Xerox Phaser 8560 System Administrator Manual

Xerox 8560: user guide
Hide thumbs Also See for Phaser 8560:
Table of Contents

Advertisement

System
Administrator
®
P h a s e r
P h a s e r
P h a s e r
Guide
Office Printers
6 3 6 0 c o l o r l a s e r p r i n t e r
®
8 5 6 0 c o l o r p r i n t e r
®
4 5 1 0 l a s e r p r i n t e r
www.xerox.com/support

Advertisement

Table of Contents
loading

Summary of Contents for Xerox Phaser 8560

  • Page 1 8 5 6 0 c o l o r p r i n t e r ® P h a s e r 4 5 1 0 l a s e r p r i n t e r Guide www.xerox.com/support...
  • Page 2 Copyright © 2007 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission of Xerox Corporation. Copyright protection claimed includes all forms of matters of copyrightable materials and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as styles, templates, icons, screen displays, looks, etc.
  • Page 3: Table Of Contents

    Walk-Up Installation..........2-3 Installation from the Printer’s Hard Drive or the Web ......2-4 Auto-Configuring Driver .
  • Page 4 About Access Control Lists ..........4-4 Securing the Printer in a High Security Environment ......4-5 Managing Certificates .
  • Page 5 Printing Features Secure, Personal, Personal Saved, Proof, Print With and Saved Print Jobs ... . . 5-2 Smart Trays ............. . 5-2 Jam Recovery .
  • Page 6 MaiLinX Remote Printing Parameters ......... A-7 Printer Commands Phaser PCL Commands .
  • Page 7: Overview

    PhaserSMART Technical Support ■ ■ Xerox Support Centre on page 1-4 ■ CentreWare Internet Services (IS) You can obtain information regarding your printer and its capabilities from the following sources. Resources Information Installation Guide* Quick Use Guide* User Guide (PDF)*...
  • Page 8: Printingscout Alerts

    PrintingScout Alerts PrintingScout is an automated tool that is installed with the Xerox printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout automatically displays an alert on the user’s computer screen to let them know that the printer needs attention.
  • Page 9 Select the PhaserSMART Technical Support link. Follow the instructions on the screen. Using the Xerox Support Centre To access PhaserSMART Technical Support from the Xerox Support Centre: Select one of the following options: ■ Windows: Double-click the Xerox Support Centre icon on your desktop.
  • Page 10: Xerox Support Centre

    Xerox Support Centre The Xerox Support Centre is a utility that is installed when running the driver installer. It is available for systems with Windows 2000 and later or Mac OS X, version 10.2 and higher. The Xerox Support Centre appears on the desktop for Windows systems or is placed in the Mac OS X dock.
  • Page 11: Centreware Internet Services (Is)

    ■ Define a link to your local web server’s support page. ■ Access online manuals and technical support information located on the Xerox website. Note: CentreWare IS requires a web browser and a TCP/IP connection between the printer and the network (in Windows, Macintosh, or UNIX environments). TCP/IP and HTTP must be enabled in the printer.
  • Page 12: Network Installation Features

    Network Installation Features This chapter includes: ■ Using a Startup Network Configuration File ■ Printer Driver Installation Features Discovery Protocols on page 2-5 ■ See also: Advanced Features Guide at www.xerox.com/support System Administrator Guide on page 2-2 on page 2-3...
  • Page 13: Using A Startup Network Configuration File

    TFTP service on the TFTP server downloads the configuration file once an IP address is acquired and confirmed in the printer. The TFTP service processes the data in the configuration file as if it were a standard print job.
  • Page 14: Printer Driver Installation Features

    Software and Documentation CD-ROM, supplied with the printer, and is available on the web. When you run the installer, the main screen lists the Xerox printers of that model discovered on the network or connected via USB. You can choose one of the discovered printers, enter the IP address of the desired printer, or use Walk-Up Technology.
  • Page 15: Installation From The Printer's Hard Drive Or The Web

    Software and Documentation CD-ROM. Note: If the printer doesn’t have a hard drive but is connected to the internet, you can use this procedure to automatically connect to the web to install the driver. To install the printer driver either from the hard drive or the web: Launch your web browser.
  • Page 16: Discovery Protocols

