Tcp/Ip Network Setup Procedures - Canon imageRUNNER ADVANCE C5051 Getting Started

Digital printer scanner copier
Hide thumbs Also See for imageRUNNER ADVANCE C5051:
Table of Contents

Advertisement

TCP/IP Network Setup Procedures

To use a TCP/IP network, it is necessary to perform the following procedures.
1
Protocol Settings (See "Protocol Settings," on p . 4-3 .)
Specify the protocol settings. To specify the settings, use:
The machine's control panel
The Remote UI (via a web browser)
Canon utilities
2
Computer Settings for Printing/Sending a Fax (See e-Manual > Network .)
Specify the settings for each computer you use for printing or sending a fax. (Optional equipment is required to print or send a fax from a computer. For the equipment
4
needed, see "Optional Equipment and System Requirements for Connecting to a Network, " on p. 2-2.)
3
Computer Settings for a File Server (See "Setting Up a Computer as a File Server," on p . 4-25 .)
Specify the settings of the computer receiving data sent from the machine.
It is recommended that you consult the administrator for the network you are using when performing steps 1 and 3 above.
The machine or printing equipment does not come with printer driver software that can be used on a UNIX platform. (Use LPD to set up a
printer in UNIX.)
As the fax option does not come with fax driver software for the UNIX platform, it is not possible to send a fax from a UNIX platform.
If you are using the imagePASS, the ColorPASS, or the PS-GX, see the manual provided with the imagePASS, the ColorPASS, or the PS-GX.
If you are using the imagePASS, the ColorPASS, or the PS-GX, some functions are not available with this machine. For details, see the
manual provided with the imagePASS, the ColorPASS, or the PS-GX.
A pre-determined port must be opened in order to initiate network communication using TCP/IP. The required port can be opened by
selecting [On] for all of the [Network] settings in the machine. It is recommended that any unused functions be set to [Off]. When a port is
opened, it is possible for a third person to gain unauthorized access.
4-2

TCP/IP Network Setup Procedures

Advertisement

Table of Contents
loading

Table of Contents