Table of Contents

Advertisement

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety
Information in "About This Machine" before using the machine.
Network and System Settings
1
System Settings
2
Connecting the Machine
3
Using a Printer Server
4
Monitoring and Configuring the Machine
5
Registering Addresses and Users for Scanner Functions
6
Special Operations under Windows
7
Appendix

Operating Instructions

Reference

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh 3406WD

  • Page 1: Operating Instructions

    Operating Instructions Network and System Settings Reference System Settings Connecting the Machine Using a Printer Server Monitoring and Configuring the Machine Registering Addresses and Users for Scanner Functions Special Operations under Windows Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine..........................9 Notice................................11 Important..............................11 How to Read This Manual..........................12 Symbols................................12 Machine Types.............................12 Names of Major Items..........................13 Notes................................13 About IP Address............................13 Laws and Regulations............................14 Legal Prohibition............................14 Model-Specific Information..........................15 Display Panel..............................16 Accessing User Tools............................17 Changing Default Settings...........................17 Quitting User Tools............................18 1.
  • Page 4 Deleting the Realm............................64 2. Connecting the Machine Connecting to the Interface..........................65 Connecting to the Ethernet Interface......................66 Connecting to the Gigabit Ethernet Interface....................67 Connecting to the USB (Type B) Interface....................69 Connecting a Device to the Machine’s USB Host Interface..............70 Connecting to the Wireless LAN Interface....................70 Network Settings Required to Use the Printer....................73 Ethernet.................................73 Wireless LAN...............................74...
  • Page 5 Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5)..............102 Using Pure IP in the NetWare 5/5.1 or 6/6.5 Environment..............103 Setting Up as a Remote Printer (NetWare 3.x)..................105 Setting Up as a Remote Printer (NetWare 4.x, 5/5.1, 6/6.5)............107 4. Monitoring and Configuring the Machine Using Web Image Monitor...........................111 Displaying Top Page..........................112 When User Authentication is Set......................114...
  • Page 6 help................................142 hostname..............................143 ifconfig................................143 info................................145 ipp................................145 ipsec................................146 ipv6................................146 logout.................................146 lpr................................146 netware..............................147 passwd...............................148 pathmtu...............................149 prnlog.................................149 route................................150 set................................151 show................................154 slp................................154 smb................................154 snmp................................155 sntp................................159 spoolsw..............................159 ssdp................................160 ssh................................160 status................................161 syslog................................162 upnp................................162 web................................162 wiconfig..............................163 wins................................168 wsmfp.................................169 8021x................................170 SNMP................................173 Getting Machine Information over the Network..................174...
  • Page 7 Current Machine Status..........................174 Printer configuration..........................176 Understanding the Displayed Information....................179 Print Job Information..........................179 Print Log Information..........................179 Configuring the Network Interface Board....................180 Message List..............................186 System Log Information..........................186 5. Registering Addresses and Users for Scanner Functions Address Book..............................199 Managing names in the Address Book....................202 Sending e-mail by Quick Dial........................202 Sending scanned files to a shared folder directly...................202 Preventing unauthorized user access to shared folders from the machine...........203...
  • Page 8 Changing an SMB Folder.........................225 Deleting an SMB Registered Folder......................226 Registering an FTP Folder.........................227 Changing an FTP Folder...........................230 Deleting an FTP Folder..........................231 Registering an NCP Folder........................232 Changing an NCP Registered Folder......................236 Deleting an NCP Folder..........................237 Registering Names to a Group........................239 Registering a Group..........................239 Registering Names to a Group........................240 Adding a Group to Another Group......................242 Displaying Names Registered in a Group....................243...
  • Page 9 Using DHCP..............................263 Using AutoNet............................263 Configuring the WINS Server........................264 Using Web Image Monitor........................264 Using telnet..............................265 Using the Dynamic DNS Function........................266 Updating..............................266 DNS servers targeted for operation......................267 DHCPv4 servers targeted for operation....................267 Setting the dynamic DNS function......................267 Precautions..............................269 Connecting a Dial-Up Router to a Network....................269 NetWare Printing............................270 When the IEEE 802.11 Interface Unit is Installed..................272 Configuring IEEE 802.1X..........................273...
  • Page 10 NetBSD..............................285 Open LDAP..............................294 Open SSH..............................295 Open SSL..............................299 racoon................................301 ® RSA BSAFE ..............................301 Sablotron (Version 0.82)..........................301 Samba................................302 SASL................................307 SPX/IPX..............................308 TrouSerS..............................308 WPA Supplicant............................312 Trademarks..............................313 INDEX ................................315...
  • Page 11: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 12 Be sure to read this manual when setting the enhanced security functions, or user and administrator authentication. VM Card Extended Feature Settings Device Reference Explains how to set up the extended features settings with the machine. VM Card Extended Feature Settings Web Reference Explains how to set up the extended features settings using Web Image Monitor.
  • Page 13: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the manufacturer recommends that you use genuine toner from the manufacturer. The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products.
  • Page 14: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions , and instructions on resolving user errors.
  • Page 15: Names Of Major Items

    Names of Major Items Major items of this machine are referred to as follows in this manual: • Roll Feeder Type 3601A Paper roll tray 1 • Roll Feeder Type 3601B Paper roll tray 2 • Paper Cassette Type 240 Cut paper tray •...
  • Page 16: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 17: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CBB013 The following information is region-specific.
  • Page 18: Display Panel

    Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 19: Accessing User Tools

    Accessing User Tools This section describes how to access User Tools menu. User Tools allow you to change or set defaults. • Operations for system settings differ from normal operations. Always quit User Tools when you have finished. • Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the [Energy Saver] or [Clear Modes] key is pressed.
  • Page 20: Quitting User Tools

    • p.19 "System Settings" Quitting User Tools This section describes how to quit the settings of User Tools. Press the [User Tools/Counter] key. CBB015 • You can also quit User Tools by pressing [Exit].
  • Page 21: System Settings

    1. System Settings This chapter describes user tools in the System Settings menu. General Features This section describes the user tools in the General Features menu under System Settings. Program / Change / Delete User Text You can register text phrases you often use when specifying settings, such as ".com" and "Regards". You can register up to 40 entries.
  • Page 22 1. System Settings Default: [Medium] Warm-up Beeper (copier/Document Server) You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on. Default: [On] If the Panel Key Sound setting is [Off], the beeper does not sound, whatever the Warm-up Beeper Notice setting.
  • Page 23 General Features System Status/Job List Display Time Specify how long to display the System Status and Job List display for. Default: [On], [15 second(s)] By selecting [On], you can specify a display time between 10 and 999 seconds. Interleave Print You can set the timing for changing modes when [Print Priority] has been set [Interleave].
  • Page 24 1. System Settings Default for Vertical: [0.0%] / Horizontal: [0.0%]. Specify the ratio between -1.0% and 1.0% (in 0.1% increments) To set the Fine Ratio setting, measure the length of the original and the copy image to calculate the ratio. CBB002 Fine Ratio Adjustment: Printer Specify the fine ratio when the optional printer is installed.
  • Page 25 General Features This setting is effective when a preview of an enter image cannot be displayed due to document size. Default for Area: [ ] Default for Area Size: [Small] Default for Landscape/Portrait: [ ] Print Image Priority You can prioritize either lines or gradation in printed images. Default: [Thin Lines] •...
  • Page 26: Tray Paper Settings

    1. System Settings Tray Paper Settings This section describes the user tools in the Tray Paper Settings menu under System Settings. • If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed might occur because the correct paper size was not detected.
  • Page 27 Tray Paper Settings (mainly Europe and Asia) [A0 Width (841 mm)] (mainly North America) [36 inch / 914 mm] Tray Paper Size: Tray 2 Select the size of the paper loaded in the paper tray. • When two paper rolls tray is installed •...
  • Page 28 1. System Settings Tray Paper Size: Tray 3 Select the size of the paper loaded in the paper tray. A3 , A4 , B4 JIS , 12 × 18 , 11 × 17 , 8 × 14 , 8 × 13 , 8 ×...
  • Page 29 Tray Paper Settings Paper Thickness: Paper Tray Specify the thickness of paper loaded in the paper trays. If the copy image blurs or the translucent paper loosens, changing the paper thickness level may improve results. Default for Plain Paper: [3] Default for Recycled Paper: [3] Default for Translucent Paper: [2] Default for Film: [3]...
  • Page 30 1. System Settings When level 1 or 2 are selected for translucent paper, and you make copies on paper of size A1 or above continuously, the interval between each copying may take longer. Even if you make copy on one sheet only, it may takes 1 minute until the next copy job starts. Paper Thickness: Paper Bypass Specify the thickness of paper placed in the paper bypass.
  • Page 31: Timer Settings

    Timer Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Auto Off Timer After a specified period has passed, following job completion, the machine automatically turns off, in order to conserve energy. This function is called "Auto Off". The machine status after the Auto Off operation is referred to as "Off mode", or "Sleep mode".
  • Page 32 1. System Settings Copier / Document Server Auto Reset Timer (copier/Document Server) Specifies the time to elapse before copier and Document Server modes reset. If [Off] is selected, the machine does not automatically switch to the user code entry screen. The time can be set from 10 to 999 seconds, using the number keys.
  • Page 33: Interface Settings

    Interface Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Network This section describes the user tools in the Network menu under Interface Settings. Machine IPv4 Address Specify the machine's IPv4 network address. Default: [Auto-Obtain (DHCP)] When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx"...
  • Page 34 1. System Settings Default: [Auto-Obtain (DHCP)] When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a number). DDNS Configuration Specify the DDNS settings. Default: [Active] IPsec Specify the machine's IPsec function Active/Inactive. Default: [Inactive] For details about this function, consult your administrator. Domain Name Specify the domain name.
  • Page 35 Interface Settings Default: [Auto Select] SMB Computer Name Specify the SMB computer name. Enter the computer name using up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Do not set a computer name starting with RNP and rnp. Use uppercase letters for alphabets. SMB Work Group Specify the SMB work group.
  • Page 36 1. System Settings [LAN Type] is displayed when wireless LAN board is installed. If Ethernet and Wireless LAN are both connected, the selected interface has priority. Ping Command Check the network connection with ping command using given IPv4 address. If you fail to connect to the network, check the following, and then retry the ping command. •...
  • Page 37: Wireless Lan