    DDNS/WINS DDNS/WINS settings can be obtained from the BOOTP or DHCP server, if enabled. These settings enable the printer to register its IP name and address so other devices on the network can refer to it by name. To change the DDNS/WINS settings: Launch your web browser.
  • Page 17: Dns (Domain Name Services)

    DNS settings reference servers by name and allow you to enter and view host names rather than IP addresses. Note: Turning Multicast DNS ON allows the printer to be automatically discovered on a TCP/IP network by Apple Macintosh OS X Bonjour technology. To change the DNS settings: Launch your web browser.
  • Page 18: Upnp (Universal Plug And Play)

    UPnP (Universal Plug and Play) UPnP provides a simplified method to obtain an IP Address for a printer, locate devices on the network, and display those devices on desktop computers. Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx).
  • Page 19: Network Administration Features

    Printer Neighborhood on page 3-2 ■ Job Accounting on page 3-3 Usage Profile Reports on page 3-4 ■ ■ Xerox Usage Analysis Tool on page 3-5 ■ Protocol Control on page 3-6 ■ Cloning on page 3-14 System Administrator Guide...
  • Page 20: Printer Neighborhood

    Printer Neighborhood Printer Neighborhood is a tool in CentreWare IS that enables you to search for printers on your network, check their status, and manage them remotely. You can also install, manage, and view printer usage information. Access to the embedded server in each printer enables you to perform other management tasks.
  • Page 21: Job Accounting

    The log file is stored either in the printer’s RAM memory or on the hard drive if one is installed in the printer. Xerox recommends that a hard drive be used for job accounting. ■ With a hard drive, the printer can store information about 5000 print jobs. The data in the log file is saved when the printer is turned off or reset.
  • Page 22: Usage Profile Reports

    From this page you can view or print a report, and also send it to an email address you enter below, or to users who are specified in the Usage Profile Properties page.
  • Page 23: Xerox Usage Analysis Tool

    Xerox Usage Analysis Tool The Xerox Usage Analysis Tool (UAT) enables you to collect and analyze enterprise-wide Xerox network printer usage data with customizable features: ■ Cost Analysis: Track printing costs by groups of users or by groups of printers.
  • Page 24: Protocol Control

    For example, if you want to use IPP for a secure printing channel, disable the other printing protocols, Port 9100 and LPR. HTTP By default, HTTP is enabled. For information on disabling HTTP, contact Xerox Technical Support at www.xerox.com/support. See also:...
  • Page 25: Tcp/Ip

    Under DDNS/WINS Settings, in the DDNS box, select one of the following: ■ On: The printer registers its IP name and address so other devices on the network can refer to it by name. Off: The printer does not register its IP name and address. If DDNS is Off, these ■...
  • Page 26: Lpr

    (for Windows only). Every client that tries to print to the printer over IPP must enter this information. The user name and password are sent in plain text to the printer. If you specify digest authentication, the password is secured before it is sent to the printer.
  • Page 27: Snmp (Simple Network Management Protocol)

    FTP is a protocol for exchanging files over any network supporting the TCP/IP protocol, such as the internet or an intranet. You can use FTP to send print-ready files to the printer or to retrieve Job Accounting records from the printer.
  • Page 28: Email Server Or Smtp (Simple Mail Transfer Protocol)

    To configure email server settings: Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocols folder on the left navigation panel. Select Email Server.
  • Page 29: Mailinx Remote Printing

    Internet-connected printers and create groups and subgroups of printers for easy distribution of print jobs. ■ A CentreWare IS Printing Service on a Xerox printer processes the print jobs from the clients. System Requirements ■...
  • Page 30: Mailinx Alerts

    MaiLinX Alerts About MaiLinX Alerts MaiLinX alerts enable the printer to automatically send email to you and/or specified users when the following conditions occur: ■ The printer requires attention or when service is needed. ■ The printer displays an error, warning, or alert.
  • Page 31: Ethertalk

    EtherTalk To change EtherTalk settings: Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocols folder on the left navigation panel. Select EtherTalk. If prompted, enter your Admin or Key User name and password.
  • Page 32: Cloning

