Table of Contents

Advertisement

Quick Links

User Guide
For safe and correct use, be sure to read Safety Information separately
provided before using the machine.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IM 370FTL and is the answer not in the manual?

Questions and answers

Summary of Contents for Ricoh IM 370FTL

  • Page 1 User Guide For safe and correct use, be sure to read Safety Information separately provided before using the machine.
  • Page 3: Table Of Contents

    Changing the Display Language ..................26 Basic Operation of Applications ..................28 Confirming the Functions that Are Added in RICOH Always Current Technology ..28 How to Use the Copy Screen ................... 28 How to Use the Fax Screen....................32 How to Use the Scanner Screen ..................
  • Page 4 2. Copy Basic Copying ........................79 Basic Procedure for Copying Documents ............... 79 Making Enlarged or Reduced Copies ................85 Duplex Copying ........................ 89 Combining and Copying a Multi-page Original onto a Single Sheet of Paper ....91 Copying onto Envelopes ....................94 Special Copying ........................
  • Page 5 Scanning Documents and Sending the Scanned Data by E-mail ......... 135 Scanning Documents and Sending the Scanned Data to a Folder ....... 139 Scanning an Original with Suitable Quality and Density ..........150 Settings for E-mail and Scan Data ..................153 Specifying the File Type or File Name When Scanning a Document ......
  • Page 6 Preparing the Server to Use for User Authentication ........... 282 Logging in to the Machine Using an IC Card or a Smart Device ........287 Limiting Available Functions..................291 Executing a Print Job with Authentication Information Only ........292 Specifying the Policy on Login/Logout ................294 Access Control .......................
  • Page 7 Legal and Contact Information..................400 Environmental Regulations ................... 400 Notes for wireless LAN and Bluetooth ................404 Copyright Information about Installed Software ............405 Trademarks (User Guide) ....................405 11. Driver Installation Guide Installing the Printer Driver ....................409 Installing the Printer Driver by Using Device Software Manager Installer ....409 Installing the Printer Driver for Network Connection (Windows) ........
  • Page 9: Introduction And Basic Operations

    1. Introduction and Basic Operations About This Manual Abbreviated Names of Options In the manuals, the abbreviated names of options are used. The abbreviated names and corresponding product names are as follows: Options that can be attached to the machine differ depending on the machine type. page 393 "Machine Options"...
  • Page 10 1. Introduction and Basic Operations Abbreviated name Product name Device server option Device Server Option Type M54 SSD option SSD Option Type M54 256GB HDD option HDD Option Type M54 320GB Fax memory unit FAX Memory Unit Type M54 64MB Wireless LAN board IEEE 802.11a/b/g/n Interface Unit Type M54...
  • Page 11: Basic Operation Of The Machine

    Basic Operation of the Machine Basic Operation of the Machine Turning On and Off the Power To turn the machine on and off, press the main power switch on the front left side of the machine. Turning On the Main Power •...
  • Page 12 1. Introduction and Basic Operations Turning Off the Main Power • Do not turn off the power while the machine is in operation. To turn the power off, confirm that the operation is finished. • Do not hold down the main power switch while turning off the main power. Doing so forcibly turns off the machine's power and may damage the internal storage or memory and cause malfunctions.
  • Page 13: Sleep Mode

    Basic Operation of the Machine the machine for a specified period of time, the machine emits a clicking sound and enters Fusing Unit Off mode. • You can specify whether to enable the Fusing Unit Off mode and the time to wait before the machine enters Fusing Unit Off mode under [Fusing Unit Off Mode (Energy Saving) On/Off].
  • Page 14: Guide To Names And Functions Of Components

    1. Introduction and Basic Operations • When the ADF, machine's cover, or ADF cover are opened • When the "Add Toner" message appears • When toner is being replenished • When one of the following screens is displayed: • System Settings •...
  • Page 15 Basic Operation of the Machine Front and Left View 1. Internal tray guide Open the guide to prevent the printed paper from falling off. 2. Vents Prevent overheating. After large-volume printing, the ventilation fan may continue to work to lower the temperature inside the machine.
  • Page 16 1. Introduction and Basic Operations 7. Front cover Open to replace the toner cartridge or waste toner bottle. page 157 "Replacing the Toner" page 160 "Replacing the Waste Toner Bottle" 8. Paper tray (Tray 1) Standard paper trays. Load paper here. page 56 "Loading Paper into the Paper Tray_Mts4-Lfy1-Artm1a-Mine4"...
  • Page 17 Basic Operation of the Machine 3. Right cover Open this cover to remove jammed paper. 4. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 5. Bypass tray Use to copy or print on adhesive labels or paper that cannot be loaded in the paper trays.
  • Page 18: Names And Functions Of The Control Panel

    • (mainly Europe) When touching the machine, you may experience a static shock which is harmless to humans. For details, refer to the following : https://www.ricoh- europe.com/support/environmental-health-safety-product-information/ricoh- static-shock Names and Functions of the Control Panel The touch panel (Smart Operation Panel) that displays the operation screen of the machine is referred to as the "Control Panel".
  • Page 19 18 "How to Use the Home Screen" page 22 "Intuitive Screen Operation Using Fingertips" 3. Touch mark Used to connect the machine and a smart device with the RICOH Smart Device Connector. See "Using the Machine Functions from a Mobile Device", User Guide in English.
  • Page 20: Led Indicators

    1. Introduction and Basic Operations LED Indicators 1. Fax indicator Indicates the status of the fax function. • Flashing: transmitting and receiving data • Lit: receiving data (Substitute RX File/Memory Lock Reception/Personal Box) 2. Data In indicator Flashes when the machine is receiving data sent from the printer driver or LAN-Fax driver.
  • Page 21 Basic Operation of the Machine • Do not apply strong impact or force to the screen, or it may be damaged. Maximum force allowable is approx. 30N (approx. 3 kgf). (N = Newton, kgf = Kilogram force. 1 kgf = 9.8N.) •...
  • Page 22 1. Introduction and Basic Operations 3. Help When the machine is connected to the Internet and Help is available for the screen that is displayed or the error that has occurred, press this icon to display a Help screen. Select the [Accept cookies] check box in the control panel browser to display Help properly.
  • Page 23 Basic Operation of the Machine 7. Application list Press to display applications that are not displayed on the Home screen. page 45 "Adding a Frequently Used Application or Widget to the Home Screen" 8. Current display position Shows which of the five screens is currently displayed. 9.
  • Page 24 1. Introduction and Basic Operations • You can change the screen displayed when the power is turned on under [Function Priority (Default Displayed Application)]. See "Displaying Frequently Used Functions on the First Screen", User Guide in English. • When you press [Menu] ( [Reset Home Screen] with the Embedded Software Architecture application being installed in the machine, the application icons are not deleted.
  • Page 25: How To Use The "Settings

    Basic Operation of the Machine In some applications, you can also use the following actions to operate the screen: Pinch-in (for zooming out the screen) Touch the screen with your thumb and forefinger, and pinch them together. This feature is useful when previewing files and images. Pinch-out (for zooming in the screen) Touch the screen with your thumb and forefinger, and spread them apart.
  • Page 26 1. Introduction and Basic Operations The "Settings" screen consists of the menus shown below. 1. System Settings Specify the operation panel display, machine operation settings, operation sounds, timer, network settings and other settings. For the list of setting items, see "System Settings Items", User Guide in English. 2.
  • Page 27 Wizard format when the machine is moved to a different location or the environment in which the machine is used changes. In [Cloud Settings], you can register or unregister the machine with RICOH Smart Integration. Also, you can change settings related to Cloud Services by using the Cloud Settings.
  • Page 28: Changing The Display Language

    1. Introduction and Basic Operations 9. Counter Display and print the total number of sheets printed for each function. See "Checking the Counter of the Machine", User Guide in English. • If administrator authentication has been set, contact the administrator to change the settings.
  • Page 29 Basic Operation of the Machine 2. Select the language you want to display. 3. Press [OK].
  • Page 30: Basic Operation Of Applications

    Basic Operation of Applications Confirming the Functions that Are Added in RICOH Always Current Technology You can install the upgrade package for the machine's functions by RICOH Always Current Technology. You can apply the latest functions developed after purchase and security updates.
  • Page 31: Standard View

    Basic Operation of Applications Standard View The basic functions that are used frequently are displayed with big keys. Scroll down the screen to see the keys used to configure the functions for finishing or editing. Full View You can see all the function keys on a single screen. You do not need to scroll through the screens to select a function.
  • Page 32 1. Introduction and Basic Operations How to Use the Copy Screen (Standard) 1. Copy function keys Press a key to select the function to assign to the key. Flick up and down on the screen to display the keys out of the visible area. The keys with assigned functions are displayed in yellow or with in the upper left corner.
  • Page 33 Basic Operation of Applications 5. [Sample Copy] Press to make a partial copy as a test before proceeding to copy the rest of the original. See "Making a Partial Copy as a Test and Copying the Rest of the Original", User Guide in English.
  • Page 34: How To Use The Fax Screen

