page 637 If an Error Code is Displayed • Make sure that connection to the authentication server is possible. • Use the "Ping Command" in "Interface Settings" to check the connection. W0406-107 : Case 5 A login name or password error occurred. •...
  • Page 638 8. Troubleshooting • The KDC and machine timing do not match. Authentication will fail if the difference between the KDC and machine timing is more than 5 minutes. Make sure the timing matches. • Kerberos authentication will fail if the realm name is specified in lower-case letters. Make sure the realm name is specified in capital letters.
  • Page 639: Ldap Authentication

    If an Error Code is Displayed LDAP Authentication L0103-000 A TWAIN operation occurred during authentication. • Make sure no other user is logged in to the machine, and then try again. L0104-000 Failed to encrypt password. • A password error occurred. Make sure the password is entered correctly.
  • Page 640 8. Troubleshooting L0307-001 An authentication error occurred because the Address Book is being used at another location. • Wait a few minutes and then try again. L0400-210 Failed to obtain user information in LDAP search. • The login attribute's search criteria might not be specified or the specified search information is unobtainable.
  • Page 641 If an Error Code is Displayed • Make sure a usable login name is registered on the machine. Authentication will fail in the following cases: If the login user name contains a space, colon (:), or quotation mark ("). If the login user name exceeds 128 bytes. L0406-202 / L0406-203 : Case 3 There is an error in the simple encryption method.
  • Page 642: Integration Server Authentication

    8. Troubleshooting • Do not use "other", "admin", "supervisor" or "HIDE*" in general user accounts. L0607-001 An authentication error occurred because the Address Book is being used at another location. • Wait a few minutes and then try again. L0612-005 Authentication failed because no more users can be registered.
  • Page 643 If an Error Code is Displayed I0206-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark ("). • Recreate the account if the account name contains any of these prohibited characters. • If the account name was entered incorrectly, enter it correctly and log in again. I0207-001 An authentication error occurred because the Address Book is being used at another location.
  • Page 644 8. Troubleshooting I0511-000 The authentication server login name is the same as a user name already registered on the machine. (Names are distinguished by the unique attribute specified in the LDAP authentication settings.) • Delete the old, duplicated name or change the login name. •...
  • Page 645: If The Machine Cannot Be Operated

    If the Machine Cannot Be Operated If the Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide the instructions on how to deal with them. Condition Cause Solution Cannot perform the following: User authentication has been Confirm the user name and rejected.
  • Page 646 8. Troubleshooting Condition Cause Solution After starting "User "Driver Encryption Set "Driver Encryption Management Tool" or "Address Key:Encryption Strength" is not Key:Encryption Strength" to Management Tool" in set correctly. Alternatively, [Simple Encryption]. SmartDeviceMonitor for "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", Admin/Device Manager NX although the required certificate install the server certificate in the...
  • Page 647 If the Machine Cannot Be Operated Condition Cause Solution Cannot connect to the The ScanRouter delivery Update to the latest version of ScanRouter delivery software. software may not be supported the ScanRouter delivery by the machine. software. Cannot access the machine ScanRouter EX Professional V2 ScanRouter EX Professional V2 using ScanRouter EX...
  • Page 648 8. Troubleshooting Condition Cause Solution Cannot send e-mail from the The following are possible • Install a user certificate scanner. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 649 If the Machine Cannot Be Operated Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 650 8. Troubleshooting Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet destinations specified using been disabled without "All and select [All Users] as the the machine do not appear. Users" being selected for access permission setting of the "Protect Destination".
  • Page 651: List Of Operation Privileges For Settings

    9. List of Operation Privileges for Settings This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. How to Read Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 652: System Settings