    You can access cloning using CentreWare IS or CentreWare Web. Using CentreWare IS, you can select the settings you want to clone from one printer to another printer. Using CentreWare Web, you can select the settings you want to clone from one printer to one or more printers.
  • Page 33: Security Features

    Security Features This chapter includes: ■ Basic Concepts on page 4-2 ■ Securing the Printer in a High Security Environment Managing Certificates on page 4-6 ■ ■ Configuring SSL on page 4-7 ■ Configuring Administrator and Key User Settings ■...
  • Page 34: Basic Concepts

    4-4 About Admin and Key User Accounts Admin and Key User accounts in CentreWare IS enable you to limit access to specific printer functions by specifying passwords for user classes. CentreWare IS requires a name and password before access to the controlled printer functions are allowed.
  • Page 35: About Http, Https, And Ssl/Tls

    Before using HTTPS, you must set up a certificate and select when to use SSL to encrypt data. You can set the printer to use SSL either to secure web pages that use passwords or to secure all web pages.
  • Page 36: About Access Control Lists

    If you want to use HTTPS, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use HTTPS and encrypt data between the web browser and the printer. In addition, because each printer’s certificate is unique, you must load a different certificate into the browser for each printer the browser will access.
  • Page 37: Securing The Printer In A High Security Environment

    Securing the Printer in a High Security Environment If you are concerned about the security of your printer in a high security environment, such as a college or printing kiosk, you can configure settings in CentreWare IS to “lockdown” or fully secure the printer.
  • Page 38: Managing Certificates

    Managing Certificates To modify a self-signed certificate so it is specific to your printer or to install a downloaded root-signed certificate on the printer: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties.
  • Page 39: Configuring Ssl

    You can restrict user access to SSL pages in CentreWare IS. For more information, see Configuring Administrator and Key User Settings To configure SSL: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Security folder on the left navigation panel. Select HTTPS.
  • Page 40: Configuring Administrator And Key User Settings

    In the Host Access List field, enter the IP addresses or host names of the computers allowed to change printer settings. Separate entries with a blank or a comma, specify ranges with a hyphen (-), and use an asterisk (*) to represent a group of numbers (e.g., 13.62.156.*).
  • Page 41: Configuring The Print Host Access List

    Access List field. Separate entries with a blank or a comma, specify ranges with a hyphen (-), and use an asterisk (*) to represent a group of numbers (e.g., 13.62.156.*). The default setting is Unrestricted, which allows all users to access the printer to print their jobs.
  • Page 42: Controlling Access To Color Printing

    Enter a 4-digit numeric password in the Color Permission PIN field. Click the Save Changes button. Note: Users will not be able to use the color options in the printer driver without entering a numeric password. System Administrator Guide Controlling Access to Color Printing...
  • Page 43: Securing The Hard Drive

    Selecting the Hard Drive Overwrite Security Option When a file is deleted from the printer’s hard drive, only the file name is deleted; the data in the file remains on the hard drive, regardless of the operating system. An unauthorized person could, possibly, retrieve the data in the file that was deleted.
  • Page 44: Selecting The Automatic Removal Of Secure, Personal, And Proof Jobs Option

    Forgets about an unprinted secure, personal, or proof job that was stored on the hard drive. ■ Sends a secure job to the printer, but does not walk to the printer to print the job. ■ Stores a proof job, prints it once, and then forgets to delete it.
  • Page 45 To select the automatic removal of secure, personal, and proof print files from the hard drive: Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Security folder on the left navigation panel.
  • Page 46: 802.1X Configuration

    Access to the 802.1x configuration pages in CentreWare IS can be restricted by the passwords and feature authorization settings under Administrative Security. Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Open the Security folder on the left navigation panel and select 802.1X.
  • Page 47 Install root certificate – If you select EAP method(s) that require a root certificate, you can: ■ Install a new root certificate. ■ Use the already existing root certificate. ■ Choose not to validate server. Install device certificate – If you select EAP method(s) that require a device certificate, you can: ■...
  • Page 48: Locking The Control Panel Menus