    1. Introduction and Basic Operations 1. Copy function keys Press a key to select the function to assign to the key. The keys with assigned functions are displayed in yellow. To see the display area in the illustration below, press or flick to the left or right.
  • Page 35 Basic Operation of Applications 1. Destination type selection Switch the destination type between [Fax] (including IP-Fax) , [Internet Fax], [Email] and [Folder]. The items displayed in the address book and destination entry screen for manual entry change also when you switch the destination type. 2.
  • Page 36: How To Use The Scanner Screen

    1. Introduction and Basic Operations How to Use the Scanner Screen There are five kinds of functions and settings on the Scanner screen. 1. Destination type selection You can switch between [Scan to Email] and [Scan to Folder]. The items displayed in the address book and destination entry screen for manual entry also change when you switch the destination type.
  • Page 37: How To Use The Document Server Screen

    Basic Operation of Applications 5. Recommended Settings You can see the preset settings in the machine. How to Use the Document Server Screen In the [Document Server] screen, you can store the documents in the machine by scanning them. Scanned documents are stored in a folder on the document server. You can print and confirm the details of stored documents.
  • Page 38 1. Introduction and Basic Operations 2. Search key Press to search for the folder. 3. Status of the document server Shows the amount of memory available on the document server. 4. [Close] Press to close the [Edit Folder/File] screen. 5. [Create New Folder] Press to create a new folder.
  • Page 39 Basic Operation of Applications Press the same sort key again to switch between ascending and descending order. 3. Search key Press to search for the document. 4. Display selector Press to switch between the list and thumbnail displays. 5. [Preview/Details] Press to preview the document or confirm details, such as file size.
  • Page 40: User Authentication

    1. Introduction and Basic Operations User Authentication Logging In from the Control Panel When the machine is configured by the administrator to restrict use by unauthorized users, you must authenticate your login information before starting the operation. The authentication methods are described below. •...
  • Page 41 User Authentication To prevent use of the machine by an unauthorized person, always log out when you have finished using the machine. While a user is logged in, the name of the user is displayed in the system message. • If the machine is not used for a specified period, the user is automatically logged out (Auto Logout).
  • Page 42 1. Introduction and Basic Operations 2. Press [User Name]. 3. Enter the login user name, and then press [Done]. 4. Press [Password]. 5. Enter the login password, and then press [Done]. 6. Press [Login]. • If an incorrect password is entered a specified number of times, login with the same name is disabled (Lockout Function).
  • Page 43 Logging In Using a Mobile Device Log in to the machine using the RICOH Smart Device Connector app on your mobile device. You need a mobile device that supports Bluetooth Low Energy (BLE).
  • Page 44 1. Introduction and Basic Operations 3. Press [NEXT]. 4. Display the login screen on the control panel of the machine, and hold the mobile device over the touch mark. • To log out from the machine, hold the mobile device over the touch mark on the control panel or press [Logout] at the top right on the screen.
  • Page 45 User Authentication Changing the Login Password by Using the Control Panel When Basic Authentication, Windows Authentication, or LDAP Authentication is configured on the machine, change the password periodically to prevent use of the machine by an unauthorized person. Passwords can contain the following characters. Make the password difficult to guess. •...
  • Page 46 1. Introduction and Basic Operations 6. Press [OK] twice. 7. After completing the procedure, press [Home] ( • If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book. •...
  • Page 47: Customization Of The Machine Settings

    Customization of the Machine Settings Customization of the Machine Settings Adding a Frequently Used Application or Widget to the Home Screen You can use a frequently used icon or widget easily by adding it to the Home screen. You can organize the icons on the Home screen as you like by changing their order or using folders.
  • Page 48 1. Introduction and Basic Operations Adding an Icon/Widget to the Home Screen 1. Press the application list icon on the Home screen. 2. Press and hold the icon or widget to be added to the application list screen. • Select the [WIDGET] tab to add a widget, or select the [PROGRAM] tab to add a program.
  • Page 49: Registering/Changing/Deleting A Program That Is Component Of Frequently Used Settings

    Customization of the Machine Settings 1. Press [Menu] ( ) on the bottom center of the Home screen. 2. Press [Reset Home Screen], and then press [OK]. Creating a Folder to Organize Icons 1. Press and hold a spot on the Home screen where you want to create a folder. 2.
  • Page 50 1. Introduction and Basic Operations • You can register the following number of items as programs. • Copy: 25 items • Fax: 100 items • Scanner: 100 items • Document Server: 25 items You can prohibit users other than the machine administrator, or a custom-privileges administrator that has equal privileges, from registering a program.
  • Page 51 Customization of the Machine Settings 2. Specify scan and output settings to be registered as a program. When using the Document Server, specify the settings on the [Print Settings] screen. To display the [Print Settings] screen, select the document to print on the [Print File] screen, and then press [Print Settings].
  • Page 52 1. Introduction and Basic Operations Even if you select [Cancel], you can add shortcuts to the program to the Home screen after the program registration is complete. Shortcuts to programs stored in Document Server mode cannot be registered to the [Home] screen.
  • Page 53 Customization of the Machine Settings 3. Press the program number to be changed. 4. Change the scan and output settings. 5. Press [Menu] ( ), and then press [Set Current Settings to Program]. 6. Select a program number to register the changed settings. •...
  • Page 54: Placing An Original And Loading Paper

    1. Introduction and Basic Operations Placing an Original and Loading Paper Placing an Original on the Exposure Glass Use the exposure glass to scan originals that cannot be placed in the auto document feeder (ADF), such as books and license cards. •...
  • Page 55: Placing An Original In The Auto Document Feeder (Adf)

    Placing an Original and Loading Paper page 361 "Sizes Detectable with Auto Paper Select_Mts4-Lfy1-Mine4" 3. Lower the ADF. • When you place a thick book or three-dimensional original on the exposure glass and lower the ADF, the back side of the ADF rises up to accommodate the original. •...
  • Page 56 1. Introduction and Basic Operations • For details about the sizes of originals that you can place in the ADF, see the following: page 360 "Recommended Original Size and Weight_Mts4-Lfy1-Artm1a-Mine4" page 361 "Sizes Detectable with Auto Paper Select_Mts4-Lfy1-Mine4" • If the originals described below are placed in the ADF, it may cause misfeeds, white lines, or black lines, or result in damage to the originals.
  • Page 57 Placing an Original and Loading Paper • Do not set an original that is wet with correcting fluid or ink. The scanning glass will be stained and the stain will be scanned with the original. Placing Originals in the One-pass Duplex Scanning ADF •...
  • Page 58: Loading Paper Into The Paper Tray

    1. Introduction and Basic Operations • If you are using the document feeder paper guide tray (option) to scan originals longer than A4 or 8 size, raise the ADF's extender and pull out the output tray extender. Loading Paper into the Paper Tray The method of loading paper varies for each tray type.
  • Page 59 Placing an Original and Loading Paper • Before loading paper into a tray, check the paper size and type that can be loaded in the tray. page 347 "Recommended Paper Sizes and Types" • To load thin paper, thick paper, or other special paper, specify the paper type or thickness in [Tray/Paper Settings] of [Settings].
  • Page 60 1. Introduction and Basic Operations • Do not stack paper over the limit mark. If you load paper over the limit mark, the printed images may become slanted or a paper jam may occur. Load paper into every tray in the same way. In the following example procedure, Tray 1 is used.
  • Page 61 Placing an Original and Loading Paper 5. Square the paper and load it with the print side facing up. Fan sheets before loading so that multiple sheets of paper do not stick to each other and are not fed at once. Check the paper edges are aligned at the right side.
  • Page 62 1. Introduction and Basic Operations 1. Open the bypass tray. Make sure that the bypass tray is fully opened. When loading paper larger than the bypass tray (longer than A4 or 8 × 11 paper in landscape orientation), pull out the extender. 2.
  • Page 63 Placing an Original and Loading Paper • To load paper on the bypass tray, it is better to orient it in the direction of Specifying Regular Sizes Using the Control Panel 1. Press [Settings] on the Home screen. 2. Press [Tray/Paper Settings]. 3.
  • Page 64 1. Introduction and Basic Operations 5. Press [Paper Size]. To specify for the bypass tray, press [Paper Size: Printer]. 6. Choose one paper size from the list shown, and then press [OK]. 7. Press [OK]. 8. After completing the configuration, press [Home] ( Specifying a Custom Size Paper Using the Control Panel 1.
  • Page 65 Placing an Original and Loading Paper 3. Press [Paper Size/Paper Type]. 4. Press one tray to set. 5. Press [Paper Size]. To specify for the bypass tray, press [Paper Size: Printer]. 6. Press [Custom] from the list shown. 7. Press the value in the "A" or "B" field, and then enter the new value. Specify the values within the numbers of "<...
  • Page 66: On The Control Panel