    Interface Settings • p.17 "Accessing User Tools" • p.273 "Configuring IEEE 802.1X" Wireless LAN This section describes the user tools in the Wireless LAN menu under Interface Settings. [Wireless LAN] is displayed when this machine is installed with the wireless LAN interface board. Be sure to make all settings simultaneously.
  • Page 38 1. System Settings 5180 - 5240 MHz (36, 40, 44 and 48 channels) Default: [11] Security Method Specifies the encryption of the Wireless LAN. Default: [Off] If you select [WEP], always enter WEP key. If you select [WPA], specify the encryption and authentication methods.
  • Page 39: Print List

    Interface Settings Print List This section describes how to print the configuration page. You can check items related to the network environment. The configuration page shows the current network settings and network information. Press the [User Tools/Counter] key. Press [System Settings]. Press [Interface Settings].
  • Page 40 1. System Settings Press [Exit]. Press the [User Tools/Counter] key. • You can also exit by pressing [Exit] on the User Tools main menu. • For details on how to access System Settings, see "Accessing User Tools". • p.17 "Accessing User Tools" •...
  • Page 41: File Transfer

    File Transfer File Transfer This section describes the user tools in the File Transfer menu under System Settings. Delivery Option Enables or disables sending stored or scanned documents to the ScanRouter delivery server. Default: [Off] Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do, you will have to preregister I/O devices in the ScanRouter delivery software.
  • Page 42 1. System Settings • Encryption Select Encryption as follows: [Auto] Use if the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5. [On] Use if the authentication method is CRAMMD5 or DIGEST-MD5. [Off] Use if the authentication method is PLAIN, or LOGIN. POP before SMTP Specify POP authentication (POP before SMTP).
  • Page 43 File Transfer The specified POP3/IMAP4 server name is used for [POP before SMTP]. Default: [Auto] • Server Name If DNS is in use, enter the host name. If DNS is not in use, enter the POP3/IMAP4 or server IPv4 address. Enter POP3/IMAP4 server name using up to 127 characters.
  • Page 44 1. System Settings If [On] is selected, the time can be set from 2 to 1440 minutes in increments of one minute. Max. Reception E-mail Size Specify the maximum reception e-mail size for receiving e-mails. Default: [2 MB] Enter a size from 1 - 50 MB in increments of one megabyte. E-mail Storage in Server Specify whether or not to store received e-mails on the POP3 or IMAP4 server.
  • Page 45 File Transfer • Delete: 1. Press the [User Tools/Counter] key. 2. Press [System Settings]. 3. Press [File Transfer]. 4. Press [Program / Change / Delete E-mail Message]. 5. Press [Delete]. 6. Select the e-mail message to delete. The confirmation message about deleting appears. 7.
  • Page 46 1. System Settings • For details on how to access System Settings, see "Accessing User Tools". • p.17 "Accessing User Tools"...
  • Page 47: Administrator Tools

    Administrator Tools Administrator Tools This section describes the user tools in the Administrator Tools menu under System Settings. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Administrator Tools settings. Address Book Management You can add, change or delete information registered in the Address Book.
  • Page 48 1. System Settings • Names You can register a name, key display, registration number, and title selection. • Programmed User/Group You can check the names or groups registered in each group. • Protection You can register a protection code. • Add to Group You can put groups registered in the Address Book into a group.
  • Page 49 Administrator Tools You can select a name using the number keys. 6. Press the name key in place you want to move it to. The user key is moved to the selected position, and the user key currently at the selected position is moved forward or backward.
  • Page 50 1. System Settings • Print in Title 1 Order Prints the Address Book in Title 1 order. • Print in Title 2 Order Prints the Address Book in Title 2 order. • Print in Title 3 Order Prints the Address Book in Title 3 order. •...
  • Page 51 Administrator Tools 6. Enter the new name, and then press [OK]. 7. Press [OK]. 8. Press the [User Tools/Counter] key. Address Book: Switch Title Specifies the title to select a name. Default: [Title 1] Back Up / Restore Address Book You can back up the machine's Address Book to external storage or restore the backup copy from the external storage.
  • Page 52 1. System Settings Default: [Do not Carry-over] If you select [Carry-over Data], use the number keys to enter the registration number of the data you wish to carry over from an Address Book. For details about the Windows authentication, LDAP authentication, or Integration server authentication, consult your administrator.
  • Page 53 Administrator Tools For details about Basic Authentication, Windows Authentication, LDAP Authentication, and Integration Server Authentication, consult your administrator. Function to Restrict • Copier • Document Server • Printer • Printer: PC Control • Scanner • Printer Job Authentication: [Entire], [Simple (Limitation)], [Simple (All)] •...
  • Page 54 1. System Settings • Document Server • Printer • Scanner For details about this function, consult your administrator. Enhanced External Charge Unit Management Specify whether or not to make available enhanced features for enhanced external charge unit management. For details about this function, consult your administrator. Extended Security Specify whether or not to use the extended security functions.
  • Page 55 Administrator Tools For details about this function, consult your administrator. Capture: Public Priority This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software. For details about this function, consult your administrator. Capture: Owner Defaults This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.
  • Page 56 1. System Settings Notify Machine Status You can send notification of the machine’s status to the @Remote center. This function is available only if the @Remote service is enabled and active. Service Mode Lock For details about this function, consult your administrator. Firmware Version You can check the version of the software installed in this machine.
  • Page 57 Administrator Tools Machine Data Encryption Settings For details about this function, consult your administrator. • For details on how to access System Settings, see "Accessing User Tools". • p.17 "Accessing User Tools" • p.56 "Programming the LDAP server" • p.62 "Programming the Realm" •...
  • Page 58: Programming The Ldap Server

    1. System Settings Programming the LDAP server This section describes how to specify the LDAP server settings. This function supports LDAP version 2.0 and 3.0. Program the LDAP server to find e-mail destinations in the LDAP server Address Book directly. This function is possible when sending scan files by e-mail using the scanner function.
  • Page 59 Programming the LDAP server Enter the server name, and then press [OK]. Press [Change] under "Search Base". Select a root folder to start the search from e-mail addresses registered in the selected folder are search targets. Enter the search base, and then press [OK]. For example, if the search target is the sales department of ABC company, enter "dc=sales department, o=ABC".
  • Page 60 1. System Settings If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 19 to 22, and then proceed to step 24. If you select [Kerberos Authentication], proceed to step 19 to 23, and then proceed to step 24. Press [Change] under "User Name".
  • Page 61 Programming the LDAP server Press [Connection Test]. Access the LDAP server to check that the proper connection is established. Check authentication works according to the authentication settings. Press [Exit]. If the connection test fails, check your settings and try again. This function does not check search conditions or the search base.
  • Page 62: Changing The Ldap Server

    1. System Settings The key does not appear on the search screen unless both "Attribute" and "Key Display" are registered. Make sure you register both to use the optional search. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • p.252 "Registering SMTP and LDAP Authentication" Changing the LDAP server This section describes how to change the programmed LDAP server.
  • Page 63 Programming the LDAP server Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [ Next] twice. Press [Program / Change / Delete LDAP Server]. Press [Delete]. Select the LDAP server you want to delete. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 64: Programming The Realm

    1. System Settings Programming the Realm This section describes how to specify the Realm settings. Program the realm to be used for Kerberos authentication. A realm is the network area in which Kerberos authentication is used. After confirming the network environment, specify the necessary items.
  • Page 65: Changing The Realm

    Programming the Realm Press [Change] under "Realm Name". Enter the realm name, and then press [OK]. Enter the realm name, or host name. You can enter a realm name using up to 64 characters. Press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 66: Deleting The Realm

    1. System Settings To change the realm name, press [Change] under "Realm Name". Enter the realm name, and then press [OK]. You can enter a realm name using up to 64 characters. To change the KDC server name, press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 67: Connecting The Machine

    2. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interface This section explains how to identify the machine's interface and connect the machine according to the network environment.
  • Page 68: Connecting To The Ethernet Interface

    2. Connecting the Machine Connecting to the Ethernet Interface This section describes how to connect an Ethernet cable to the Ethernet interface. • If the main power switch is on, turn it off. • Use the following Ethernet cables. • Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type 5 or more Make a loop 3 cm (1.2 inch) (1) from the end of the Ethernet cable and attach the included ferrite core to the loops as shown.
  • Page 69: Connecting To The Gigabit Ethernet Interface

    Connecting to the Interface Turn on the main power switch of the machine. CBB003 1. Indicator (green) When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off. 2. Indicator (orange) When 100BASE-TX is operating, the LED is lit orange. When 10BASE-T is operating it is turned off. •...
  • Page 70 2. Connecting the Machine Make loops 3 cm (1.2 inch) (1) from the end of each Ethernet cable and attach included ferrite cores to each loop as shown. BZU010 Make sure the main power is switched off. Connect the Ethernet interface cable to the Gigabit Ethernet port. CBB011 Connect the other end of the Ethernet interface cable to a network connection device such as a hub.
  • Page 71: Connecting To The Usb (Type B) Interface

    Connecting to the Interface Turn on the main power switch of the machine. 1. Indicator (orange) When 100BASE-TX is operating, the LED is lit orange. When 10BASE-T is operating, it is turned off. 2. Indicator (green) When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off. 3.
  • Page 72: Connecting A Device To The Machine's Usb Host Interface

    2. Connecting the Machine Connect the other end to the USB2.0 port on the host computer. • This machine does not come with a USB interface cable. Make sure you purchase the appropriate cable for the machine and your computer. •...
  • Page 73: Setup Procedure

    Connecting to the Interface • Before using this machine with a wireless LAN interface, you must select [Wireless LAN] in [LAN Type]. • p.31 "Interface Settings" Setup Procedure This section describes how to setup wireless LAN interface. To configure the wireless LAN settings: open [System Settings], [Interface Settings], select [Wireless LAN], and then use the following procedure.
  • Page 74 2. Connecting the Machine • For details about how to specify wireless LAN settings from the control panel on the machine, see "Interface Settings". • p.31 "Interface Settings" • p.273 "Configuring IEEE 802.1X" Checking the Signal This section describes how to check the machine's radio wave status. When using in infrastructure mode, you can check the machine's radio wave status using the control panel.
  • Page 75: Network Settings Required To Use The Printer