    Locking the Control Panel Menus To prevent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public places, such as schools, libraries, and office/print centers.
  • Page 49: Configuring Snmp

    Configuring SNMP for Maximum Security Note: A SSL certificate must be established on the printer to enable SNMP v3. In most cases, a certificate is automatically established when the printer is first turned on and no other action is required.
  • Page 50: Configuring Snmp V1/V2C

    Note: These names are not displayed on this page, but are shown as a row of asterisks (*). ■ GET Community Name: Allows a host to perform SNMP GETS on the printer using this community name. ■ SET Community Name: Allows a host to perform SNMP SETS on the printer using this community name.
  • Page 51 Traps, and SNMP v2c Inform Requests. ■ The Traps column lists the types of traps to send to the Trap Destination Address. Traps to be received include Printer Traps, Job Monitoring Traps, Cold Start, and Authentication Traps. Do one of the following: ■...
  • Page 52: Configuring Snmp V3

    ■ SNMP user read and write access. ■ An access control list that limits SNMP printer access to the specific hosts. See Configuring the SNMP Access Control List To configure and enable SNMP v3: Launch your web browser.
  • Page 53 (default). Note: If the Driver Account is disabled, it breaks communication between the printer and any applications using SNMP v3, such as Xerox printer drivers and PrintingScout. For a complete list of applications disabled, see System Administrator Guide Configuring SNMP Disabling SNMP on page 4-23.
  • Page 54: Configuring The Snmp Access Control List

    Configuring the SNMP Access Control List To set up a list of hosts that are authorized to access the printer using SNMP: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocol folder on the left navigation panel.
  • Page 55: Disabling Snmp

    Synchronization with installed options, such as hard drive, memory, and extra trays To disable SNMP: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocols folder on the left navigation panel.
  • Page 56: Printing Features

    Printing Features This chapter includes: ■ Secure, Personal, Personal Saved, Proof, Print With and Saved Print Jobs ■ Smart Trays on page 5-2 Jam Recovery on page 5-3 ■ System Administrator Guide on page 5-2...
  • Page 57: Secure, Personal, Personal Saved, Proof, Print With And Saved Print Jobs

    Secure, Personal, Personal Saved, Proof, Print With and Saved Print Jobs These features are available if your printer has an internal hard drive. These jobs are stored on the hard drive and remain in the printer even when it is turned off.
  • Page 58: Jam Recovery

    While printing checks, someone could cause a media jam as the media is exiting the printer so that a check is reprinted. To prevent the printer from printing two copies of the same check, you can set the printer to begin printing the job from the point where the media jammed through the end of the job, or cancel the job completely.
  • Page 59: Glossary

    An electronic message containing information about the printer and a digital signature, which is stored in the printer. A certificate is used to validate the identity of the printer to clients and network servers and to allow encrypted communication.
  • Page 60 A feature in CentreWare IS that allows the printer to automatically send email to you and others under certain conditions. MaiLinX remote printing A feature in CentreWare IS that enables you to print to Xerox printers over the Internet, directly from Windows applications. The print jobs are sent as email.
  • Page 61 PrintingScout alerts PrintingScout is a tool that is installed with the Xerox printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout automatically displays an alert on the user’s computer screen to let them know that the printer...
  • Page 62 UDP (User Datagram Protocol) is a minimal message-oriented transport layer protocol found on domain name servers (DNS). Walk-Up Printing Driver The Xerox Walk-Up Printing Driver enables printing from a PC to any Xerox Postscript-enabled printer. For more information, see Printing Driver...
  • Page 63: Configuration Card Parameters

    The new printer assumes the identity of the old printer, eliminating the need to reconfigure network settings.
  • Page 64: General Information Parameters

    ■ Tray 5 Note: The Tray 3, Tray 4, and Tray 5 parameters are only stored on the printer configuration card if the optional trays are available for your printer and installed. ■ Tray 1 or Tray 1 (MPT) Mode ■...
  • Page 65: Pcl Parameters

    Wide A4 USB 2.0 Parameters ■ Language ■ Wait Timeout Hard Drive Parameters The hard drive parameters are only stored on the configuration card if the printer has an internal hard drive. ■ Overwrite Deleted Files ■ Daily Removal ■...
  • Page 66: Certificates