    1. Introduction and Basic Operations 8. Press [OK] three times. 9. After completing the configuration, press [Home] ( Specifying Paper Type and Thickness Settings If the print settings and the loaded paper that are used for a print job do not match, a mismatch error occurs.
  • Page 67 Placing an Original and Loading Paper 2. Press [Tray/Paper Settings]. 3. Press [Paper Size/Paper Type]. 4. Press one tray to set. 5. Press [Paper Type/Thickness].
  • Page 68 1. Introduction and Basic Operations 6. Choose one paper type and paper thickness from the list shown, and then press [OK]. 7. Press [OK]. 8. After completing the configuration, press [Home] (...
  • Page 69: Address Book

    Address Book Address Book Registering/Changing/Deleting Fax Numbers in the Address Book By registering the destinations to which you frequently send faxes together with the send conditions in the address book, you can easily send faxes. Registering a Fax Number and Send Conditions 1.
  • Page 70 1. Introduction and Basic Operations 4. Press [Destinations] tab [Fax]. 5. Specify the Fax Destinations and send conditions. • Select Line: Select the line to use. • Fax Destination: Register the fax destination. • International Transmission Mode: Specify whether to reduce errors occurring when sending abroad.
  • Page 71 Address Book 7. Press [OK]. 8. After completing the procedure, press [Home] ( 9. When a message prompting you to back up the address book appears on the screen, press [Go to Backup] to back up the address book. • If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book.
  • Page 72 1. Introduction and Basic Operations See "Making a Backup or Restoring the Address Book", User Guide in English.
  • Page 73: Operating Or Configuring The Machine From Computer (Web Image Monitor)

    Operating or Configuring the Machine from Computer (Web Image Monitor) Operating or Configuring the Machine from Computer (Web Image Monitor) Web Image Monitor is a tool that can check the machine status and configure machine settings from your computer. If the machine and your computer are ready to connect to the network, you can access Web Image Monitor just by entering the IP address or host name of the machine in the address bar of your web browser.
  • Page 74 1. Introduction and Basic Operations Function summary Procedure and reference Displaying list/history of print jobs, and • Job list canceling print jobs Displayed by going to You can check the printing status and [Status/Information] in Web Image print history of the machine from your Monitor [Job] [Job List]...
  • Page 75 Operating or Configuring the Machine from Computer (Web Image Monitor) Function summary Procedure and reference Setting auto email notification See "Machine Status Notification by E- mail", User Guide in English. You can configure the machine to send emails to notify you about the machine's status, such as when paper has run out or a paper jam has occurred.
  • Page 76: What You Can Do On The Web Image Monitor

    1. Introduction and Basic Operations Function summary Procedure and reference See "Restricting the Users Who Can Access the Stored Reception Files", User Guide in English. Registration of the address book See "Registering User Information from Web Image Monitor", User Guide in You can add login users or destinations to English.
  • Page 77: Accessing To Web Image Monitor

    Operating or Configuring the Machine from Computer (Web Image Monitor) What you can do Function Not logged in User Administrator Machine status Machine settings Machine setting change Job list Job history Access to Address Book File operation in Document Server Network settings Network settings change Cancel printing...
  • Page 78: Web Image Monitor Screen

    1. Introduction and Basic Operations When entering the IPv4 address, do not enter "0" for each segment. If "192.168.001.010" is entered, you cannot access the machine. 2. Confirming the machine status or settings on the top page of Web Image Monitor. The machine status and remaining amount of consumables are displayed.
  • Page 79: Specifying Web Image Monitor Help

    Operating or Configuring the Machine from Computer (Web Image Monitor) • Status/Information: Displays the machine status, option configuration, counter, and job status. • Device Management: Manages the machine settings and Address Book. • Print Job/Stored File: Operates the files stored in the printer driver or document server.
  • Page 80 1. Introduction and Basic Operations 2. Click [Configuration] on the "Device Management" menu on Web Image Monitor. 3. Click [Webpage] under the "Webpage" category. 4. In "Download Help File", select the operating system and displayed language, and then click [Download]. 5.
  • Page 81: Basic Copying

    2. Copy Basic Copying Basic Procedure for Copying Documents Set the original on the exposure glass or auto document feeder (ADF) to make a copy. • If the previous setting is still active, press [Reset] before copying. 1. Press [Copy] on the Home screen. 2.
  • Page 82 2. Copy The landscape original larger than A5 or 8 " × 5 " (LT) (A4 or 8 " × 11"(LT)) • When placing on the ADF The portrait original larger than A4 or 8 " × 11" (LT) (A3 or 11" × 17") Place Orientation Exposure Glass...
  • Page 83 Basic Copying 5. Press [ ] or [ ] in [Quantity] to specify the number of copies. You can enter this using the keyboard after pressing [Quantity] or a number. 6. Press the paper tray select key and select the paper to use as necessary. •...
  • Page 84 2. Copy • You cannot specify this function together with Auto Paper Select. If the Auto Paper Select is specified, press the paper tray select key and select the paper tray to use. 1. Measure the vertical (Y) and horizontal (X) lengths of the original. 2.
  • Page 85 Basic Copying 7. Check that the orientation of the original is specified correctly, and then press [OK]. 8. Press the paper tray select key and select the paper to use as necessary. 9. Press [Start]. Reserving a Copy Job While Executing Another Copy Job When [Reserve] is displayed on the execution screen of the current copy job, you can scan the original of another copy job to execute after the current job is completed (Job Preset).
  • Page 86 2. Copy • To cancel the last reserved job or confirm the content of the current job, press [Job Confirmation]. • You can confirm and cancel reserved contents on the [Check Status] screen. For details, see the following section: See "Deleting an Unnecessary Job from the Print Queue", User Guide in English. Interrupting the Current Copy to Copy Another Original When [Interrupt] is displayed on the copy processing screen, you can pause the current copy to scan and copy another original (Interrupt mode).
  • Page 87: Making Enlarged Or Reduced Copies

    Basic Copying Making Enlarged or Reduced Copies You can enlarge or reduce the original when copying with the following methods: • Enlarging or reducing at a specified reduction ratio or into a specified size (Zoom/Reduce/Enlarge/Size Magnification/Directional Magnification (%)/Directional Size Magnification) •...
  • Page 88 2. Copy or reduce from the same point, set the original on the exposure glass and perform 2- sided copy. 3. Press [Copy Ratio] and select a copy ratio or size. To specify a copy ratio or size other than the displayed setting, press [Others] and perform the following procedure.
  • Page 89 Basic Copying Specify the vertical and horizontal lengths (Directional Size Magnification) Scroll down the [Copy Ratio] screen to press [Directional Mag.(mm)] or [Directional Mag.(inch)], and then enter the length of the original and copied image, and then press [OK]. You can separately enlarge or reduce the vertical length and horizontal length of the image.
  • Page 90 2. Copy Enlarging or Reducing According to the Paper Size The original is enlarged or reduced to fit on the specified paper size (Scale to Paper Size). To copy a document whose size cannot be detected, specify [Original Size] on the Copy screen.
  • Page 91: Duplex Copying

    Basic Copying When the orientations of the original and paper in the paper tray do not match, the machine rotates the copied image automatically. To reduce an original of A4 (8 × 11) size to A5 (8 × 5 ) size, for example, you can select either A5 (8 ×...
  • Page 92 2. Copy When you scan the original with the ADF, the size of the original that can be copied differs from that of the 1-sided copy. page 360 "Recommended Original Size and Weight_Mts4-Lfy1-Artm1a-Mine4" For details about the sizes, orientations, and weights of paper that can be used in the duplex function, see the following section: page 364 "Specifications for the Main Unit_Lfy1"...
  • Page 93: Combining And Copying A Multi-Page Original Onto A Single Sheet Of Paper

    Basic Copying 3. Press [OK]. 3. Place the original. page 79 "Basic Procedure for Copying Documents" 4. Press [Start]. When placing the originals on the exposure glass, press [Finish Scn] after scanning all of the originals if necessary according to the setting contents and number of originals.
  • Page 94 2. Copy The arrangement of copied pages and copy ratio varies depending on the original orientation and combined pages. Original Orientation Combine 2 pages Combine 4 pages Combine 8 pages 1. Press [Copy] on the Home screen. 2. On the Copy screen, press [1 sided→Comb 2 orig]. To combine with the settings other than those displayed on the keys 1.
  • Page 95 Basic Copying 3. Press [OK]. 3. Press the paper tray select key and select the paper to copy onto. 4. Place an original. page 79 "Basic Procedure for Copying Documents" To position the right-page first and then the left page when copying an original written longitudinally, place the original upside down in the ADF.
  • Page 96: Copying Onto Envelopes