    9. List of Operation Privileges for Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [General Features] Settings User Mach N/W File Unset [Program / Change / Delete User Text] [Panel Key Sound] [Warm-up Beeper] [Copy Count Display]...
  • Page 653 System Settings Settings User Mach N/W File Unset [Paper Tray Priority: Facsimile] [Paper Tray Priority: Printer] [Tray Paper Size: Tray 1-4] [Printer Bypass Paper Size] [Paper Type: Bypass Tray] [Paper Type: Tray 1-4] [Cover Sheet Tray] [Slip Sheet Tray] [Timer Settings] Settings User Mach N/W...
  • Page 654 9. List of Operation Privileges for Settings [Interface Settings] [Network] Settings User Mach N/W File Unset [Machine IPv4 Address] [IPv4 Gateway Address] [Machine IPv6 Address] [IPv6 Gateway Address] [IPv6 Stateless Address Autoconfiguration] [DHCPv6 Configuration] [DNS Configuration] [DDNS Configuration] [IPsec] [Domain Name] [WINS Configuration] [Effective Protocol] [NCP Delivery Protocol]...
  • Page 655 System Settings Settings User Mach N/W File Unset [IEEE 802.1X Authentication for Ethernet] [Restore IEEE 802.1X Authentication to – – – – Defaults] *1 When auto-obtain is set, the data is read-only. *2 All administrators and users can run a test of connections. [Parallel Interface] Settings User...
  • Page 656 9. List of Operation Privileges for Settings [File Transfer] Settings User Mach N/W File Unset [Delivery Option] [Capture Server IPv4 Address] [Fax RX File Transmission] [SMTP Server] [SMTP Authentication] [POP before SMTP] [Reception Protocol] [POP3 / IMAP4 Settings] [Administrator's E-mail Address] [E-mail Communication Port] [E-mail Reception Interval] [Max.
  • Page 657 System Settings [Administrator Tools] Settings User Mach N/W File Unset [Address Book Management] [Address Book: Program / Change / Delete Group] [Address Book: Change Order] – – – – [Print Address Book: Destination List] – – – [Address Book: Edit Title] –...
  • Page 658 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Media Slot Use] [User Authentication Management] [Enhanced Authentication Management] [Administrator Authentication Management] – *9*10 [Program / Change Administrator] – – [Key Counter Management] [External Charge Unit Management] [Enhanced External Charge Unit Management] [Extended Security]...
  • Page 659 System Settings Settings User Mach N/W File Unset • [Authenticate Current Job] • [@Remote Service] • [Update Firmware] – – • [Change Firmware Structure] – – • [Password Policy] – – – – – • [Settings by SNMPv1, v2] • [Security Setting for Access Violation] –...
  • Page 660 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Delete All Logs] – – – – [Transfer Log Setting] [Detect Data Security for Copying] [Unauthorized Copy Prevention Printing: Copier] [Unauthorized Copy Prevention Printing: Document Server] [Unauthorized Copy Prevention Printing: Printer] [Fixed USB Port] [Program / Change / Delete Realm]...
  • Page 661 System Settings Settings User Mach N/W File Unset [Volume Use Counter: Scheduled/Specified Reset Settings] [Select Switchable Languages] – – – – *4 Passwords cannot be read. *5 Only changing headings and user searches are possible. *6 The items that can be executed, changed and read differ according is set to access privilege. *7 Can only be cleared.
  • Page 662: Edit Home

    9. List of Operation Privileges for Settings Edit Home When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". You cannot use this setting when using the Smart Operation Panel. [Edit Home] Settings User Mach N/W...
  • Page 663: Copier / Document Server Features