    Network Settings Required to Use the Printer Network Settings Required to Use the Printer This section lists the network settings required for using the printer function. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the printer function with an Ethernet connection.
  • Page 76: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/Network Machine Name As required IEEE 802.1X Authentication for Interface Settings/Network...
  • Page 77 Network Settings Required to Use the Printer Menu User Tool Setting Requirements Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network NCP Delivery Protocol As required Interface Settings/Network NW Frame Type As required...
  • Page 78: Network Settings Required To Use E-Mail Function

    2. Connecting the Machine Network Settings Required to Use E-mail Function This section lists the network settings required for sending e-mail. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for sending e-mail with an Ethernet connection. For details about how to specify the settings, see "Interface Settings"...
  • Page 79: Wireless Lan

    Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer...
  • Page 80 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address Necessary Interface Settings/Network Machine IPv6 Address As required Interface Settings/Network IPv6 Gateway Address As required IPv6 Stateless Address Interface Settings/Network As required Autoconfiguration Interface Settings/Network...
  • Page 81 Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements File Transfer Administrator's E-mail Address As required File Transfer E-mail Communication Port As required Program / Change / Delete E- File Transfer As required mail Message File Transfer Scanner Resend Interval Time As required File Transfer...
  • Page 82: Network Settings Required To Use Scan To Folder Function

    2. Connecting the Machine Network Settings Required to Use Scan to Folder Function This section lists the network settings required for sending files. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for sending files with an Ethernet connection.
  • Page 83: Wireless Lan

    Network Settings Required to Use Scan to Folder Function Menu User Tool Setting Requirements Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet Default User Name / Password File Transfer As required (Send) File Transfer Scanner Resend Interval Time As required File Transfer...
  • Page 84 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication...
  • Page 85: Network Settings Required To Use The Network Delivery Scanner

    Network Settings Required to Use the Network Delivery Scanner Network Settings Required to Use the Network Delivery Scanner This section lists the network settings required for delivering data to the network. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for delivering data to the network with an Ethernet connection.
  • Page 86: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet File Transfer Delivery Option Necessary File Transfer Scanner Resend Interval Time As required File Transfer Number of Scanner Resends As required •...
  • Page 87 Network Settings Required to Use the Network Delivery Scanner Menu User Tool Setting Requirements Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication...
  • Page 88: Network Settings Required To Use Network Twain Scanner

    2. Connecting the Machine Network Settings Required to Use Network TWAIN Scanner This section lists the network settings required for using the TWAIN Scanner under the network environment. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the network TWAIN Scanner with an Ethernet connection.
  • Page 89: Wireless Lan

    Network Settings Required to Use Network TWAIN Scanner • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [LAN Type] is displayed when the wireless LAN interface board is installed. • When both Ethernet and wireless LAN are connected, the selected interface takes precedence. •...
  • Page 90 2. Connecting the Machine • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN are connected, the selected interface takes precedence. •...
  • Page 91: Network Settings Required To Use Document Server

    Network Settings Required to Use Document Server Network Settings Required to Use Document Server This section lists the settings required for using the Document Server function under the network environment. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the Document Server function with an Ethernet connection.
  • Page 92: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. •...
  • Page 93 Network Settings Required to Use Document Server Menu User Tool Setting Requirements Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/Wireless LAN Communication Mode Necessary Interface Settings/Wireless LAN SSID Setting As required...
  • Page 94: Using Utilities To Make Network Settings

    2. Connecting the Machine Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor and telnet. • These settings should be made by the administrator, or with the advice of the administrator. •...
  • Page 95 Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. [Network] [IPv6 Stateless Address Autoconfiguration] • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [DNS Configuration] [Auto-Obtain (DHCP)]...
  • Page 96 2. Connecting the Machine • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "IPv4" • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "IPv6"...
  • Page 97 Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. [Network] [NW Frame Type] [Ethernet 802.3] • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [NW Frame Type] [Ethernet SNAP]...
  • Page 98 2. Connecting the Machine • telnet: Cannot be used for specifying the setting. [Network] [Permit SSL / TLS Communication] [Ciphertext Priority] • Web Image Monitor: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [Network] [Permit SSL / TLS Communication] [Ciphertext / Cleartext]...
  • Page 99: File Transfer

    Using Utilities to Make Network Settings File Transfer This section describes how to make File Transfer settings using utilities. Change settings by using Web Image Monitor and telnet. [File Transfer] [Delivery Option] • Web Image Monitor: Cannot be used for specifying the setting. •...
  • Page 100 2. Connecting the Machine • telnet: Cannot be used for specifying the setting. [File Transfer] [E-mail Communication Port] • Web Image Monitor: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [File Transfer] [E-mail Reception Interval] •...
  • Page 101: Using A Printer Server

    3. Using a Printer Server This chapter describes how to configure the machine as a network printer. Preparing Printer Server This section explains how to configure the machine as a Windows network printer. The machine is configured to enable network clients to use it. •...
  • Page 102: Using Netware

    3. Using a Printer Server Using NetWare This section describes the setting procedure for network printers in the NetWare environment. In the NetWare environment, you can connect the machine as a "print server" or "remote printer". • IPv6 cannot be used on this function. •...
  • Page 103 Using NetWare • NDS Tree: To enable NDS mode, enter the name of the NDS tree you want to log in to. Use up to 32 alphanumeric characters. • NDS Context Name: To enable NDS mode, enter the print server context. Use up to 127 characters.
  • Page 104: Setting Up As A Print Server (Netware 4.X, 5/5.1, 6/6.5)

    3. Using a Printer Server Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5) Follow the procedure below to connect the machine as a print server using NetWare 4.x, NetWare 5/5.1, or NetWare 6 / 6.5. • When using the printer as a print server in NetWare 4.x, NetWare 5/5.1, or NetWare 6/6.5, set it to the NDS mode.
  • Page 105: Using Pure Ip In The Netware 5/5.1 Or 6/6.5 Environment

    Using NetWare Using Pure IP in the NetWare 5/5.1 or 6/6.5 Environment Follow the procedure below to connect the machine as a print server in a pure IP environment of NetWare 5/5.1 or NetWare 6/6.5. • When creating a queued print server in a pure IP environment of NetWare 5/5.1 or NetWare 6/6.5, create a print queue on the file server using NetWare Administrator.
  • Page 106 3. Using a Printer Server In the [Print Server Name] box, enter the print server name. Use the same print server name specified using Web Image Monitor. Select the [Define additional properties] check box, and then click [Create]. Click [Assignments], and then click [Add] in the [Assignments] area. In the [Available objects] box, click the queue you created, and then click [OK].
  • Page 107: Setting Up As A Remote Printer (Netware 3.X)

    Using NetWare • For details about login user names and passwords, see Security Reference, which is the administrator's manual. • p.111 "Using Web Image Monitor" Setting Up as a Remote Printer (NetWare 3.x) Follow the procedure below to use the machine as a remote printer under NetWare 3.x. Setting up using PCONSOLE Enter "PCONSOLE"...
  • Page 108 3. Using a Printer Server From [Print Server Configuration Menu], select [Queues Serviced By Printer]. Select the printer created. Press the [Insert] key to select a queue serviced by the printer. You can select several queues. Follow the instructions on the screen to make other necessary settings. Following these steps, check that the queues are assigned.
  • Page 109: Setting Up As A Remote Printer (Netware 4.X, 5/5.1, 6/6.5)

    Using NetWare • If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer. Use the [Network] dialog box of Windows to change the frame type of the computer. • For details about Web Image Monitor, see "Using Web Image Monitor". •...
  • Page 110 3. Using a Printer Server Click [Configuration], click [Parallel] in the [Printer type] list, and then click [Communication]. Click [Manual load] in the [Communication type] area, and then click [OK]. Check the settings, and then click [OK]. Set up the network connection to a print server. Select a context specified, and then click [Create] on the [Object] menu.
  • Page 111 Using NetWare In the menu area, click [Configuration]. Under "Network", click [NetWare]. Confirm the settings, and then click [OK]. Configuration is now complete. Wait several minutes before restarting Web Image Monitor. Click [Logout]. Quit Web Image Monitor. • If you cannot identify the printer you want to configure, check the printer name against the configuration page printed from the printer.
  • Page 112 3. Using a Printer Server...
  • Page 113: Monitoring And Configuring The Machine

    4. Monitoring and Configuring the Machine This chapter describes how to monitor and configure the machine. Using Web Image Monitor Using Web Image Monitor, you can check the machine status and change settings. Available operations The following operations can be remotely performed using Web Image Monitor from a client computer.
  • Page 114: Displaying Top Page

    4. Monitoring and Configuring the Machine • Display and operation problems can occur if you do not enable JavaScript and cookies, or if you are using a non-recommended Web Browser. • If you are using a proxy server, change the Web browser settings. Contact your administrator for information about the settings.
  • Page 115 Using Web Image Monitor • When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10". Start your Web browser. Enter "http://(machine's IP address or host name)/" in your Web browser's URL bar. Top Page of Web Image Monitor appears.
  • Page 116: When User Authentication Is Set

    4. Monitoring and Configuring the Machine Machine information in the work area is not automatically updated. Click [Refresh] at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen.
  • Page 117 Using Web Image Monitor CBB006 1. Home The [Status], [Device Info], [Counter], and [Inquiry] tab are displayed. Details of the tab menu are displayed on the work area. 2. Document Server Display files stored in the Document Server. 3. Printer: Print Jobs Allows you to display list of Sample Print, Locked Print, Hold Print, and Stored Print jobs.
  • Page 118: Access In The Administrator Mode