    2. Copy See "Combine", User Guide in English. • You can change the setting contents of the Combine key on the Copy screen. See "Customize Function", User Guide in English. Copying onto Envelopes To copy onto envelopes that are not usually used, set them in the bypass tray. Copying onto Envelopes in the Bypass Tray •...
  • Page 97 Basic Copying 3. Press [Change Setting]. 4. Select [Envelope], and then proceed to the next screen. To change the envelope weight, press [ChngThickness] to specify the weight. 5. Select the envelope size that you set, and then press [OK]. When you select [Custom Size], enter the envelope size. When the envelope is set with the flap opened, be sure to include the width of the flap.
  • Page 98: Special Copying

    2. Copy Special Copying Copying in Page Order When copying two or more copies of multi-page originals, you can specify the page order. Sort Copies in the order of the original. 1. Press [Copy] on the Home screen. 2. Place the original. page 79 "Basic Procedure for Copying Documents"...
  • Page 99: Document Server

    3. Document Server Saving Documents Saving Documents in Document Server You can save documents scanned by the machine in the document server. You can also save them using the printer driver. See "Storing Documents to Print in the Machine", User Guide in English. •...
  • Page 100 3. Document Server 3. Specify the folder to save documents, the file name, and other settings. • Folder: Select the "Shared Folder" created in the factory default configuration or a user folder created by a user to save the document. To select a user folder, create it in advance.
  • Page 101 Saving Documents • To prevent documents from being deleted automatically, set [Auto Delete File in Document Server] to [Off], and then save the documents. • Even if you change the settings to [Specify Days] or [Specify Hours] after documents have been saved with [Auto Delete File in Document Server] set to [Off], the documents will not be deleted automatically.
  • Page 102: Printing Documents

    3. Document Server Printing Documents Printing Documents in Document Server You can print the documents saved in the document server with the same settings, paper size and other settings specified when the documents were scanned. You can also change the print settings or specify a page to print. •...
  • Page 103 Printing Documents 3. Select a folder. • Press [Search Folder] to search for a folder by folder name or number. • If you select a password-protected folder, enter the password, and then press [OK]. 4. Select the document to print. •...
  • Page 104 3. Document Server • When you select [Printing Order] in the menu to the right of the folder name after selecting multiple documents, the selected documents are displayed in the order they are print. • Press [Selected File:] to display only the documents that you have selected. •...
  • Page 105 Printing Documents 2. On the document server screen, press [Print File]. 3. Select a folder. • Press [Search Folder] to search for a folder by folder name or number. • If you select a password-protected folder, enter the password, and then press [OK].
  • Page 106 3. Document Server 6. Press [Start]. Specifying a Page to Print 1. On the Home screen, press [Document Server]. 2. On the document server screen, press [Print File]. 3. Select a folder. • Press [Search Folder] to search for a folder by folder name or number. •...
  • Page 107 Printing Documents 6. Specify the page to print. • Specify Page: Enter the page to print. • Specify Range: Enter the page printing starts in "Start Page" and the page printing ends in "End Page". • Select Tray: Select a paper tray to use for printing. 7.
  • Page 108 3. Document Server...
  • Page 109: Fax

    4. Fax Fax Transmission Basic Procedure for Transmitting Faxes The machine scans an original to transmit it by fax into the machine's memory before establishing a communication with the destination (Memory Transmission). You can also transmit a fax while confirming the status of the fax destination. See "Sending a Fax While Scanning the Original", User Guide in English.
  • Page 110 4. Fax 5. Specify the destination. • To enter the fax number manually, select the destination from the destination history, or search for the destination in the machine address book and registered LDAP server, press , and specify the destination. You can also enter the fax number manually by pressing You can select only the destination entered using the numeric keypad from the history.
  • Page 111 Fax Transmission • If you want to change the registered contents of the specified destination or register a new destination, press and then select [Add/Edit Address Book] to change or newly register the destination on the address book screen. page 67 "Registering/Changing/Deleting Fax Numbers in the Address Book_Mts4-Lfy1-Artm1a-Mine4"...
  • Page 112 4. Fax • To use tone-dialing in a pulse-dialing environment, press [Tone]. A tone signal is generated for every number you enter afterward. • You can perform immediate transmission only when the total number of destinations specified for all documents exceeds the maximum value. •...
  • Page 113: Fax Transmission (Application)

    Fax Transmission (Application) Fax Transmission (Application) Confirming the Scanned Image Before Sending a Fax You can display the preview of the scanned document on the display of the machine to check if it is scanned as specified. This function cannot be used when sending a fax while using any of the following: •...
  • Page 114 4. Fax 5. Specify the destination on the fax screen, and then press [Start]. 6. Check the preview. • Flick the image left or right to switch between the pages. • Pinch in or out on the image to zoom in or out. 7.
  • Page 115: Confirmation Of The Transmission Information

    Confirmation of the Transmission Information Confirmation of the Transmission Information Viewing the Transmission Result of Sent Faxes You can check the result of a fax transmission on the fax screen, in various reports, or on the screen of a computer. The following reports are printed according to the transmission result or the settings: •...
  • Page 116 4. Fax 2. Press [Job Status/Stop] on the fax screen. 3. Press [Transmission Result], and select the transmission result to display. • Display All Displays the transmission results from among the total number of both transmission and reception results, which cannot exceed 1,000. •...
  • Page 117 Confirmation of the Transmission Information • To display the result of the transmission that is completed while displaying the transmission results, close the transmission result screen and open it again. • You cannot confirm or change an outgoing document in LAN-Fax, document waiting, or document whose status is "Trnsmtg.".
  • Page 118 4. Fax Viewing Memory Storage Report This report is printed when [Print] is selected in "Memory Storage Report" under [Fax Settings] [Others] [Report Output Settings] [Report Auto Print Settings] and a document to be sent by Memory Transmission is stored in the memory. See "Others (Fax Settings)", User Guide in English.
  • Page 119 Confirmation of the Transmission Information 4. Select the [Notification of Result] check box, and then press [OK]. 5. To send a notification e-mail to a destination other than the sender, press [Notification of Result] on the [Settings] screen, and then specify the destination of the e-mail.
  • Page 120 4. Fax 1. Log in to Web Image Monitor as the machine administrator. When administrators with custom privileges are registered, an administrator with privileges to operate jobs can also log in to the machine and change settings. See "Logging in to Web Image Monitor", User Guide in English. 2.
  • Page 121: Printer

    5. Printer Basic Printing Basic Procedure for Printing Documents Specify the printer driver and configure the Document Size, Paper Type, and other settings to print a document. To print a document on the computer, you must install the printer driver on the computer.
  • Page 122 5. Printer 2. Specify the Document Size, Paper Type, Input Tray, and other settings. You can configure the basic settings just by using the [Basic] tab. • Job Type: Select [Normal Print] to execute printing immediately. You can make a partial print as a test and proceed to print the rest of the document (Sample Print).
  • Page 123 Basic Printing • Orientation: Specify the orientation of the document. Select Portrait or Landscape. • Input Tray: Select the tray loaded with the paper to use. When you select [Auto Tray Select], a suitable paper tray is selected automatically according to the specified [Print On] and [Paper Type].
  • Page 124: Paper Feed

    5. Printer 1. Open a document to print on the computer, and click [Print] on the [File] menu. 2. Select the printer you use from [Printer:]. 3. Specify Paper Size, Orientation, and other settings. • Copies: Enter the print quantity. •...
  • Page 125: Printer Features

    Basic Printing Job Log • Job Type: Select [Normal Print] to execute printing immediately. You can make a partial print as a test and proceed to print the rest of the document (Sample Print). See "Making a Partial Print as a Test and Printing the Rest of the Document ", User Guide in English.
  • Page 126: Combining And Printing Multiple Pages On A Single Sheet Of Paper

    5. Printer Orientation Long Edge Bind: Short Edge Bind: Left/Top Top/Left Landscape 4. After completing the configuration, click [OK] to print. Specifying 2-sided Print (macOS) Specify 2-sided Print on the [Layout] menu. 1. Open a document to print on the computer, and display the setting screen of the printer driver from the print menu in the application.
  • Page 127: Printing On Envelopes