    ■ Enabled Disabled ■ EtherTalk Parameters Enabled ■ ■ Disabled ■ Language Filtering ■ ■ Name ■ Printer Type ■ Zone ■ Network Node TCP/IP Parameters ■ Enabled ■ Disabled ■ Host Name ■ Host Name Requested ■ IP Address ■...
  • Page 67: Dns Parameters

    DNS Parameters Primary Server ■ ■ Secondary Server ■ Multicast DNS (Bonjour) Enable SLP Parameters ■ Enabled Disabled ■ ■ Directory Agent Discovery Enable ■ Directory Agent ■ Scope 1 ■ Scope 2 ■ Scope 3 ■ SLP Multicast Enable ■...
  • Page 68: Appsocket (Port 9100) Parameters

    AppSocket (Port 9100) Parameters Enabled ■ ■ Disabled ■ Language ■ Filtering IPP (Internet Printing Protocol) Parameters Enabled ■ ■ Disabled ■ Language ■ Filtering ■ Network Path SNMP Parameters ■ SNMP v1/v2c ■ SNMP v3 ■ Host Access List CentreWare IS (HTTP) Parameters ■...
  • Page 69: Status Notification Parameter

    Status Notification Parameter ■ Disabled Enabled ■ ■ SysAdmin Email Address ■ Service Email Address ■ Key User email Address MaiLinX Remote Printing Parameters Language ■ ■ Filtering ■ POP3 Server ■ POP3 User Name POP3 Password ■ ■ POP3 Polling Interval ■...
  • Page 70: Printer Commands

    Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer defaults. In addition to the standard PCL and PJL commands, the Phaser printers support Xerox-unique PCL and PJL commands. This appendix lists the most commonly used standard and Xerox-unique PCL and PJL commands.
  • Page 71: Phaser Pcl Commands

    The following table lists the most common PCL commands for supported media sizes. For information on which media sizes are supported in your printer, and the trays that support them, print the Paper Tips page from your printers control panel.
  • Page 72: Media Type

    The following table lists the most common PCL commands for supported media types. For information on which media sizes are supported in your printer, and the trays that support them, print the Paper Tips page from your printers control panel.
  • Page 73: Input Trays

    Input Trays The following table lists the most common PCL commands for the input trays supported by your printer. The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one command is listed, you can use either command.
  • Page 74: Phaser Pjl Commands

    Phaser PJL Commands The following table lists the most commonly used HP PJL and Xerox-unique PJL commands. See also: HP Printer Job Language Technical Reference for the standard set of PJL commands. PJL Command @PJL FSDELETE NAME=“pathname” @PJL FSDIRLIST NAME=“pathname”...
  • Page 75: System Administrator Guide