    4. Monitoring and Configuring the Machine 1. Home The [Status], [Device Info], [Counter], and [Inquiry] tab are displayed. Details of the tab menu are displayed on the work area. 2. Document Server Display files stored in the Document Server. 3. Printer: Print Jobs Allows you to display list of Locked Print, Sample Print, Hold Print, and Stored Print jobs.
  • Page 119 Using Web Image Monitor Home Status Menu Guest mode Administrator mode Reset Device None Modify Reset Printer Job None Modify Status Read Read Toner Read Read Input Tray Read Read Output Tray Read Read Device Info Menu Guest mode Administrator mode Functions Read Read...
  • Page 120 4. Monitoring and Configuring the Machine Menu Guest mode Administrator mode Machine Maintenance/Repair Read Read Sales Representative Read Read Consumables Read Read Document Server Document Server Guest mode Administrator mode Read/Modify Read/Modify Printer: Print Jobs Print Job List Guest mode Administrator mode Read/Modify Read/Modify...
  • Page 121 Using Web Image Monitor Menu Guest mode Administrator mode Print Job History Read/Modify Read/Modify Scanner Remote Send History Read/Modify Read/Modify Address Book Menu Guest mode Administrator mode Address Book None Read/Modify Configuration Device Settings Menu Guest mode Administrator mode System Read Read/Modify Paper...
  • Page 122 4. Monitoring and Configuring the Machine Menu Guest mode Administrator mode LDAP Server None Read/Modify Firmware Update None Read/Modify Program/Change Realm None Read/Modify Printer Menu Guest mode Administrator mode Basic Settings Read Read/Modify Tray Parameters (PS) None Read/Modify PDF Temporary Password Modify None PDF Group Password *1...
  • Page 123 Using Web Image Monitor Menu Guest mode Administrator mode Wireless LAN Settings Read Read/Modify Network Menu Guest mode Administrator mode IPv4 Read Read/Modify IPv6 Read Read/Modify NetWare Read Read/Modify Read Read/Modify SNMP None Read/Modify SNMPv3 None Read/Modify SSDP None Read/Modify Bonjour Read Read/Modify...
  • Page 124 4. Monitoring and Configuring the Machine Menu Guest mode Administrator mode S/MIME None Read/Modify RC Gate Menu Guest mode Administrator mode Setup RC Gate None Read/Modify Update RC Gate Firmware None Read RC Gate Proxy Server None Read/Modify Webpage Menu Guest mode Administrator mode Webpage...
  • Page 125: Displaying Web Image Monitor Help

    Using Web Image Monitor • Some items are not displayed depending on the security settings. Displaying Web Image Monitor Help When using Help for the first time, clicking the Help button ( ) makes the following screen appear, in which you can view Help in two different ways, as shown below: Viewing Help on our Web site You can view the latest Help information.
  • Page 126 4. Monitoring and Configuring the Machine Click [OK]. • If you save the Help files on your hard disk, you must access them directly - you cannot link to them using the Help button (...
  • Page 127: When Using Ipp With Smartdevicemonitor For Client

    When Using IPP with SmartDeviceMonitor for Client When Using IPP with SmartDeviceMonitor for Client When using IPP with SmartDeviceMonitor for Client, note the following: To use this function, you must first download SmartDeviceMonitor for Client from the manufacturer's Web site and install it on your computer. Contact your local dealer for information on downloading SmartDeviceMonitor for Client.
  • Page 128: Machine Status Notification By E-Mail

    4. Monitoring and Configuring the Machine Machine Status Notification by E-Mail Whenever a paper tray becomes empty or paper is jammed, an e-mail alert is issued to the registered addresses to notify the machine status. For this notification, you can make the e-mail notification settings. Notification timing and e-mail content can be set.
  • Page 129: Setting The Account For E-Mail Notification

    Machine Status Notification by E-Mail Under "Device Settings", click [E-mail]. Make the following settings: • Items in the Reception column: Make the necessary settings for sending and receiving e-mail. • Items in the SMTP column: Configure the SMTP server. Check your mailing environment, and then specify the necessary items.
  • Page 130: Mail Authentication

    4. Monitoring and Configuring the Machine Make the following settings in E-mail Notification Account: • E-mail Notification E-mail Address: Enter the address using alphanumeric characters. This will appear as the sender (From:) of the e-mail notification. Send requests for e-mail notification to this address.
  • Page 131: Auto E-Mail Notification

    Machine Status Notification by E-Mail [Inactive]: If the authentication method is PLAIN or LOGIN. 5. Click [OK]. 6. Click [Logout]. 7. Quit Web Image Monitor. POP before SMTP Authentication Select whether to log in to the POP3 server before sending e-mail. 1.
  • Page 132: On-Demand E-Mail Notification

    4. Monitoring and Configuring the Machine Click [Logout]. Quit Web Image Monitor. • For details about Web Image Monitor, see "Using Web Image Monitor". • For details about the settings, see Web Image Monitor Help. • p.111 "Using Web Image Monitor" On-demand E-mail Notification Log in to Web Image Monitor in administrator mode.
  • Page 133: Format Of On-Demand E-Mail Messages

    Machine Status Notification by E-Mail Format of On-demand E-mail Messages To use "on-demand e-mail notification", you need to send a request e-mail with a particular format to the machine. Using your mail software, enter the following: Format of the request e-mail Item Description Enter the specified e-mail address in "E-mail Notification E-mail...
  • Page 134: Remote Maintenance Using Telnet

    4. Monitoring and Configuring the Machine Remote Maintenance Using telnet • Remote Maintenance should be protected so that access is allowed to administrators only. • The password is the same as the one of Web Image Monitor administrator. When the password is changed using "...
  • Page 135: Access

    Remote Maintenance Using telnet access Use the "access" command to view and configure access control. You can also specify two or more access ranges. View settings msh> access IPv4 configuration display msh> access "ID" range IPv6 configuration display msh> access "ID" range6 IPv6 access mask configuration display msh>...
  • Page 136: Authfree

    4. Monitoring and Configuring the Machine • For IPv4 and IPv6, you can select an ID number between 1 and 5. • IPv6 can register and select the range and the mask for each access ranges. • IPv6 mask ranges between 1 - 128 can be selected. •...
  • Page 137: Bonjour

    Remote Maintenance Using telnet msh> autonet {on|off} • {on} means "active" and {off} means "inactive". Current interface priority configuration display msh> autonet priority Interface priority configuration msh> autonet priority "interface_name" • You can give interface's AutoNet parameter priority. • Priority settings are available when multiple interfaces are installed. •...
  • Page 138 4. Monitoring and Configuring the Machine Setting order of priority for each protocol • msh> bonjour diprint [0-99] • msh> bonjour lpr [0-99] • msh> bonjour ipp [0-99] You can specify the order of priority for "diprint", "lpr", and "ipp". Smaller numbers indicate higher priority.
  • Page 139: Devicename

    Remote Maintenance Using telnet devicename Use the "devicename" command to display and change the printer name. View settings msh> devicename Printer name configuration msh> devicename name "string" • Enter a printer name using up to 31 alphanumeric characters. • Set single names for each printer. Printer name initialization msh>...
  • Page 140: Dhcp6

    4. Monitoring and Configuring the Machine • You can select which interface has DHCP parameter priority. • Priority settings are available when multiple interfaces are installed. DNS server address selection msh> dhcp dnsaddr {dhcp|static} • Specify whether to obtain the DNS server address from the DHCP server or use the address set by a user.
  • Page 141: Diprint

    Remote Maintenance Using telnet diprint The direct printing port enables direct printing from a network-connected computer. Use the "diprint" command to change direct printing port settings. View settings The following command displays the current direct printing port settings: msh> diprint Example output: port 9100 timeout=300(sec)
  • Page 142 4. Monitoring and Configuring the Machine msh> dns IPv4 DNS server configuration The following command enables or disables the IPv4 DNS server address: msh> dns "ID" server "server address" The following command displays a configuration using the IP address 192.168.15.16 on a DNS 1 server: msh>...
  • Page 143: Domainname

    Remote Maintenance Using telnet • {on} means "active" and {off} means "inactive". • The CNAME registered is the default name beginning with rnp. CNAME cannot be changed. A records registration msh> dns arecord {dhcp|own} • dhcp: You can specify the method of registering an A record when the dynamic DNS function is enabled and DHCP is used.
  • Page 144: Etherauth

    4. Monitoring and Configuring the Machine Interface Interface set ether Ethernet interface wlan IEEE 802.11 interface Deleting the Domain Name msh> domainname "interface_name" clear name etherauth Use the "etherauth" command to display or modify the authentication related parameters for Ethernet. View settings msh>...
  • Page 145: Hostname

    Remote Maintenance Using telnet Command list display msh> help Display of procedure for using commands msh> help "command_name" hostname Use the "hostname" command to change the printer name. View settings msh> hostname IPv4 Configuration msh> hostname "interface_name" "printer_name" • Enter the printer name using up to 63 alphanumeric characters. •...
  • Page 146 4. Monitoring and Configuring the Machine • wlan can be specified only when the IEEE 802.11 interface is installed. Interface name Interface configured ether Ethernet Interface wlan IEEE 802.11 Interface The following explains how to configure an IPv4 address 192.168.15.16 on the Ethernet interface. msh>...
  • Page 147: Info

    Remote Maintenance Using telnet info Use the "info" command to display the printer information such as paper tray, output tray, and printer language. Printer information display msh> info • p.174 "Getting Machine Information over the Network" Use the "ipp" command to view and configure the IPP settings. View settings The following command displays the current IPP settings: msh>...
  • Page 148: Ipsec

    4. Monitoring and Configuring the Machine ipsec Use the "ipsec" command to view and configure the IPsec settings. View settings The following command displays the current IPsec settings: msh> ipsec • For details about displayed contents, consult your administrator. ipv6 Use the "ipv6"...
  • Page 149: Netware

    Remote Maintenance Using telnet View Setting msh> lpr Checking host name when deleting the job msh> lpr chkhost {on|off} • The default is "on". If "on" is selected, you can delete print jobs only from the IP address of the host that sent the print job. If LPR is disabled, you can also delete print jobs sent from IP addresses other than that of the host.
  • Page 150: Passwd

    4. Monitoring and Configuring the Machine Remote printer mode msh> netware mode rprinter msh> netware mode rp NDS context name msh> netware context "character string" SAP interval msh> netware "sap_interval[0-3600]" It can be entered between 0 and 3600 seconds. Setting login mode for file server msh>...
  • Page 151: Pathmtu

    Remote Maintenance Using telnet Changing the password of the administrators using the Supervisor msh> passwd {Administrator ID} • Enter the new password. • Renter the new password to confirm it. • Be sure not to forget or lose the password. •...
  • Page 152: Route

    4. Monitoring and Configuring the Machine route Use the "route" command to view and control the routing table. Specified route information display msh> route get "destination" • Specify the IPv4 address to destination. "0.0.0.0" cannot be specified as the destination address. Enabling/disabling specified IPv4 destination msh>...
  • Page 153: Set