    Basic Printing Specifying the Combine 2 Originals Function (Windows) Specify the Combine 2 Originals function on the [Basic] tab. 1. Open a document to print on the computer, and display the setting screen of the printer driver from the print menu in the application. 2.
  • Page 128 5. Printer Printing on Envelopes Loaded on the Bypass Tray 1. Load an envelope in the Bypass Tray. Types and orientations of envelopes Bypass Tray Side-opening envelopes Flap: open Bottom side of the envelope: left Printing surface: lower side Side-opening envelopes Flap: close Bottom side of the envelope: back Printing surface: lower side...
  • Page 129 Basic Printing 4. Press [Paper Size/Paper Type]. 5. Press [Bypass Tray] [Paper Size: Printer], and then select the size of the envelopes. • If the size of the loaded envelope is not included in the list, select [Custom] and enter the value. 6.
  • Page 130 5. Printer 8. Press [OK] twice. 9. After completing the configuration, press [Home] ( 10. Open a document to print in the computer, and display the setting screen of the printer driver from the print menu application. 11. Specify the paper size and paper type. Windows •...
  • Page 131 Basic Printing macOS • Paper Size: Select the envelope size. If the envelope size is not included among the options, select [Manage Custom Sizes] and enter the value. • Paper Type: Envelope To print in landscape orientation, select [On] for [Rotate by 180 degrees] in [Basic] in "Feature Sets".
  • Page 132: Storing And Printing Documents

    5. Printer Storing and Printing Documents Printing Documents Stored in the Printer from the Control Panel To print a document stored from the printer driver in the machine, perform the print operation on Quick Print Release of the control panel. The file administrator also can delete unneeded documents and unlock documents locked by entering an invalid password.
  • Page 133 Storing and Printing Documents 4. Press [Print] twice.
  • Page 134: Printing From A Storage Media

    5. Printer Printing from a Storage Media Printing from a USB Flash Memory Device Directly You can connect a memory storage device to the media slot of the machine and print the files stored on it. Use this to print external data easily. •...
  • Page 135 Printing from a Storage Media • The PDF file of a custom size may not be printed. Printing from a Memory Storage Device or Scan Application 1. On the Home screen, press [Print/Scan (Memory Storage Device)] 2. Insert a memory storage device in the media slot on the side of the control panel. 3.
  • Page 136 5. Printer 5. Press [Print Settings] to specify the settings of 2-Sided Print or Finishing as necessary. • Copy Ratio: Select whether to print in the original size or to reduce or enlarge to match the paper size. • Quantity: Enter the print quantity. •...
  • Page 137: Scan

    6. Scan Basic Scanning Scanning Documents and Sending the Scanned Data by E-mail Scan a document and attach the scanned data to an e-mail and send it from the machine. • Configure the SMTP server and network settings in advance. See "Configuring the Settings to Send E-mails from the Machine", User Guide in English.
  • Page 138 6. Scan 2. Select [Scan to Email] on the scanner screen. 3. Place the original on the scanner. See "Placing an Original to Scan", User Guide in English. 4. Press [Send Settings] on the scanner screen. 5. Press [Sender] and specify the sender. •...
  • Page 139 Basic Scanning • To enter the e-mail address manually, select the destination from the destination history, or search for the destination in the machine address book and registered LDAP server, press , and specify the destination. • When specifying an e-mail address by entering it manually, you can register the e-mail address in the address book before sending the e-mail.
  • Page 140 6. Scan • If you want to change the registered contents of the specified destination or register a new destination, press and then select [Add/Edit Address Book] to change or newly register a destination on the address book screen. See "Registering/Changing/Deleting E-mail Addresses in the Address Book", User Guide in English.
  • Page 141: Scanning Documents And Sending The Scanned Data To A Folder

    Basic Scanning • When searching for a destination in the machine address book and registered LDAP server, if the search takes too long, you can press [Cancel] to stop the search. Also, if there are too many search results to find the desired destination, you can change the search character string and search again by pressing the character input field on the search result display screen.
  • Page 142 6. Scan 3. Enter "ipconfig/all" and press the [Enter] key. 4. Check the host name, enable/disable status of the DHCP server and IP address, and write down the information in [1] on the check sheet. When the screen shown above is displayed, fill in the sheet as follow: 5.
  • Page 143 Basic Scanning 7. Check the login password on the computer, and write down the information in [3] on the check sheet. The required information on the computer is confirmed. Now create a shared folder on your computer and specify the access permissions of the folder. •...
  • Page 144 6. Scan 5. Select the [Share this folder] check box, and then click [Permissions]. After completing the procedure, remove Everyone (unspecified user), and then add a user allowed access the folder. The user whose information is written down on the check sheet is used in the example shown below.
  • Page 145 Basic Scanning 12. Click [OK]. 13. Select the added user, and then select the [Allow] check box of [Change] under [Permissions]. 14. Click [OK]. 15. Click [OK] [Close]. The access permissions on the folder have been successfully configured. If you want to specify access permissions for the folder to allow other users or groups to access the folder, configure the folder as follows:...
  • Page 146 6. Scan 1. Right-click the created folder and then click [Properties]. 2. Click [Edit...] on the [Security] tab. 3. Click [Add] [Advanced]. 4. Select [Object Types] or [Locations] and click [Find Now]. 5. Select the user or group to assign permissions and click [OK]. 6.
  • Page 147 Basic Scanning 7. Click the Apple menu and select [System Preferences]. 8. In [Network], click an Ethernet connection name or [Wi-Fi] and write down the displayed IP address in [1] on the check sheet. The required information on the computer is configured. Now create a shared folder. •...
  • Page 148 6. Scan When the [Authenticate] screen is displayed, enter the password of the selected account and then click [OK]. 5. Click [+] below [Shared Folders] on the [Sharing] screen. 6. Specify the folder created in Step 1 and click [Add]. 7.
  • Page 149 Basic Scanning 2. Press [Register] on the address book screen. 3. Enter the information of the destination in the input boxes displayed on the [Name] tab, and select the title to classify the destination. 4. Press the [Destinations] tab, and then press [Folder]. 5.
  • Page 150 6. Scan Selecting a folder from the list Enter the IP address or host name of the computer on which to search for a shared folder, press [Browse Network], and then select the destination folder. Depending on the connection destination, you may need to enter the login user name and password.
  • Page 151 Basic Scanning Basic Procedure for Performing Send to Folder 1. Press [Scanner] on the Home screen. 2. Select [To Folder] on the scanner screen. 3. Place the original on the scanner. See "Placing an Original to Scan", User Guide in English. 4.
  • Page 152: Scanning An Original With Suitable Quality And Density

    6. Scan • To specify the destination again, press • You can also select the destination using the address book displayed on the scanner screen. 6. Press [Start]. • If any of the machine's security functions are enabled, select the destination from the registered folder only when you send files by Scan to Folder.
  • Page 153 Basic Scanning Original Type Appropriate for • Dropout Color The machine scans the original while erasing the specified color (Chromatic Color, Red, Green, Blue). To specify a color to erase more precisely, move toward [Narrow] in the color range to erase. Black &...
  • Page 154 6. Scan When adjusting the density • Move to the left or right to adjust the density. The colors in the scanned image darken as you move the slider to the right. • Press [Density], and then select the [Auto Density] check box to adjust the density automatically when scanning an original with a non-white background such as newspaper or a document that has show-through.
  • Page 155: Settings For E-Mail And Scan Data

    Settings for E-mail and Scan Data Settings for E-mail and Scan Data Specifying the File Type or File Name When Scanning a Document Specify the settings in [Send Settings] on the scanner screen. 1. Press [Scanner] on the Home screen. 2.
  • Page 156 6. Scan • Single Page: PDF, High Compression PDF, PDF/A, TIFF, JPEG If you select a single-page file type when scanning multiple originals, one file is created for each single page and the number of files sent is the same as the number of pages scanned.
  • Page 157 Settings for E-mail and Scan Data page 135 "Scanning Documents and Sending the Scanned Data by E-mail" 8. Specify the destination on the scanner screen, and press [Start]. • You can also set the security and digital signature and embed text information in the PDF file.
  • Page 158 6. Scan • High Compression PDF is not compatible with Adobe Acrobat Reader 5.0/Adobe Reader 6.0 or earlier versions. • When [High Comp. PDF] is selected as the file type for scanning, areas of uneven density may appear in the scan file. If this happens, change the PDF File setting to [PDF/A] or [PDF].
  • Page 159: Maintenance

    7. Maintenance Replacement and Replenishment of Consumables Replacing the Toner You can view the procedure to replace the toner by watching a movie that is displayed on the control panel. • Replace the toner after the message prompting replacement is displayed on the control panel.
  • Page 160 7. Maintenance 2. Press the play ( ) key. 3. Replace the toner by following the procedure shown in the video. • You can transmit data in the fax or scanner function even after the toner runs out. However, you cannot transmit a fax when the number of times of reception and transmission performed in the fax function after the toner has run out and the number of times of communication not recorded in the Records exceeds a total of 1,000.
  • Page 161 Replacement and Replenishment of Consumables • The following explains the warning messages on the plastic bag used in this product's packaging: • Do not leave the polythene materials (bags, etc.) supplied with this machine close to babies and small children. Suffocation can result if polythene materials are brought into contact with the mouth or nose.
  • Page 162: Replacing The Waste Toner Bottle