    (tray) in PCL, then tray switching is always active, regardless of the value. When the current tray goes empty, the printer attempts to switch to another tray containing the same size and type of paper. This command only takes effect when a specific tray, such as Tray 2, is selected in the job.
  • Page 76 PJL Command @PJL XPCLPAPERSRCx = y HP Printer Job Language Technical Reference for the values. * See the System Administrator Guide Phaser PJL Commands Values Description x is 0, 1, 2, 3, 4, 5, Overrides the tray selected in the 6, 7, 8, 20, 21, 22, <Esc>&l#H PCL tray selection...
  • Page 77 Acknowledgements Original SSLeay License Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to.
  • Page 78 THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 79 Part 2: Networks Associates Technology, Inc. copyright notice (BSD) ----- Copyright © 2001-2003, Networks Associates Technology, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■...
  • Page 80 Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Copyright © 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 81 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 82 VxWorks This product may include software licensed to Wind River by third parties. The following notices are provided to comply with the terms of such licenses. Wind River VxWorks This product may include software developed by WIDE Project and its contributors. Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided only with the following conditions are satisfied: 1.
  • Page 83 This product may include software copyright David A. Hinds. Use, redistribution, and modification of this code is permitted subject to the following conditions: 1. Redistribution of this code must preserve this copyright notice. 2. Binary distributions must include this notice and disclaimer.
  • Page 84 THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 85 not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel Corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use of, the software and documentation in terms of correctness, accuracy, reliability, currentness, or otherwise;...
  • Page 86 distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
  • Page 87 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product may include software copyright © 2003 Ericsson Research Canada. All rights reserved.
  • Page 88 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product contains software developed by the Apache Software Foundation (www.apache.org/). This product contains ANTLR software. www.antlr.org/ This product contains software copyright ©...
  • Page 89 SNiFF+/SNiFF+ PRO Copyright © 1992–1997 Compuware Corporation Copyright © 1984–1997 FairCom Corporation Copyright © 1996–2000 Greg Stein and Mark Hammond Copyright © 1999 The Apache Software Foundation Copyright © 2001 Xperts Software Wind River USB Host Stack This product may include software developed by Wipro Limited. WIND MEDIA LIBRARY This product may include software copyright ©...
  • Page 90 WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. This product may contain software that is based in part on the work of the Independent JPEG Group.
  • Page 91 Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
  • Page 92 Other Components of this product, including without limitation Wind River Workbench, Tornado, VxWorks, and Wind River PPP, include software derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm, and copyright © RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc.
  • Page 93 redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a selfextracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source.
  • Page 94 GOVERNMENT USE: If you are acquiring this software on behalf of the U.S. government, the Government shall have only "Restricted Rights" in the software and related documentation as defined in the Federal Acquisition Regulations (FARs) in Clause 52.227.19 (c) (2). If you are acquiring the software on behalf of the Department of Defense, the software shall be classified as "Commercial Computer Software"...
  • Page 95 You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following: a.
  • Page 96 Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of this Package.
  • Page 97 We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
  • Page 98 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
  • Page 99 (For example, a function in a library to compute square roots has a purpose that is entirely welldefined independent of the application. Therefore, Subsection 2d requires that any applicationsupplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole.
  • Page 100 When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library.
  • Page 101 For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  • Page 102 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
  • Page 103 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY...
  • Page 104 OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 105 gSOAP Public License Version 1.3a The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified).
  • Page 106 1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor’s choice.
  • Page 107 3. DISTRIBUTION OBLIGATIONS 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute.
  • Page 108 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice.
  • Page 109 6. VERSIONS OF THE LICENSE 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version.
  • Page 110 THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU.
  • Page 111 10. U.S. GOVERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis.
  • Page 112 EXHIBIT B. “Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (c) 2001–2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 113 Index about the configuration file, 2-2 access control lists, 4-4 definition, 6-1 specifying access to printer settings, 4-8 specifying printer access using SNMP, 4-22 specifying printing access, 4-9 access to color printing, 4-10 accessing online manuals using CentreWare IS, 1-5...
  • Page 114 4-11 IPP settings, 3-8 LPR settings, 3-8 mDNS settings, 2-5 Port 9100 settings, 3-7 SLP settings, 2-6 TCP/IP settings, 3-7 checking printer status, 3-2 cloning, 3-14 color printing access, 4-10 color tables loading, 2-2 commands, B-1 concepts, 4-2...
  • Page 115 PhaserSMART Technical Support, 1-1, PrintingScout alerts, 1-2 Technical Support, 1-1 glossary, 6-1 GNU Toolkit, C-12 hard drive automatic removal of jobs option, 4-12 installing the printer driver, 2-4 overwrite security option, 4-11 securing, 4-11 host definition, 6-2 HTTP, 3-6, 4-3 definition, 6-2...
  • Page 116 6-3 installation features, 2-3 walk-up installation, 2-3 securing in a high security environment, settings copy from one printer to another, 1-5 viewing usage information, 3-2 Printer Neighborhood, 3-2 definition, 6-3 printer settings copy from one printer to another, 1-5...
  • Page 117 3-5 usage profile reports, 3-4 sending, 3-4 setting up, 3-4 viewing printer usage information, 3-2 VxWorks, C-6 Walk-Up installation, 2-3 Walk-Up printing driver, 2-3 definition, 6-4 Xerox Support Centre, 1-4 Xerox Usage Analysis Tool, 3-5 definition, 6-4 Index-5 Index...

Table of Contents