    Remote Maintenance Using telnet • Specify the IPv6 address to destination and gateway. Display information about a specified IPv6 route information msh> route get6 "destination" • Specify the IPv6 address to destination and gateway. Enabling/disabling a specified IPv6 destination msh> route active6 "destination" "prefixlen[1-128]" {on|off} Route initialization msh>...
  • Page 154 4. Monitoring and Configuring the Machine msh> set rsh6 msh> set diprint msh> set diprint6 msh> set web msh> set snmp msh> set ssl msh> set ssl6 msh> set nrs msh> set rfu msh> set rfu6 msh> set ipp msh> set ipp6 msh>...
  • Page 155 Remote Maintenance Using telnet • If you disable IPv6, you cannot use remote access after logging out. If you did this by mistake, you can use the control panel to enable remote access via IPv6. • Disabling IPv6 also disables lpr6, ftp6, rsh6, diprint6, ssl6, ipp6, http6, bonjour6, wsdev6, and sftp6.
  • Page 156: Show

    4. Monitoring and Configuring the Machine msh> set sftp {up|down} msh> set sftp6 {up|down} msh> set wsdev {up|down} msh> set wsdev6 {up|down} • If "wsdev" and "wsdev6" are enabled simultaneously, both appear as "up" on the protocol information display, but both use IPv4 for WSD (Device) and WSD (Printer). msh>...
  • Page 157: Snmp

    Remote Maintenance Using telnet • Names beginning with "RNP" or "rnp" cannot be entered. Working group name settings msh> smb group "work group name" • Set workgroup name using up to 15 characters. Comment settings msh> smb comment "comment" • Set comment using up to 31 characters. Notify print job completion msh>...
  • Page 158 4. Monitoring and Configuring the Machine IPv4 address:0.0.0.0 IPv6 address::: IPX address:00000000:000000000000 Access type:read-write Effective Protocol:IPv4/IPv6/IPX • If "-p" is added, you can view settings one by one. • To display the current community, specify its registration number. Display msh> snmp ? Community name configuration msh>...
  • Page 159 Remote Maintenance Using telnet • All protocols cannot be turned off concurrently. Configuration of protocol for each registration number "IPX" is shown only when the NetWare is installed. msh> snmp "number" active {ipv4|ipv6|ipx} {on|off} • To change the protocol of access settings, use the following command. However, if you have disabled a protocol with the above command, activating it here has no effect.
  • Page 160 4. Monitoring and Configuring the Machine • Specify "on" to enable, and "off" to disable. Remote configuration authorization configuration msh> snmp remote {on|off} • Specify "on" to enable, and "off" to disable the SNMP v1v2 setting. SNMP v3 TRAP configuration display msh>...
  • Page 161: Sntp

    Remote Maintenance Using telnet sntp The printer clock can be synchronized with a NTP server clock using Simple Network Time Protocol (SNTP). Use the "sntp" command to change the SNTP settings. View settings msh> sntp NTP IPv4 server address configuration You can specify the IPv4 address of the NTP server.
  • Page 162: Ssdp

    4. Monitoring and Configuring the Machine View settings The Job Spool setting appears. msh> spoolsw Job Spool setting msh> spoolsw spool {on|off} • Specify "on" to enable Job Spool, or "off" to disable it. Resetting Job spool setting msh> spoolsw clear job {on|off} •...
  • Page 163: Status

    Remote Maintenance Using telnet View settings msh> ssh Data compression communication settings msh> ssh compression {on|off} The default is "on". SSH/SFTP communication port setting msh> ssh port [22, 1024-65535] The default is 22. SSH/SFTP communication timeout setting msh> ssh timeout [0-65535] The default is 300.
  • Page 164: Syslog

    4. Monitoring and Configuring the Machine syslog Use the "syslog" command to display the information stored in the printer's system log. View message msh> syslog • p.186 "Message List" upnp Use the "upnp" command to display and configure the universal plug and play. Public URL display msh>...
  • Page 165: Wiconfig

    Remote Maintenance Using telnet Resetting URL names registered as link destinations msh> web "ID" clear name Specify "1" or "2" for ID as the number corresponding to the link name. Help URL configuration You can set URLs linked by clicking "?" on Web Image Monitor. msh>...
  • Page 166 4. Monitoring and Configuring the Machine Parameter Value configured channel frequency "channel no." In 802.11 ad hoc mode, you can select a channel between 1 and 13, or 36, 40, 44, or Be sure to set the same channel for all ports that will transmit and receive data.
  • Page 167 Remote Maintenance Using telnet Parameter Value configured keyphrase "phrase" val [1|2|3|4] You can specify the WEP key by entering in ASCII. With a 64-bit WEP, you can use 5 digit hexadecimals. With a 128-bit WEP, you can use 13 digit hexadecimals. Up to four WEP keys can be registered.
  • Page 168 4. Monitoring and Configuring the Machine Parameter Value configured wpaauth {wpapsk|wpa|wpa2psk|wpa2} You can specify the WPA authentication mode when using WPA encryption. wpapsk: WPA-PSK authentication (default) wpa: WPA authentication wpa2psk: WPA2-PSK authentication wpa2: WPA2 authentication psk "character string" You can specify the Pre-Shared key. Usable characters: ASCII 0x20-0x7e (8 to 63 bytes).
  • Page 169 Remote Maintenance Using telnet Parameter Value configured username2 "character string" You can specify the phase 2 username for EAP- TTLS/PEAP phase 2 authentication. Usable characters: ASCII 0x20-0x7e (31 bytes). The default is blank. domain "character string" You can specify the login domain name for the Radius server.
  • Page 170: Wins

    4. Monitoring and Configuring the Machine Parameter Value configured miccheck {on|off} You can enable or disable the MIC check function. The default setting is "On" (enabled). If you specify "Off", you cannot perform MIC checks. We recommend you specify "On" for the MIC check function when using this machine.
  • Page 171: Wsmfp

    Remote Maintenance Using telnet NBT (NetBIOS over TCP/IP) scope ID selection You can specify the NBT scope ID. msh> wins "interface_name" scope "ScopeID" • The scope ID can be entered using up to 31 alphanumeric characters. • Be sure to specify the interface. •...
  • Page 172: 8021X

    4. Monitoring and Configuring the Machine • The default is 900 seconds. Comment initialization msh> wsmfp clear comments Location initialization msh> wsmfp clear location Presentation URL initialization msh> wsmfp clear url 8021x Use "8021x" command to display IEEE 802.1x related information. View settings msh>...
  • Page 173 Remote Maintenance Using telnet Parameter Value configured Username "character string" You can specify the login user name for the Radius server. Usable characters: ASCII 0x20-0x7e (31 bytes). The default is blank. Username2 "character string" You can specify the phase 2 username for EAP- TTLS/PEAP phase 2 authentication.
  • Page 174 4. Monitoring and Configuring the Machine Parameter Value configured claer {a each command|all} Returns the selected setting to its default value. If you specify "all", all settings will be restored to their default values. However, IEEE 802.1x Auth. status (enable or disable) for Ethernet and wireless LAN will not be initialized.
  • Page 175: Snmp

    SNMP SNMP Using the SNMP manager, you can get information about the machine. The SNMP agent operating on UDP and IPX is incorporated into the built-in Ethernet board and optional IEEE 802.11 interface unit of this machine. This machine also supports SNMPv3, which increases user authentication, data encryption, and access control security.
  • Page 176: Getting Machine Information Over The Network

    4. Monitoring and Configuring the Machine Getting Machine Information over the Network This section explains details of each item displayed in the machine status and information. Current Machine Status This section explains how you can check the machine's status and the items displayed. Depending on the options installed on the machine, some items might not be displayed.
  • Page 177 Getting Machine Information over the Network Messages Description Error: USB Interface An error has occurred in the USB interface. Error: Wireless Card Wireless card is not inserted during start up, or the IEEE 802.11 interface unit or the wireless card is taken out after start up.
  • Page 178: Printer Configuration

    4. Monitoring and Configuring the Machine Messages Description No Paper: Tray 1 There is no paper in tray 1. No Paper: Tray 2 There is no paper in tray 2. No Paper: Tray 3 There is no paper in tray 3. Not Detected: Input Tray The paper feed tray is not correctly set.
  • Page 179 Getting Machine Information over the Network This section explains the checking procedure for input/output tray and printer language. • UNIX: Use the "info" command and the "rsh", "rcp", "ftp", and "sftp" commands. "rsh" and "rcp" cannot be used in a Windows environment. •...
  • Page 180 4. Monitoring and Configuring the Machine • For details about UNIX commands and parameters, see UNIX Supplement.
  • Page 181: Understanding The Displayed Information

    Understanding the Displayed Information Understanding the Displayed Information This section explains how to read status information returned by the network interface board. Print Job Information Use the following command to display print job information: • UNIX: Use the "stat" parameter and the "rsh", "rcp", "ftp", and "sftp" commands. "rsh" and "rcp" cannot be used in a Windows environment.
  • Page 182: Configuring The Network Interface Board

    4. Monitoring and Configuring the Machine Item Description Print request ID. User Print request user name. Page Number of pages printed Result Print Request Result Communication Result • OK Print was completed normally. However, the print result may not be as required due to printer problems.
  • Page 183 Understanding the Displayed Information IPv4, IPv6, IPsec, NetWare, SMB Device Up/Down The following devices are displayed ("Up" indicates enabled; "Down", indicates disabled):. Ethernet interface Displays the Ethernet speed. Syslog priority "LOG_INFO" is displayed. NVRAM version Displays the NVRAM version. Device name Displays the device name.
  • Page 184 4. Monitoring and Configuring the Machine • Host name • DNS Domain • Access Control IPv4: Access Entry [1] - [5] IPv6: Access Entry [1] - [5] • SNTP Server • Time Zone • SNTP Server polling time • SYSLOG server •...
  • Page 185 Understanding the Displayed Information • Computer name • Comment • Share name [1] • Protocol Wireless LAN The following items are displayed: Host name, Communication Mode, SSID, Channel, Security, WEP Authentication, WEP Encryption key number, WEP Encryption keys [1] - [4], WPA Encryption, WPA Authentication, Pre-Shared Key, User name, Domain name, EAP Type, Password, Phase 2 user name, Phase 2 Method TTLS, Phase 2 Method PEAP, Server cert., Intermediate CA, Server ID, Sub domain, Mic check Ethernet...
  • Page 186 4. Monitoring and Configuring the Machine UPnP The following item is displayed: Bonjour The following items are displayed: Computer Name (cname), Local Hostname (ether), Local Hostname (wlan), Location, Priority (diprint), Priority (lpr), Priority (ipp), IP TTL, LinkLocal Route for Multi I/F, IPP Port SNMP The following items are displayed: SNMPv1v2, SNMPv3, protocol, v1Trap, v2Trap, v3Trap, SNMPv1v2 Remote Setting, SNMPv3...
  • Page 187 Understanding the Displayed Information User name, Domain name, EAP Type, Password, Phase 2 user name, Phase 2 Method TTLS, Phase 2 Method PEAP, Server cert, Intermediate CA, Server ID, Sub domain Shell mode "User mode" is displayed.
  • Page 188: Message List