    7. Maintenance When disposing a depleted print cartridge, place the cartridge in a box or plastic bag while paying attention not to spill any toner powder. (mainly Europe and Asia) If you want to discard your used toner container, please contact your local sales office. If you discard it by yourself, treat it as general plastic waste material.
  • Page 163 Replacement and Replenishment of Consumables 2. Press the play ( ) key. 3. Replace the waste toner bottle by following the procedure shown in the video. Precautions When Replacing the Waste Toner Bottle • Do not store toner (new or used) or toner containers while toner is inside in a place with an open flame.
  • Page 164 7. Maintenance • If toner (new or used) comes into contact with your skin or clothes and smears them, take the following actions: • If toner comes into contact with your skin, wash the affected area thoroughly with soap and water. •...
  • Page 165: Troubleshooting

    8. Troubleshooting Getting Started Alert Sounds The machine notifies you with an alert sound when a paper jam occurs, the original is left on the machine, or another problem occurs. Listen to the alert sound for one of the patterns described below, and perform the required procedure accordingly. Condition Solution Sound pattern...
  • Page 166: Checking The Indicators, Icons, And Messages On The Control Panel

    8. Troubleshooting Condition Solution Sound pattern Five short beeps Warning Check the message displayed on the screen, and resolve the (repeating five times) problem by removing the jammed paper or original, or replacing the toner. 12 short beeps Blank Page Detected Check that the original is placed in the ADF with the side to scan facing up.
  • Page 167 Getting Started Displays a message indicating the status of the machine or application. Press the message to display it in full text. You can also view more than one message as a list. • [Check Status] indicator If there is a problem such as a paper jam, the [Check Status] indicator lights up or flashes along with a message displayed on the screen.
  • Page 168 8. Troubleshooting When the [Check Status] Indicator is lit or flashing The [Check Status] indicator notifies the user when the machine requires immediate attention. Lit in red The machine is unavailable for use. Press [Check Status] and resolve the problem as soon as possible.
  • Page 169: When The Machine Cannot Be Operated

    Getting Started • Depending on the machine condition, such as a paper jam or open cover, the status confirmation screen may be displayed automatically without pressing [Check Status]. When the Machine Cannot Be Operated • If a message is displayed on the screen, check the message. page 173 "When a Message Appears and the Machine Cannot Be Operated"...
  • Page 170 8. Troubleshooting Condition Cause Solution and reference There may be a problem After checking that the screen is with the wall outlet. not lit when you touch it and the main power indicator is unlit, plug the power cord into a confirmed operating wall outlet.
  • Page 171 Getting Started Condition Cause Solution and reference When a backup of the address book is being created using Web Image Monitor or another method, the next function is executed after the backup is completed. The key is unresponsive, A malfunction is Turn off the power of the or another key is temporarily occurring on...
  • Page 172 8. Troubleshooting Condition Cause Solution and reference is grayed out The help function cannot be used because the user does if the user does not have not have permission to permission to use the browser use the browser function. If is always grayed function.
  • Page 173 Getting Started Condition Cause Solution and reference The power of the [Main Power Off] is Disable [Weekly Timer Easy machine is turned off specified in the weekly Settings] and [Weekly Timer automatically. timer. Detailed Settings] on [Settings] [System Settings] [Date/Time/Timer] [Timer].
  • Page 174 8. Troubleshooting Condition Cause Solution and reference A proxy server is In the proxy setting of the Web specified. browser, specify the IP address of the machine as an exception. You can check the IP address in [Check Status] "Network". "There is a problem with [Permit SSL/TLS Click [Continue to this website...
  • Page 175: When Messages Appear

    When Messages Appear When Messages Appear When a Message Appears and the Machine Cannot Be Operated Message Condition Solution and reference "Service Call" The machine needs Consider repairing the machine. to be repaired. SCXXX-XX "Contact" "Serial No. of Machine" "Following unit is Condensation is Turn the power off and then wait for a out of order.
  • Page 176 8. Troubleshooting Message Condition Solution and reference page 9 "Turning On and Off the Power" "Please wait." The machine is Wait a while and do not turn off the power preparing to of the machine. perform a function or executing the image stabilization process.
  • Page 177: When A Message Appears While Using The Copy Function

    When Messages Appear • If the message persists even after you have performed the operations as instructed in the following message, a malfunction may temporarily occur on the machine. Turn off the power of the machine, wait for 10 seconds or more after confirming that the main power indicator is turned off, and then turn on the power.
  • Page 178: When A Message Appears While Using Document Server

    8. Troubleshooting Message Condition Solution and reference "2 Sided Copy is not A paper size that is Check the paper size supported in Duplex available with this not supported in copying and the specified finishing type paper size." Duplex copying or and load the supported paper.
  • Page 179: When A Message Appears While Using The Fax Function

    When Messages Appear Message Condition Solution and reference "Cannot detect An original is not Place the original correctly. When you original size." placed on the place an original on the exposure glass, machine. the machine detects the original size by opening and closing the exposure glass cover or ADF.
  • Page 180 8. Troubleshooting Messages that Appear During Operation or When Sending/Receiving a Fax Cannot Be Performed Message Condition Solution and reference "Cannot detect An original is not Place the original correctly. When you original size." placed correctly on place an original on the exposure glass, the machine.
  • Page 181 When Messages Appear Message Condition Solution and reference "Functional The power of the Even if you turn on the power problem occurred. machine was lost immediately, you may not be able to Stopped while receiving an resume reception until the timeout processing."...
  • Page 182 8. Troubleshooting Message Condition Solution and reference "Check whether You do not have Check the access permission settings of there are any permission to the shared folder on the destination network problems." access the shared computer. [14-03] folder specified as page 139 "Scanning Documents and the destination.
  • Page 183 When Messages Appear Message Condition Solution and reference "Check whether The POP3 (IMAP4) Check the settings in [Reception there are any server could not be Protocol], [POP3/IMAP4 Settings] and network problems." found. [Email Communication Port] on [Settings] [15-11] [System Settings] [Send (Email/Folder)] [Email].
  • Page 184 8. Troubleshooting Message Condition Solution and reference "Network The SIP server Specify the correct "SIP Server IP communication has rejected the Address" and "SIP User Name" in failed. Cannot registration of the [Settings] [Fax Settings] [Detailed register this user name. Initial Settings] [IP-Fax Settings] machine to SIP...
  • Page 185 When Messages Appear Message Condition Solution and reference See "Transferring a Received Fax Document to E-mail Address or Folder", User Guide in English. The destination Check that the destination is specified could not be found correctly. when the fax was See "Sending Internet Faxes without sent without using Using SMTP Server", User Guide in...
  • Page 186 8. Troubleshooting Message Condition Solution and reference "Network No free space is Check that free space is available on the communication has available on an SMTP server and the destination failed. Failed to SMTP server, the computer. send. Please check computer specified destination as the destination...
  • Page 187 When Messages Appear Message Condition Solution and reference "Network A malfunction is Check that the SMTP server and the communication has occurring on an destination computers are functioning failed. Failed to SMTP server, the normally. send. Please check computer specified the access privilege as the destination setting of the...
  • Page 188 8. Troubleshooting Message Condition Solution and reference "Network The user name Select the forwarding destination in the communication has and/or password address book, press [Edit], and specify failed. Failed to registered in the [Destinations] tab [Folder] [Folder send. Please check address book are Authentication Info] again.
  • Page 189 When Messages Appear Message Condition Solution and reference "Network [Fax Email Account] Register Email Address in [Settings] communication has is not specified. [Fax Settings] [Detailed Initial failed. Fax email Settings] [Fax Email Account]. address is not registered. Please check settings." [15-03] "Network The destination...
  • Page 190 8. Troubleshooting Message Condition Solution and reference "Network A device certificate Install the correct device certificate. communication has (destination page 306 "Encrypting Network failed. S/MIME certificate) is not Communication" certificate error has registered or has occurred. Please expired. check the certificate of both destination and this machine."...
  • Page 191 When Messages Appear Message Condition Solution and reference "Network The user certificate Install a new user certificate and device communication has (destination certificate. failed. The certificate) and page 306 "Encrypting Network certificate of this device certificate Communication" machine or have expired. destination machine is not currently valid.
  • Page 192 8. Troubleshooting Message Condition Solution and reference "Network The destination • Check that the destination is communication has terminated the specified correctly. failed. The line has communication. • If the destination refuses to receive a been disconnected. fax with no sender information, Please check the enable notifying of the information destination and...
  • Page 193 When Messages Appear Message Condition Solution and reference "Connection with the Another main-machine Register the sub-machine in remote machine has is registered in remote [Settings] [System Settings] failed. There is a machine. [Machine] [Others] problem with the [Register/Change/Delete remote machine Remote Machine].
  • Page 194 8. Troubleshooting Message Condition Solution and reference "Check whether there The machine is not Check that the machine is are any network connected to the connected to the network problems." network. correctly. [16-00] "Connection with the The main-machine is Turn on the power of the main- remote machine has turned off, or not machine.
  • Page 195: When A Message Appears While Using The Printer Function