    Copier / Document Server Features Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Features] Settings User Mach N/W File Lv.1 Lv.2 [Auto Image Density Priority] [Original Photo Type Priority] [Original Type Display] [Paper Display]...
  • Page 664 9. List of Operation Privileges for Settings [Edit] Settings User Mach N/W File Lv.1 Lv.2 [Front Margin: Left / Right] [Back Margin: Left / Right] [Front Margin: Top / Bottom] [Back Margin: Top / Bottom] [1 Sided 2 Sided Auto Margin: TtoT] [1 Sided 2 Sided Auto Margin: TtoB] [Erase Border Width] [Erase Original Shadow in Combine]...
  • Page 665 Copier / Document Server Features [Preset Stamp] Settings User Mach N/W File Lv.1 Lv.2 [Stamp Language] [Stamp Priority] [Stamp Format]: COPY [Stamp Format]: URGENT [Stamp Format]: PRIORITY [Stamp Format]: For Your Info. [Stamp Format]: PRELIMINARY [Stamp Format]: For Internal Use Only [Stamp Format]: CONFIDENTIAL [Stamp Format]: DRAFT *1 Only adjustments to print position can be set.
  • Page 666 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Size] [Superimpose] [Stamp Setting] *2 Only adjustments to print position can be set. The print position itself cannot be configured. [Page Numbering] Settings User Mach N/W File Lv.1 Lv.2...
  • Page 667 Copier / Document Server Features *3 Only adjustments to print position can be set. The print position itself cannot be configured. [Stamp Text] Settings User Mach N/W File Lv.1 Lv.2 [Font] [Size] [Superimpose] [Stamp Setting] [Change Job Serial No. for First Job] *4 Only adjustments to print position can be set.
  • Page 668: Facsimile Features

    9. List of Operation Privileges for Settings Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Quick Operation Key 1-3] [Switch Title] [Search Destination] [Communication Page Count] [Adjust Sound Volume]...
  • Page 669 Facsimile Features [Reception Settings] Settings User Mach N/W File Lv.1 Lv.2 [Reception File Settings] [Switch Reception Mode] [Program Special Sender] – – – – – [Program Special Sender: Print List] – – – – – [Stored Reception File User Setting] [SMTP RX File Delivery Settings] [2 Sided Print] [Checkered Mark]...
  • Page 670 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Program Fax Information] [Enable H.323] [Enable SIP] [H.323 Settings] [SIP Settings] [Program / Change / Delete Gateway] [Menu Protect] [Email Setting] [Folder Setting] [File Type to Transfer] [Security for Email TX Results]...
  • Page 671: Printer Functions

    Printer Functions Printer Functions This section lists the printer function items that appear if [Printer] on the Home screen is pressed. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Printer Functions Settings User Mach N/W...
  • Page 672: Printer Features

    9. List of Operation Privileges for Settings Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [List / Test Print] Settings User Mach N/W File Lv.1 Lv.2 [Multiple Lists] – –...
  • Page 673 Printer Features Settings User Mach N/W File Lv.1 Lv.2 [Memory Overflow] [Auto Cancel Conf. for PDL Error Job] [Auto Cancel for Print Job(s) on Error] [Job Separation] [Rotate Sort: Auto Paper Continue] [Rotate by 180 Degrees] [Print Compressed Data] [Memory Usage] [Duplex] [Copies] [Blank Page Print]...
  • Page 674 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Switch Initial Screen] [Host Interface] Settings User Mach N/W File Lv.1 Lv.2 [I/O Buffer] [I/O Timeout] [PCL Menu] Settings User Mach N/W File Lv.1 Lv.2 [Orientation] [Form Lines] [Font Source] [Font Number]...
  • Page 675 Printer Features Settings User Mach N/W File Lv.1 Lv.2 [Swtchng. btwn. 1&2 Sided Prt. Func.] [Data Format] [Resolution] [Orientation Auto Detect] [PDF Menu] Settings User Mach N/W File Lv.1 Lv.2 [Change PDF Password] [PDF Group Password] [Reverse Order Printing] [Resolution] [Orientation Auto Detect]...
  • Page 676: Scanner Features

    9. List of Operation Privileges for Settings Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Switch Title] [Update Delivery Server Destination List] –...
  • Page 677 Scanner Features Settings User Mach N/W File Lv.1 Lv.2 [Blank Page Detect] [Reproduction Ratio] [Program / Change / Delete Scan Size] [Send Settings] Settings User Mach N/W File Lv.1 Lv.2 [Compression (Black & White)] [Compression Method (Black & White)] [Compression (Gray Scale / Full Color)] [Compression Method for High Compression PDF] [High Compression PDF Level]...
  • Page 678: Browser Features

    9. List of Operation Privileges for Settings Browser Features When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Browser Default Settings] [Settings per Users] [View Logs]...
  • Page 679: Extended Feature Settings