    4. Monitoring and Configuring the Machine Message List This is a list of messages that appear in the machine's system log. The system log can be viewed using the "syslog" command. System Log Information Use the following command to display the system log information: •...
  • Page 189 Message List Message Problem and solutions add_sess_IPv6: community <community name> The same community name already exists. Use already defined. another community name. add_sess_IPX: bad trap addr: <IPX address> The IPX address (00:00:00:00:00:00) is community <community name> unavailable when the community access type is TRAP.
  • Page 190 4. Monitoring and Configuring the Machine Message Problem and solutions cipher suite mismatch The uni-cast / multi-cast suite (TKIP/AES/WEP) of the access point is different from the suite used by the supplicant. client EAP method rejected The authentication mode of the access point is different with the authentication mode of the supplicant.
  • Page 191 Message List Message Problem and solutions DHCP lease time expired. The DHCP lease time has expired. Perform the DHCP discover again. The IP address you have been using is no longer available. DHCP server not found. The DHCP server was not found. Make sure that the DHCP is on the network.
  • Page 192 4. Monitoring and Configuring the Machine Message Problem and solutions IEEE 802.11 <communication mode> mode Displays the IEEE 802.11 communication mode. (IKE phase-1) mismatched authentication type: This machine's <authentication type 1> in IKE phase local=<authentication type 1> 1 does not match the communicating host's remote=<authentication type 2>...
  • Page 193 Message List Message Problem and solutions < Interface > started with IP: < IP address > IP address (IPv4 or IPv6 address) has been set for the interface and is operating. < Interface >: Subnet overlap. The same IP address (IPv4, or IPv6 address) and the subnet mask is used with other device.
  • Page 194 4. Monitoring and Configuring the Machine Message Problem and solutions Name registration success in Broadcast Name registration by <NetBIOS Name> name=<NetBIOS name> broadcast was successful. Name registration success. WINS server=<WINS Name registration of <NetBIOS Name> to <WINS server address> NetBIOS Name=<NetBIOS server address>...
  • Page 195 Message List Message Problem and solutions Printer <printer name> has no queue The print queue is not assigned to the printer when the print server was online. Assign the print queue to the printer using NetWare administrator account, and then restart the printer. Print queue <print queue name>...
  • Page 196 4. Monitoring and Configuring the Machine Message Problem and solutions shutdown signal received. network service The smbd service has started. rebooting... smbd start. (NetBIOS) SMBD (Server Message Block Daemon) has been started. SMTPC: failed to get smtp server ip-address. The SMTP server IP address could not be obtained. This could be because: •...
  • Page 197 Message List Message Problem and solutions SMTPC: failed to connect smtp server. Connection to the SMTP server failed. This could be because no connection to the network has been established, or the network configuration is incorrect, so there is no response from the SMTP server, or the specified SMTP server name is incorrect, or the specified SMTP server IP address could not be found in the DNS server, or a server...
  • Page 198 4. Monitoring and Configuring the Machine Message Problem and solutions supplicant unbound The supplicant is not connected to the unbound access point. terminated. The IKE service has stopped because no configurations for manual SA or IKE exist. terminated. The bonjour (rendezvous) function is disabled. There is problem in dhcp server operation.
  • Page 199 Message List Message Problem and solutions write error occurred. (diskfull) A "diskfull" error occurred while the machine was writing to the spool file. Wait for the current print job to finish, When it finishes, more HDD space will be available. Only pages that were spooled when the error occurred will be printed.
  • Page 200 4. Monitoring and Configuring the Machine...
  • Page 201: Registering Addresses And Users For Scanner Functions

    5. Registering Addresses and Users for Scanner Functions This chapter describes how to register destinations and users in the Address Book. For details on how to access System Settings, see "Accessing User Tools". Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily.
  • Page 202 5. Registering Addresses and Users for Scanner Functions Protection You can set protection codes to stop sender's name from being used or folders from being accessed without authorization. E-mail You can register e-mail destinations in the Address Book. Folder You can register the protocol, path name and server name. •...
  • Page 203 Address Book • FTP • NCP Add to Group You can put registered e-mail and folder destinations into a group for easier management. • You can also use Web Image Monitor to register names in the Address Book. • For details about using Web Image Monitor, see Web Image Monitor Help.
  • Page 204: Managing Names In The Address Book

    5. Registering Addresses and Users for Scanner Functions • Using Web Image Monitor, you can backup Address Book data. We recommend backing up data when using the Address Book. For details, see Web Image Monitor Help. • p.45 "Administrator Tools" Managing names in the Address Book By registering a name and key display beforehand, you can specify e-mail and folder destinations simply by selecting the name key.
  • Page 205: Preventing Unauthorized User Access To Shared Folders From The Machine

    Address Book Preventing unauthorized user access to shared folders from the machine After registering a protection code, you can specify the object of protection to prevent an e-mail destination from being used without permission. You can prevent unauthorized access to registered folders. •...
  • Page 206: Registering Names

    5. Registering Addresses and Users for Scanner Functions Registering Names Register user information including their names. The user name is useful for selecting a destination when sending e-mail. You can also use it as a folder destination. You can register up to 2000 names. Registering Names This section describes how to register names.
  • Page 207: Changing A Registered Name

    Registering Names Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title.
  • Page 208: Deleting A Registered Name

    5. Registering Addresses and Users for Scanner Functions Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the registered name you want to change. Press the name key, or enter the registered number using the number keys. To change the name or key display, press [Change] under "Name"...
  • Page 209 Registering Names Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 210: Authentication Information

    5. Registering Addresses and Users for Scanner Functions Authentication Information Following describes the procedure for authenticating a user code. • The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code become invalid. Register user codes to limit users to the following functions and check their use of each function: •...
  • Page 211 Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Press the name whose code is to be registered, or enter the registered number using the number key. You can search by the registered name, folder name, or e-mail address. Press [Auth.
  • Page 212: Changing A User Code

    5. Registering Addresses and Users for Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • You can enter a one-to eight-digit user code. • To register the name, see "Registering Names". • p.204 "Registering Names" Changing a User Code This section describes how to change a user code.
  • Page 213: Deleting A User Code

    Authentication Information Press [Change], and then enter the new user code using the number keys. Press the [ ] key. To change the available functions, press [ Next] twice. Press the key to select the functions to enable them. Press the key to highlight it, and then the function is enabled. To cancel a selection, press the highlighted key.
  • Page 214 5. Registering Addresses and Users for Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Press [Program / Change]. Select the name whose code is to be deleted. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address.
  • Page 215: Displaying The Counter For Each User

    Authentication Information Displaying the Counter for Each User This section describes how to display the counter for each user. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the function usage you want to print from [Print Counter] or [Scanner Counter]. Counters for individual function usage under each user code appear.
  • Page 216: Printing The Counter For All Users

    5. Registering Addresses and Users for Scanner Functions Select a user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page. Press [Print Counter List] under "Per User". Enter the user code, and then press the [ ] key if the user code is registered.
  • Page 217: Clearing The Number Of Prints

    Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Press [Print Counter List] under "All Users". Enter the user code, and then press the [ ] key if the user code is registered. Select the function usage you want to print from [Copier Counter], [Printer Counter], [Scanner Counter], and [Total Prints].
  • Page 218 5. Registering Addresses and Users for Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the user code to clear. To clear the number of prints made under a user code, select the user code from the left side of the display.
  • Page 219: E-Mail Destination

    E-mail Destination E-mail Destination This section describes the procedure for registering, changing, and deleting E-mail Destination. Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan files from scanner function by e-mail. •...
  • Page 220: Changing An E-Mail Destination

    5. Registering Addresses and Users for Scanner Functions Press [Change]. Enter the e-mail address. Press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • You can enter up to 128 characters for the e-mail address. • To register the name, see "Registering Names". •...
  • Page 221 E-mail Destination Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to change. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address.
  • Page 222: Deleting An E-Mail Destination

    5. Registering Addresses and Users for Scanner Functions Deleting an E-mail Destination This section describes how to delete an e-mail destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to delete.
  • Page 223: Registering Folders

    Registering Folders Registering Folders This section describes the procedure for registering, changing, and deleting folders. By registering a shared folder, you can send scan files to it directly. There are three types of protocol you can use: • SMB For sending files to shared folders on Windows and Mac OS X. •...
  • Page 224 5. Registering Addresses and Users for Scanner Functions Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. Press the name key, or enter the registered number using the number keys. Press [Auth.
  • Page 225 Registering Folders For details about how to specify the path manually, see "Locating the SMB folder manually". For details about how to specify the path using Browse Network, see "Locating the SMB folder using Browse Network". Press [Connection Test] to check the path is set correctly. Press [Exit].
  • Page 226 5. Registering Addresses and Users for Scanner Functions Press [OK]. If the format of the entered path is not correct, a message appears. Press [Exit], and then enter the path again. • Enter the path using this format: "\\ServerName\Share- Name\PathName". •...
  • Page 227: Changing An Smb Folder

    Registering Folders Enter the login user name, and then press [OK]. Enter the login user name specified for folder authentication. Enter the password, and then press [OK]. The path to the selected folder appears. If a message appears, press [Exit], and then enter the login user name and password again. Changing an SMB Folder This section describes how to change settings of the registered SMB folder.
  • Page 228: Deleting An Smb Registered Folder

    5. Registering Addresses and Users for Scanner Functions Press the [User Tools/Counter] key. • To change the name, key display and title, see "Registering Names". • p.204 "Registering Names" Changing the protocol This section describes how to change the protocol. Press [FTP] or [NCP].
  • Page 229: Registering An Ftp Folder

    Registering Folders Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address.
  • Page 230 5. Registering Addresses and Users for Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. You can search by the registered name, folder name, or e-mail address. Press [Folder].
  • Page 231 Registering Folders Enter the port number using the number keys, and then press the [ ] key. You can enter 1 to 65535. Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [Auth.
  • Page 232: Changing An Ftp Folder