    When Messages Appear Message Condition Solution and reference "Remote machine The main-machine Check that the IP address or registration is could not be found. host name of the main- incorrect. Contact the machine is specified correctly administrator." in [Settings] [System Settings] [Machine] [Others]...
  • Page 196 8. Troubleshooting Messages that Appear without Error Codes Message Cause Solution and reference "Address Book is The address book is Try again later. currently in use by in use by another another function. function, and Authentication has authentication failed." query is not possible.
  • Page 197 When Messages Appear Message Cause Solution and reference • Is only space(s) entered as the text to use for the background pattern in the unauthorized copy prevention function? • Is Document Server specified as the print method? See "Storing Documents to Print in the Machine", User Guide in English.
  • Page 198 8. Troubleshooting Message Cause Solution and reference "Cannot store data The paper size is Reduce the paper size of the document to of this size." too large. send. The document to send cannot be stored at a custom size. "Classification Code A classification Consult the machine administrator (or is incorrect.
  • Page 199 When Messages Appear Message Cause Solution and reference "Communication The job was Check the status of the Central error with central canceled because a Management machine. management server Central has occurred. The Management job has been communication cancelled." error occurred. "Compressed Data Compressed data is •...
  • Page 200 8. Troubleshooting Message Cause Solution and reference "Exceeded max. The internal storage • Reduce the size of the document to capacity of is almost full. send. Document Server. • Erase documents that are no longer Cannot store." needed. See "Deleting Documents Stored in the Machine", User Guide in English.
  • Page 201 When Messages Appear Message Cause Solution and reference "Exceeded max. The number of • Reduce the number of pages in the number of pages of pages stored in the document to send. Document Server. machine exceeds • Erase documents that are no longer Cannot store."...
  • Page 202 8. Troubleshooting Message Cause Solution and reference "Hardware An error has Turn off the power of the machine, check Problem: Wireless occurred in the that the Wireless LAN board is correctly Card" wireless LAN board. installed in the machine, and then turn on the power.
  • Page 203 When Messages Appear Message Cause Solution and reference page 56 "Loading Paper into the Paper Tray_Mts4-Lfy1-Artm1a- Mine4" "Memory Overflow" The insufficient In the printer driver, go to the [Others] tab memory error has [Special Settings] [Image Quality] occurred while and then change [Vector/Raster:] to printing from the [Raster].
  • Page 204 8. Troubleshooting Message Cause Solution and reference "There is no paper The paper tray • To proceed with printing after tray that matches loaded with paper changing the paper setting, select a the specified paper of the size or type tray and press [Print].
  • Page 205 When Messages Appear Message Cause Solution and reference See "Deleting Documents Stored in the Machine", User Guide in English. See "Deleting Documents from Document Server", User Guide in English. "The print job has The number of Erase documents that are no longer been cancelled documents stored needed.
  • Page 206 8. Troubleshooting Message Cause Solution and reference "You do not have a Authentication Specify the authentication information in privilege to use this information is not the printer driver. For the authentication function. This job registered correctly information, consult the user has been in the printer driver.
  • Page 207 When Messages Appear Message Cause Solution and reference "99: Error" When printing a file Check the data to print. from an USB flash memory device, the file to print is in an unsupported format or corrupt. "AC: Internal The area reserved Delete a registered form or font that is no Storage is full."...
  • Page 208 8. Troubleshooting Message Cause Solution and reference "BAL: The job was Printing of Consult your machine administrator. The cancelled because PostScript 3 and machine administrator checks settings on PS/PDF printing is PDF is not enabled. [Settings] [Printer Settings] [Data prohibited. Please Management/Maintenance] contact the [Administrator Tools]...
  • Page 209 When Messages Appear Message Cause Solution and reference "CM: The job was A timeout error • Check that the machine can cancelled because occurred in communicate properly with the PC. of a timeout error PostScript 3 or PDF • PostScript 3 with PS3/PDF."...
  • Page 210 8. Troubleshooting Message Cause Solution and reference "CQ: Some pages An error occurred in Consider repairing the machine. were not printed RPCS printing, so because they were printing was blank." canceled by the auto job cancel function. "EB: The job was A printing job has Contact your machine administrator (or cancelled because...
  • Page 211: When A Message Appears While Using The Scanner Function

    When Messages Appear Message Cause Solution and reference "EE: There are Two or more paper When specifying [Magazine], use sheets of mixed paper sizes sizes were used the same size. therefore Magazine and [Magazine] finishing is not finishing was not available.
  • Page 212 8. Troubleshooting Messages that Appear on the Control Panel Message Cause Solution and reference "All the pages are The original was • When scanning on the exposure detected as blank. placed with the glass, place the original with the side No file was wrong side facing to scan facing down.
  • Page 213 When Messages Appear Message Cause Solution and reference "Cannot access the An USB flash • Check that the external media is Memory Storage memory device is formatted in FAT16 or FAT32, and Device." unavailable for use. write encryption or protection is not enabled on the media.
  • Page 214 8. Troubleshooting Message Cause Solution and reference "Check original's The original is Depending on the combination of the orientation." placed in the wrong specified settings, the orientation to set orientation. the original differs. Be sure to place the original in the correct orientation. See "Placing an Original to Scan", User Guide in English.
  • Page 215 When Messages Appear Message Cause Solution and reference "Exceeded max. A large size original • Decrease [Send Settings] data capacity." was scanned at a [Resolution]. high resolution, and "Check the • Specify a smaller size in [Send the resulting data scanning Settings] [Scan Size].
  • Page 216 8. Troubleshooting Message Cause Solution and reference "Failed to connect Email was sent to Contact your network administrator. (or to the destination. the destination custom-privileges administrator who has Please contact the without an installed equivalent privilege) Network administrator to certificate of the administrator should install the root check the following.
  • Page 217 When Messages Appear Message Cause Solution and reference "Programmed. A destination • You cannot program a destination Cannot program the specified with a specified with a protection code. folder protection code is Specify this destination individually. destination(s) with included among the •...
  • Page 218 8. Troubleshooting Message Cause Solution and reference "Transmission has The amount of Check that the amount of free space is failed. Insufficient available internal sufficient. memory in the storage space on destination internal the destination storage. To check computer, SMTP the current status, server, or FTP press [Scan Files...
  • Page 219 When Messages Appear Message Cause Solution and reference The driver Register the driver encryption key on encryption key is [Details] [Authenticate] tab in the not registered TWAIN driver. For the driver encryption correctly in the key, consult the network administrator (or TWAIN driver.
  • Page 220 8. Troubleshooting Message Cause Solution and reference "Failed to connect The firewall Configure the firewall function of the to the destination. function is enabled computer to allow communication of the Please contact the on the computer. application used, or disable the firewall administrator to function.
  • Page 221 When Messages Appear Message Cause Solution and reference "Entered User Code The correct user Register the User Code on [Details] is not registered or code is not [Authenticate] tab in the TWAIN driver. you do not have registered in the For the User Code, consult the user access privileges to TWAIN drive when...
  • Page 222 8. Troubleshooting Message Cause Solution and reference There is a problem Check that the computer is connected to with the network the network correctly and in an environment. environment where the TCP/IP protocol can be used. "Fatal error has An unrecoverable Consider repairing the machine.
  • Page 223 When Messages Appear Message Cause Solution and reference The IP address of Check that the host name of the machine the machine could is configured in Network Connection Tool not be resolved that is installed with the TWAIN driver. from the host See "Installing the TWAIN Driver", User name.
  • Page 224: When Other Messages Appear