    Extended Feature Settings Extended Feature Settings [Extended Feature Settings] Settings User Mach N/W File Unset [Startup Setting] [Install] [Uninstall] [Extended Feature Info] [Administrator Tools] – – – – – [Add.Program Startup Setting] [Install Add.Program] [Uninstall Add.Program] [Add.Program Info]...
  • Page 680: Maintenance

    9. List of Operation Privileges for Settings Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Maintenance] Settings User Mach N/W File Unset [Plain Paper Setting] – – – –...
  • Page 681: Web Image Monitor: Display Eco-Friendly Counter

    Web Image Monitor: Display Eco-friendly Counter Web Image Monitor: Display Eco-friendly Counter These settings are in [Status/Information]. Each user can only view his or her own counter. Settings User Mach File Unset [Download] – – – – – [Device Total Counter] –...
  • Page 682: Web Image Monitor: Job

    9. List of Operation Privileges for Settings Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. [Job List] Settings User Mach N/W File Unset [Current/Waiting Jobs]: [Change Order] – – – – –...
  • Page 683 Web Image Monitor: Job Settings User Mach N/W File Unset [Fax Remote Send History] – – [Scanner Remote Send History] – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 684: Web Image Monitor: Device Settings

    9. List of Operation Privileges for Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [System] Settings User Mach N/W File...
  • Page 685 Web Image Monitor: Device Settings [Function Key Allocation/Function Priority] Settings User Mach N/W File Unset [Function Key Allocation] [Function Priority] [Paper] Settings User Mach N/W File Unset [Tray 1-4] [Bypass Tray] [Date/Time] Settings User Mach N/W File Unset [Set Date] [Set Time] [SNTP Server Name] [SNTP Polling Interval]...
  • Page 686 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Fusing Unit Off Mode On/Off] [Weekly Timer] [Logs] Settings User Mach N/W File Unset [Job Log] [Access Log] [Eco-friendly Logs] [Transfer Logs] [Encrypt Logs] [Classification Code] [Delete All Logs] –...
  • Page 687 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Email Storage in Server] – – – [SMTP Server Name] – – – [SMTP Port No.] – – – [Use Secure Connection (SSL)] – – – [SMTP Authentication] – –...
  • Page 688 9. List of Operation Privileges for Settings [Auto Email Notification] Settings User Mach N/W File Unset [Notification Message] [Groups to Notify] [Select Groups/Items to Notify] [Detailed Settings of Each Item] [On-demand Email Notification] Settings User Mach N/W File Unset [Notification Subject] [Notification Message] [Access Restriction to Information] [Receivable Email Address/Domain Name...
  • Page 689 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Printer Job Authentication Settings] [User Code Authentication Settings] [Basic Authentication Settings] [Windows Authentication Settings] [Group Settings for Windows Authentication] [LDAP Authentication Settings] [Integration Server Authentication Settings] [Group Settings for Integration Server Authentication] [Administrator Authentication Management] Settings...
  • Page 690 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Network Administrator] – – [File Administrator] – – [Login User Name] – – [Login Password] – – [Encryption Password] – – *1 Administrators can only change their own accounts. [Print Volume Use Limitation] Settings User...
  • Page 691 Web Image Monitor: Device Settings [Kerberos Authentication] Settings User Mach N/W File Unset [Encryption Algorithm] – – – – – [Realm 1-5] – – – – – [Program/Change/Delete Remote Machine] Settings User Mach N/W File Unset [Program] – – – –...
  • Page 692 9. List of Operation Privileges for Settings [Unauthorized Copy Prevention: Copier] Settings User Mach N/W File Unset [Compulsory Unauthorized Copy Prevention] [Unauthorized Copy Prevention Type] [Mask Type for Pattern/Density/Effect] [Prevention Text Settings] [Unauthorized Copy Prevention: Document Server] Settings User Mach N/W File Unset [Compulsory Unauthorized Copy Prevention]...
  • Page 693: Web Image Monitor: Printer