    5. Registering Addresses and Users for Scanner Functions Changing an FTP Folder This section describes how to change the registered FTP folder. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to change.
  • Page 233: Deleting An Ftp Folder

    Registering Folders Press [SMB] or [NCP]. A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. Enter each item again. Changing the registered FTP folder This section describes how to change the registered FTP folder. Press [Change] under "Port Number".
  • Page 234: Registering An Ncp Folder

    5. Registering Addresses and Users for Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address.
  • Page 235 Registering Folders Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Press the name you want to register or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address. Press [Folder].
  • Page 236 5. Registering Addresses and Users for Scanner Functions Press [Exit]. If the connection test fails, check the settings, and then try again. Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth. Info] on the right side of "Folder Authentication". When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified in "Default User Name / Password (Send)"...
  • Page 237 Registering Folders Locating the NCP folder manually This section describes how to locate the NCP folder manually. Press [Change] under "Path". Enter the path where the folder is located. Press [OK]. Press [Connection Test] to check the path is set correctly. Press [Exit].
  • Page 238: Changing An Ncp Registered Folder

    5. Registering Addresses and Users for Scanner Functions Changing an NCP Registered Folder This section describes how to change the registered NCP folder. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the user of the registered folder you want to change.
  • Page 239: Deleting An Ncp Folder

    Registering Folders • p.204 "Registering Names" Changing the protocol This section describes how to change the protocol. Press [SMB] or [FTP]. A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. Enter each item again. Deleting an NCP Folder This section describes how to delete the registered NCP folder.
  • Page 240 5. Registering Addresses and Users for Scanner Functions Select a user of the folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address. Press [Folder].
  • Page 241: Registering Names To A Group

    Registering Names to a Group Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management of e-mail addresses and folders for each group. To add names to a group, the groups must be registered beforehand. •...
  • Page 242: Registering Names To A Group

    5. Registering Addresses and Users for Scanner Functions Press [Change] under "Group Name". Enter the group name, and then press [OK]. The Key Display name is set automatically. Press the title key under "Select Title", if necessary. The keys you can select are as follows: •...
  • Page 243 Registering Names to a Group Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name to register in a group. Press the name key, or enter the registered number using the number keys. You can search by the registered name, folder name, or e-mail address.
  • Page 244: Adding A Group To Another Group

    5. Registering Addresses and Users for Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Adding a Group to Another Group This section describes how to add a group to another group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools].
  • Page 245: Displaying Names Registered In A Group

    Registering Names to a Group Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Displaying Names Registered in a Group This section describes how to display names registered in a group. You can check the names or groups registered in each group. Press the [User Tools/Counter] key.
  • Page 246: Removing A Name From A Group

    5. Registering Addresses and Users for Scanner Functions Press [Exit]. Press the [User Tools/Counter] key. Removing a Name from a Group This section describes how to remove a name from a group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools].
  • Page 247: Deleting A Group Within Another Group

    Registering Names to a Group Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Deleting a Group Within Another Group This section describes how to delete a group within another group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group].
  • Page 248: Changing A Group Name

    5. Registering Addresses and Users for Scanner Functions Select the group that you want to delete from. The group key is deselected and the group is deleted from it. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Changing a Group Name This section describes how to change a group name.
  • Page 249: Deleting A Group

    Registering Names to a Group Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to change. You can search by the registered name, folder name, or e-mail address. To change the group name and key display, press [Change] under "Group Name"...
  • Page 250 5. Registering Addresses and Users for Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Press [Delete]. Press a group key you want to delete. You can search by the registered name, folder name, or e-mail address. Press [Yes].
  • Page 251: Registering A Protection Code

    Registering a Protection Code Registering a Protection Code This section describes how to register a Protection Code. You can stop sender's names or folders being accessed by setting a protection code. You can use this function to protect the following: •...
  • Page 252: Registering A Protection Code To A Group User

    5. Registering Addresses and Users for Scanner Functions Press [Protection]. Press [Destination] or [Sender] under "Use Name as". Both [Destination] and [Sender] can be selected at the same time. Press [Folder Destination] under "Protection Object". Press [Change] under "Protection Code". Enter a protection code using the number keys, and then press the [ ] key.
  • Page 253 Registering a Protection Code Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to register or enter the registered number using the number keys.
  • Page 254: Registering Smtp And Ldap Authentication

    5. Registering Addresses and Users for Scanner Functions Registering SMTP and LDAP Authentication This section describes how to register SMTP and LDAP Authentication. SMTP Authentication This section describes how to register SMTP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an SMTP server.
  • Page 255: Ldap Authentication

    Registering SMTP and LDAP Authentication Press [Change] under "Login User Name". Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [OK].
  • Page 256 5. Registering Addresses and Users for Scanner Functions • When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you have specified in Program / Change LDAP Server of Administrator Tools settings applies. For details, see "Programming the LDAP server".
  • Page 257 Registering SMTP and LDAP Authentication Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To register the name, see "Registering Names". • You can enter up to 128 characters for the user name. • You can enter up to 128 characters for the password. •...
  • Page 258 5. Registering Addresses and Users for Scanner Functions...
  • Page 259: Printing Files Directly From Windows

    6. Special Operations under Windows This chapter describes how to print files directly from Windows. Printing Files Directly from Windows You can print files directly using Windows commands (lpr, ftp, sftp). For example, you can print PostScript files for PostScript 3. Setup Follow the procedure below to make network environment settings.
  • Page 260: Printing Commands

    6. Special Operations under Windows In other cases Add the IP address and host name of the network printer to the hosts file on the computer used for printing. Methods of addition vary depending on operating systems. Open the hosts file using memo pad files, for instance. On computers running Windows 2000, the hosts file can be found in the following folder: \WINNT\SYSTEM32\DRIVERS\ETC\HOSTS On computers running Windows XP/Vista/7 and Windows Server 2003/2003 R2/2008/2008...
  • Page 261 Printing Files Directly from Windows • If the message "print requests full" appears, no print jobs can be accepted. Try again when sessions end. For each command, the amount of possible sessions is indicated as follows: • lpr: 5 (When the spool printing function is available: 10) •...
  • Page 262 6. Special Operations under Windows When user authentication is set, enter a login user name and password. When printing a binary file, set the file mode to binary. ftp> bin When printing a binary file in ASCII mode, print may not come out correctly. Specify files to be printed.
  • Page 263: When Using Windows Terminal Service/Citrix Presentation Server/Citrix Xenapp

    7. Appendix When Using Windows Terminal Service/Citrix Presentation Server/Citrix XenApp The following explains how to use Windows Terminal Service and Maintenance. Operating Environment The following operating systems and Citrix Presentation Server/Citrix XenApp versions are supported. Citrix Presentation Server 4.0/Citrix XenApp 4.5 •...
  • Page 264 7. Appendix Citrix Presentation Server/Citrix XenApp Auto-creating client printers Using Auto-creating client printers can select a logical printer created by copying the client's local printer data to the MetaFrame server. We strongly recommend testing this function in your network environment before using it for your work. •...
  • Page 265: Using Dhcp

    Using DHCP Using DHCP You can use the printer in a DHCP environment. You can also register the printer NetBIOS name on a WINS server when it is running. • Printers that register the printer NetBIOS name on a WINS server must be configured for the WINS server.
  • Page 266: Configuring The Wins Server

    7. Appendix Configuring the WINS Server This section explains configuring the WINS server. The printer can be configured to register its NetBIOS name with a WINS server when the power is turned on. This enables the NetBIOS name of the printer to be specified from SmartDeviceMonitor for Admin even in a DHCP environment.
  • Page 267: Using Telnet

    Configuring the WINS Server Using telnet You can also use telnet to configure WINS. Use the "wins" command to make the setting with telnet. • p.132 "Remote Maintenance Using telnet"...
  • Page 268: Using The Dynamic Dns Function

    7. Appendix Using the Dynamic DNS Function Dynamic DNS is a function which dynamically updates (registers and deletes) records (A record, AAAA record, CNAME, and PTR record) managed by the DNS server. When a DNS server is part of the network environment to which this machine, a DNS client, is connected, records can be dynamically updated using this function.
  • Page 269: Dns Servers Targeted For Operation

    Using the Dynamic DNS Function • No security settings are made. • If security settings are made, an IP-specified client (this machine) permits updating. DNS servers targeted for operation For static IP setting • Microsoft DNS servers with standard Windows 2000 Server/Windows Server 2003/2003 R2/2008/2008 R2 features •...
  • Page 270 7. Appendix • For details, see "Remote Maintenance Using telnet". • p.132 "Remote Maintenance Using telnet"...
  • Page 271: Precautions

    Precautions Precautions Please pay attention to the following when using the network interface board. When configuration is necessary, follow the appropriate procedures below. Connecting a Dial-Up Router to a Network When using NetWare (file server) If the NetWare file server and printer are on opposite sides of a router, packets are sent back and forth continuously, possibly incurring communications charges.
  • Page 272: Netware Printing

    7. Appendix When using network utility If the machine is connected to a network, observe the following points when setting up the machine or changing settings: For more details, see the operating instructions and Help for the ScanRouter delivery software and DeskTopBinder.
  • Page 273: Banner Page

    Precautions • Under Windows 2000/XP and Windows Server 2003/2003 R2, clear the [Form feed] check box on the [NetWare Settings] tab in the printer properties dialog box. Banner page You should not configure a banner page on NetWare. If you want to change the banner page setting, always configure it using Windows.
  • Page 274: When The Ieee 802.11 Interface Unit Is Installed

    7. Appendix When the IEEE 802.11 Interface Unit is Installed Please pay attention to the following when using the IEEE 802.11 interface on the network. When using the wireless LAN interface on the network, note the following: When moving the machine Detach the antennas when relocating the machine locally.
  • Page 275: Configuring Ieee 802.1X

    Configuring IEEE 802.1X Configuring IEEE 802.1X IEEE 802.1X can be configured using Web Image Monitor's administrator mode. You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures. Types and requirements of certificates are as follows: EAP Types Requiring a "Site Certificate"...
  • Page 276: Enabling Ssl

    7. Appendix Enter appropriate "Common Name" and "Country Code" on "Certificate Information" page, and then click [OK]. "Updating..." appears. Wait for about 2 minutes, and then click [OK]. Click [Details], shown in the "Device Certificate" window as the memo pad icon for "Requesting".
  • Page 277: Setting Items Of Ieee 802.1X For Ethernet

    Configuring IEEE 802.1X Log in to Web Image Monitor in the administrator mode. In the menu area, click [Configuration]. Under "Security", click [SSL/TLS]. Click [Active] for the protocol version used in "SSL/TLS". Select the encryption communication mode for "Permit SSL/TLS Communication". Click [OK].
  • Page 278 7. Appendix Certain methods might not be available, depending on the RADIUS server you want to use. • Make the following settings according to the operating system you are using: • Select [On] or [Off] in "Authenticate Server Certificate". • Select [On] or [Off] in "Trust Intermediate Certificate Authority". •...
  • Page 279: Setting Items Of Ieee 802.1X For Wireless Lan

    Configuring IEEE 802.1X Setting Items of IEEE 802.1X for Wireless LAN Log in to Web Image Monitor in the administrator mode. In the menu area, click [Configuration]. Under "Security", click [IEEE 802.1X]. In "User Name", enter the user name set in the RADIUS server. Enter the domain name in "Domain Name".
  • Page 280 7. Appendix • Select [On] or [Off] in "Authenticate Server Certificate". • Select [On] or [Off] in "Trust Intermediate Certificate Authority". • Enter the host name of the RADIUS server on "Server ID". • Select [On] or [Off] in "Permit Sub-domain". Click [OK].
  • Page 281: Specifications

    Specifications Specifications Interface 1000BASE-T, 100BASE-TX, 10BASE-T, IEEE 802.11 a/b/g Frame type Ethernet II, IEEE 802.2, IEEE 802.3, SNAP Printer TCP/IP (IPv4/IPv6) DIPRINT IPP-SSL IPX/SPX (NetWare) WSD (Printer) Network Scanner IPv4 FTP-C SMTP SMTP-C POP3 Document Server TCP/IP (IPv4/IPv6)
  • Page 282 7. Appendix FTP-C HTTP HTTPS Management Function TCP/IP (IPv4/IPv6) FTP-C SNMP SNMP-C HTTP HTTPS TELNET DHCP DNS-C LDAP To use IPP and SMB, use the SmartDeviceMonitor for Client port. To use IPP under Windows XP/Vista/7, Windows Server 2003/2003 R2/2008/2008 R2, use the Standard IPP port.
  • Page 283: Copyrights

    Copyrights Copyrights expat Copyright (c) 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark Cooper. Copyright (c) 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:...
  • Page 284: Jpeg Library

    7. Appendix 3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 285: Libtiff

    Copyrights LibTIFF TIFF emulation software includes freeware TIFF libraries developed by Sam Leffler and Silicon Graphics, Inc.. In accordance with the conditions of distribution, the copyright notice concerning the TIFF library part is shown below. Copyright © 1988, 1989, 1990, 1991 Sam Leffler Copyright ©...
  • Page 286: Nana

    7. Appendix Copyright (c) 1990-2, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
  • Page 287: Netbsd

    Copyrights MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH...
  • Page 288 7. Appendix WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2. Authors Name List All product names mentioned herein are trademarks or registered trade-marks of their respective owners. The following notices are required to satisfy the license terms of the software that we have mentioned in this document: •...
  • Page 289 Copyrights • This product includes software developed by Alex Zepeda, and Colin Wood for the NetBSD Projet. • This product includes software developed by Alex Zepeda. • This product includes software developed by Alistair G. Crooks. • This product includes software developed by Alistair G. Crooks. for the NetBSD project. •...
  • Page 290 7. Appendix • This product includes software developed by Chuck Silvers. • This product includes software developed by Colin Wood for the NetBSD Project. • This product includes software developed by Colin Wood. • This product includes software developed by Cybernet Corporation and Nan Yang Computer Services Limited •...
  • Page 291 Copyrights • This product includes software developed by Iain Hibbert • This product includes software developed by Ian F. Darwin and others. • This product includes software developed by Ian W. Dall. • This product includes software developed by Ichiro FUKUHARA. •...
  • Page 292 7. Appendix • This product includes software developed by Lutz Vieweg. • This product includes software developed by MINOURA Makoto, Takuya Harakawa. • This product includes software developed by Manuel Bouyer. • This product includes software developed by Marc Horowitz. •...
  • Page 293 Copyrights • This product includes software developed by Per Fogelstrom • This product includes software developed by Peter Galbavy. • This product includes software developed by Phase One, Inc. • This product includes software developed by Philip A. Nelson. • This product includes software developed by Philip L. Budne. •...
  • Page 294 7. Appendix • This product includes software developed by TooLs GmbH. • This product includes software developed by Toru Nishimura. • This product includes software developed by Trimble Navigation, Ltd. • This product includes software developed by WIDE Project and its contributors. •...
  • Page 295 Copyrights • This product includes software developed by the University of Illinois at Urbana and their contributors. • This product includes software developed by the University of Vermont and State Agricultural College and Garrett A. Wollman. • This product includes software developed by the University of Vermont and State Agricultural College and Garrett A.
  • Page 296: Open Ldap

    7. Appendix • This software was developed by Holger Veit and Brian Moore for use with "386BSD" and similar operating systems. "Similar operating systems" includes mainly non-profit oriented systems for research and education, including but not restricted to "NetBSD", "FreeBSD", "Mach" (by CMU). •...
  • Page 297: Open Ssh

    Copyrights STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission.
  • Page 298 7. Appendix Note that any information and cryptographic algorithms used in this software are publicly available on the Internet and at any major bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://www.cs.hut.fi/crypto". The legal status of this program is some combination of all these permissions and restrictions. Use only at your own responsibility.
  • Page 299 Copyrights Copyright (c) 1983, 1990, 1992, 1993, 1995 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 300 7. Appendix 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS"...
  • Page 301: Open Ssl

    Copyrights BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 302 7. Appendix Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to.
  • Page 303: Racoon

    Copyrights racoon Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. ® RSA BSAFE • This product includes RSA BSAFE (c) cryptographic software from RSA Security Inc. • RSA, BSAFE are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries.
  • Page 304: Samba

    7. Appendix f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html Samba For SMB transmission, this machine uses Samba. Copyright (c) Andrew Tridgell 1994-1998. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation;...
  • Page 305 Copyrights Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
  • Page 306 7. Appendix user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
  • Page 307 Copyrights rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works.
  • Page 308 7. Appendix does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission.
  • Page 309: Sasl

    Copyrights You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY;...
  • Page 310: Spx/Ipx

    7. Appendix Pittsburgh, PA 15213-3890 (412) 268-4387, fax: (412) 268-7395 tech-transfer@andrew.cmu.edu 4. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by Computing Services at Carnegie Mellon University (http:// www.cmu.edu/computing/)." CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,...
  • Page 311 Copyrights "Contributor" means any person or entity that distributes the Program. "Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program. "Program"...
  • Page 312 7. Appendix iv) states that source code for the Program is available from such Contributor, and informs licensees how to obtain it in a reasonable manner on or through a medium customarily used for software exchange. When the Program is made available in source code form: a) it must be made available under this Agreement;...
  • Page 313 Copyrights EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 314: Wpa Supplicant

    • To obtain the source code for opening TrouSerS (Version 0.27), which is provided with this machine, access the Web site at the following URL: http://www.ricoh.com/support/trousers/index.html • TrouSerS version control is by SourceForge CVS. For methods of obtaining the source code, access the Web site at the following URL: http://sourceforge.net/cvs/?group_id=126012...
  • Page 315: Trademarks

    Trademarks Trademarks Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, Macintosh, Mac OS, and TrueType are registered trademarks of Apple Inc, registered in the U.S.
  • Page 316 7. Appendix ® ® Microsoft Windows Vista Home Premium ® ® Microsoft Windows Vista Home Basic ® ® Microsoft Windows Vista Enterprise • The product names of Windows 7 are as follows: ® ® Microsoft Windows 7 Home Premium ® ®...
  • Page 317: Index

    INDEX Connecting to the interfaces......... Copier / Document Server Auto Reset Timer..Account for e-mail notification......Copy Count Display..........Ad-hoc Channel............ Copy speed............Adding a group to another group..... Copyrights............Address book............Address Book Change Order..............Data Carry-over Setting for Address Book Auto Program..............
  • Page 318 E-mail destination..........Enabling SSL..............E-mail Reception Interval........Ethernet................site certificate..............E-mail Storage in Server........wireless LAN..............Effective Protocol........... IEEE 802.1X Authentication for Ethernet..... Energy Saver Timer..........info............... 176, 179 Enhanced Authentication Management....Interface settings............ Enhanced External Charge Unit Management..Interleave Print............................
  • Page 319 ftp..................rcp..................Original Feed Delay 1.......... rsh..................Original Feed Delay 2.......... sftp..................Output Printer............stat..................Managing names in the Address Book..... Managing users and machine usage....Panel Key Sound........... Manuals for this machine........Panel Off Timer............Max. Reception E-mail Size......... Paper Thickness Message..............
  • Page 320 Registering a protection code......NetWare 4.x..............NetWare 5..............Registering a protection code to a group user..................NetWare 5.1..............Registering a protection code to a single user..NetWare 6..............................NetWare 6.5..............Registering a user code........Print speed.............. Registering an e-mail destination....... Printer Registering an NCP Folder.........
  • Page 321 SMTP Authentication..........show................. SMTP Server............slp..................smb................... SNMP..............snmp................. SSID Setting............sntp................... status..............spoolsw................Supported printer drivers........ssdp.................. Symbol..............ssh..................syslog..............status................System Auto Reset Timer........syslog................System log information upnp................. web.................. ftp..................wiconfig................rcp..................wins.................. rsh..................wsmfp................sftp..................Timer settings............syslog................
  • Page 322 setting items..............top page................When Using IPP with SmartDeviceMonitor for Client IPP..................SmartDeviceMonitor for Client........WINS Configuration..........WINS server............telnet................. Web Image Monitor............Wireless LAN..........35, 272 Wireless LAN interface checking the signal............connecting................setup procedure..............Wireless LAN Signal..........D094...
  • Page 323 © 2010...
  • Page 324 D094-7527...

This manual is also suitable for:

Aficio mp w3601Gwd3006Lw426

Table of Contents