    Web Image Monitor: Printer Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Basic Settings] Settings User Mach N/W File Lv.1 Lv.2 [Print Error Report]...
  • Page 694 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Sub Paper Size] [Page Size] [Letterhead Setting] [Tray Setting Priority] [Paper Confirmation for Bypass Tray] [Store and Skip Errored Job] [Edge to Edge Print] [Default Printer Language] [Tray Switching] [List/Test Print Lock] [Extended Auto Tray Switching]...
  • Page 695 Web Image Monitor: Printer [PDF Temporary Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Temporary Password] – – – – [PDF Group Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Group Password] – – – – – [PDF Fixed Password] Settings User Mach N/W...
  • Page 696 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Output Tray] [Letterhead Setting] [Edge to Edge Print] [PCL Menu] [PS Menu] [PDF Menu] [RHPP Settings] [Permissions for Printer Language to Operate File System] Settings User Mach N/W File Lv.1...
  • Page 697: Web Image Monitor: Fax

    Web Image Monitor: Fax Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Initial Settings] Settings User Mach N/W File Lv.1 Lv.2 [Closed Network Code]...
  • Page 698 9. List of Operation Privileges for Settings [Reception File Settings] Settings User Mach N/W File Lv.1 Lv.2 [Output Mode Switch Timer] – – – – – [Prohibit Auto Print] – – – – – [Print Standby to Print Files] – –...
  • Page 699: Web Image Monitor: Scanner

    Web Image Monitor: Scanner Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Switch Title]...
  • Page 700 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [High Compression PDF Level] [Compression Method for High Compression PDF] [Max. Email Size] [Divide & Send Email] [Insert Additional Email Info] [No. of Digits for Single Page Files] [Stored File Email Method] [Default Email Subject] *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user...
  • Page 701 Web Image Monitor: Scanner [Default Settings for Simplified Screens on Device] Settings User Mach N/W File Lv.1 Lv.2 [Scan Settings] – – – [Send File Type] – – –...
  • Page 702: Web Image Monitor: Interface

    9. List of Operation Privileges for Settings Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Interface Settings] Settings User Mach N/W File...
  • Page 703 Web Image Monitor: Interface Settings User Mach N/W File Unset [WEP Settings] [WPA2 Settings]...
  • Page 704: Web Image Monitor: Network

    9. List of Operation Privileges for Settings Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [IPv4] Settings User Mach N/W File Unset...
  • Page 705 Web Image Monitor: Network Settings User Mach N/W File Unset [Link-local Address] [Stateless Address] [Manual Configuration Address] [DHCPv6] [DHCPv6 Address] [DDNS] [LLMNR] [Details] [NetWare] Settings User Mach N/W File Unset [NetWare] [NetWare Print Settings] [NCP Delivery] [SMB] Settings User Mach N/W File Unset [SMB]...
  • Page 706 9. List of Operation Privileges for Settings [SNMP] Settings User Mach N/W File Unset [SNMP] – – – – – [Protocol] – – – – – [SNMPv1,v2 Setting] – – – – – [Community] – – – – – [SNMPv3] Settings User Mach N/W...
  • Page 707 Web Image Monitor: Network Settings User Mach N/W File Unset [Local Hostname] [Details] [Print Order Priority] [System Log] Settings User Mach N/W File Unset [System Log] –...
  • Page 708: Web Image Monitor: Security

    9. List of Operation Privileges for Settings Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Network Security] – – – – – [Access Control] – – – – – [IPP Authentication] –...
  • Page 709: Web Image Monitor: @Remote

    Web Image Monitor: @Remote Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Setup RC Gate] – – – – – [Update RC Gate Firmware] – – – – – [RC Gate Proxy Server] –...
  • Page 710: Web Image Monitor: Webpage

    9. List of Operation Privileges for Settings Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Webpage] Settings User Mach N/W File Unset...
  • Page 711: Web Image Monitor: Extended Feature Settings

    Web Image Monitor: Extended Feature Settings Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Startup Setting] – – – – – [Extended Feature Info] [Install] – – – – –...
  • Page 712: Web Image Monitor: Address Book

    9. List of Operation Privileges for Settings Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset [Add User] – – – [Change] – – – [Delete] – – – [Add Group] – – –...
  • Page 713: Web Image Monitor: Reset Printer Job

    Web Image Monitor: Reset Printer Job Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset [Reset Current Job] – – – – – [Reset All Jobs] – – – – –...
  • Page 714: Web Image Monitor: Reset The Machine

    9. List of Operation Privileges for Settings Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Reset the Machine]...
  • Page 715: Web Image Monitor: Device Home Management (When Using The Standard Operation Panel)

    Web Image Monitor: Device Home Management (When Using the Standard Operation Panel) Web Image Monitor: Device Home Management (When Using the Standard Operation Panel) These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings".
  • Page 716: Web Image Monitor: User's Own Customization (When Using The Smart Operation Panel)

    9. List of Operation Privileges for Settings Web Image Monitor: User's Own Customization (When Using the Smart Operation Panel) These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach...
  • Page 717: Web Image Monitor: Screen Monitoring

    Web Image Monitor: Screen Monitoring Web Image Monitor: Screen Monitoring These settings are in [Device Management]. Settings User Mach File Unset [Display Device's Screen] – – – – –...
  • Page 718: Web Image Monitor: Customize Screen Per User

    9. List of Operation Privileges for Settings Web Image Monitor: Customize Screen per User This appears if [User's Own Customization] is set to [Allow]. Users can change only their own settings. Settings User Mach File Unset [Edit Icons] – – –...
  • Page 719: Web Image Monitor: Document Server

    Web Image Monitor: Document Server Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see page 364 "List of Operation Privileges for Stored Files". Settings User Mach...
  • Page 720: Web Image Monitor: Fax Received File

    9. List of Operation Privileges for Settings Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset [Print] – – – – [Delete] – – – – [Download] – – – – Edit detailed information] –...
  • Page 721: Web Image Monitor: Printer: Print Jobs

    Web Image Monitor: Printer: Print Jobs Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 722: List Of Operation Privileges For Stored Files

    9. List of Operation Privileges for Settings List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 723 List of Operation Privileges for Stored Files Settings Read Edit Full Owner File [Print Specified Page] – *1 The owner can change operation privileges.
  • Page 724: List Of Operation Privileges For Address Books

    9. List of Operation Privileges for Settings List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 725 List of Operation Privileges for Address Books Settings Read Edit Full Entry User [Login User Name] – – – – [Login Password] – – – – [SMTP Authentication] – – – – [Folder Authentication] [LDAP Authentication] – – – – [Available Functions] –...
  • Page 726 9. List of Operation Privileges for Settings Settings Read Edit Full Entry User [Select Line] [Adv. Features] [International TX Mode] [Fax Header] [Label Insertion] [E-mail] Settings Read Edit Full Entry User [E-mail Address] [Use E-mail Address for] [Send via SMTP Server] [Folder] Settings Read...
  • Page 727 List of Operation Privileges for Address Books Settings Read Edit Full Entry User [Search] [Switch Title] • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 728 9. List of Operation Privileges for Settings Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. LINUX is a registered trademark of Linus Torvalds.
  • Page 729 Trademarks ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows 8 are as follows: ® ® Microsoft Windows ® ® Microsoft Windows 8 Pro ® ®...
  • Page 730 9. List of Operation Privileges for Settings...
  • Page 731 INDEX Error code............Error message............Access Control............. ESP Protocol............Access permission for stored files...... Extended security functions........ Address Book access permission......Administrator............Administrator privileges........Firmware validity..........Administrator registration........AH Protocol..........146, 147 IEEE 802.1X............AH Protocol + ESP Protocol....... 146, 147 device certificate.............
  • Page 732 Password for stored files........Windows authentication........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax)..Restrict Adding of User Destinations (Scanner) Restrict Display of User Information....Restrict Use of Destinations (Fax).......
  • Page 733 MEMO...
  • Page 734 MEMO D184-7576...
  • Page 736 D184-7576 © 2013...

Table of Contents