    8. Troubleshooting Message Cause Solution and reference "There is no The firewall Configure the firewall function of the response from the function is enabled computer to allow communication of the scanner. There may on the computer. application used, or disable the firewall be a number of function.
  • Page 225 When Messages Appear Message Cause Solution and reference "Administrator The User When specifying Basic, Windows, or LDAP Authentication for Management authentication, configure the User User Management privilege is disabled Management privilege in [Settings] must be set to on in the administrator [System Settings] [Settings for before this...
  • Page 226 8. Troubleshooting Message Cause Solution and reference • PDF encryption level: 128-bit AES, 256-bit AES "Firmware update A firmware update It is recommended to apply the update, will start. is available, and the but you can stop the updating process by machine is about to pressing [Stop] within 30 seconds after Press [OK].
  • Page 227 When Messages Appear Message Cause Solution and reference "Problems with the The wireless LAN Turn off the power of the machine, check wireless board." board can be that the wireless LAN board is correctly accessed, but an installed in the machine, and then turn on "Please call error has been the power.
  • Page 228 8. Troubleshooting Message Cause Solution and reference "You do not have The logged-in user Consult the user administrator (or the privileges to use does not have the custom-privileges administrator who has this function." privileges to use the equivalent privilege). The user specified function.
  • Page 229 When Messages Appear Message Cause Solution and reference B/W/L0104-000 The Driver Consult the network administrator (or Encryption Key is custom-privileges administrator who has not registered equivalent privilege) whether the Driver correctly in the Encryption Key is required, and configure TWAIN driver. the driver accordingly.
  • Page 230 8. Troubleshooting Message Cause Solution and reference "Authentication has The account is Request the user administrator (or failed." locked because the custom-privileges administrator who has number of failed equivalent privilege) to unlock the B/W/L0208-000 login attempts has account. B/W/L0208-002 exceeded the limit. "Authentication has Web Image Monitor Try again later.
  • Page 231 When Messages Appear Message Cause Solution and reference "Authentication has The login name Check whether [Login Name Attribute] is failed." attribute is not specified correctly. specified, or an L0400-210 page 271 "Verifying Users to Operate the attribute on which Machine (User Authentication)" the information cannot be obtained is specified.
  • Page 232 8. Troubleshooting Message Cause Solution and reference "Authentication has Too many requests Try again later. If the problem persists, failed." for authentication check whether the machine is under an occurred at one authentication attack. The attack status L0406-200 time. can be checked by the screen message, in the system log, or in the e-mail notification sent to the administrator.
  • Page 233 When Messages Appear Message Cause Solution and reference "Authentication has There was no Check the status of the network and the failed." response returned server to use for authentication. from the W/L0409-000 authentication server, and an authentication timeout error occurred. "Authentication has The user registered •...
  • Page 234 8. Troubleshooting Message Cause Solution and reference "Authentication has Auto-registration of • Check the network communication failed." a user on the server between the client and server machines. B/W/L0913-023 machine has failed when • Registration cannot be performed authentication while the address book of the server machine is being edited.
  • Page 235 When Messages Appear • Check that "Realm Name", "KDC Server Name", "Domain Name" are specified correctly in [Settings] [System Settings] [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change/Delete Realm]. Enter "Realm Name" in upper case. • Configure the setting so that the difference in time between the clocks on KDC and device is less than five minutes.
  • Page 236 8. Troubleshooting Message Cause Solution and reference "Authentication has The card Connect the card authentication device failed." authentication again. Connect the card authentication device has been device to the USB Interface Type A on the *0153-402 removed or is not back left side of the machine.
  • Page 237 When Messages Appear Message Cause Solution and reference "Exceeded time The network is Try again. limit for LDAP busy. server search. The setting Check the setting information of [Settings] Check the server information is [System Settings] [Settings for status." incorrect. Administrator] [Authentication/Charge] [Administrator Authentication/User...
  • Page 238 8. Troubleshooting Message Cause Solution and reference "Signature cannot be set because there is a problem with the device certificate used for the S/MIME signature. Check the device certificate." "Signature cannot The device Use a valid device certificate for the digital be set because the certificate used for signature in PDF or PDF/A.
  • Page 239 When Messages Appear Message Cause Solution and reference "The group destination cannot be selected because it contains a destination with an encryption certificate that is not currently valid. Please check the certificate." "Transmission cannot be performed because the encryption certificate is not currently valid.
  • Page 240 8. Troubleshooting Message Cause Solution and reference "Failed to download the application." "An error has occurred. Failed to install the application." "Could not restore The firmware from The firmware cannot be recovered. the firmware Application Site has because the not been updated. required data does not exist."...
  • Page 241 When Messages Appear Message Cause Solution and reference "No USB memory USB flash memory • Connect the USB flash memory to the for backup is is not connected USB Interface Type A on the back of inserted. Insert the correctly or cannot the machine.
  • Page 242 8. Troubleshooting...
  • Page 243: Security

    9. Security Introduction Taking Measures to Prevent Security Threats Appropriate security measures are required to reduce the risk of information leaks and use by unauthorized persons. The personal information stored in the Address Book and highly confidential files handled by the machine are important information assets. They should be protected from being stolen or abused.
  • Page 244 9. Security Defining the administrator of the machine Select an administrator who performs the maintenance and management of the machine. The administrator performs the important security settings. page 244 "Registering Standard-Privileges Administrators" page 255 "Registering Custom-Privileges Administrators" Preventing unauthorized access by managing the users who can use the machine or the connected network The administrator restricts the users who can use the machine to prevent the unauthorized access by unauthorized persons.
  • Page 245 Introduction Preventing the leak of information by handling files Restrict browsing of files stored in the machine or the Address Book to protect the leak of information by unauthorized persons. See "Specifying Access Privileges for Documents Saved in Document Server", User Guide in English.
  • Page 246: Registering Standard-Privileges Administrators

    9. Security • If the security settings are not configured, the data in the machine may be vulnerable to attack. • To avoid disrupting the work of users, select as administrators who can use the machine proficiently, and then have them supervise the operation of the machine.
  • Page 247 Introduction Types of standard administrator privileges • User Management: Manages information registered in the Address Book. You can add users to the Address Book and change the registered information. • Machine Management: Mainly manages the settings of the devices. You can configure the settings so that the settings for each function can be changed only by the administrator.
  • Page 248 9. Security 2. Log in to the machine as an administrator. Enter the login user name and login password of a built-in administrator to log in to the machine. page 248 "Logging in to the Machine as an Administrator" 3. Register external administrator groups and assign the privileges. Register external administrator groups and assign standard administrator privileges.
  • Page 249 Introduction 3. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Administrator Authentication Management]. 4. For each standard administrator privilege to activate Administrator Authentication, select [On] from the list. • User Management: To manage the information registered in the Address Book, select [On].
  • Page 250 9. Security • Interface Settings: Restrict the settings related to the network. • File Transfer: Restrict the settings related to the e-mail send and receive functions. • Administrator Tools: Mainly restrict the settings related to the network and security. File Management •...
  • Page 251 Introduction To register or change a built-in administrator, follow the procedures described in page 250 "Adding Built-in Administrators or Changing the Privileges". 3. After completing machine operations, press [Logout]. You can also log out of the machine by pressing the energy saver key ( •...
  • Page 252 9. Security 4. Enter the login user name and login password of the administrator, and then click [Login]. 5. After completing machine operations, click [Logout]. Delete the cache memory of a web browser after logging out. • The Web browser might be configured to auto complete login dialog boxes by keeping login user names and passwords.
  • Page 253 Introduction 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator] [Set Administrator Login User Name/Login Password]. 5. Press the desired built-in administrator ([Administrator 1] to [Administrator 4]). 6. Specify the login user name and login password, and then press [OK]. •...
  • Page 254 9. Security Take note of the login user names and login passwords specified for other administrators and inform them of the specified ones. • An administrator with any one of the standard administrator privileges can add built- in administrators or change the privileges as well by logging in to the machine. The privilege(s) that the administrator can assign to other built-in administrators, however, is limited to the same privilege as the one that is assigned to the administrator himself.
  • Page 255 Introduction 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator]. 5. Press [External Administrator Setting] under External Administrator. 6. Select [On] from the list next to External Administrator, and then press [OK]. 7. Press [External Administrator Group Management] under External Administrator. 8.
  • Page 256 9. Security 10. Select [Standard Privileges] next to Privilege Type, and then select the administrator privileges that you want assign to the external administrator. 11. Press [OK]. 12. Press [Close]. 13. Press [OK]. When settings are complete, the machine logs you out automatically. •...
  • Page 257: Registering Custom-Privileges Administrators

    Introduction • You can register external administrator groups and assign the standard administrator privileges using Web Image Monitor as well. For details, see Web Image Monitor Help. Registering Custom-Privileges Administrators When Windows authentication or LDAP authentication is activated as the user authentication method, you can register external administrators as custom-privileges administrators.
  • Page 258 9. Security 4. Register external administrator groups and assign the privileges. Register external administrator groups and assign custom administrator privileges. page 258 "Registering External Administrator Groups and Assigning the Custom Administrator Privileges" Registering Templates for Custom Privileges Register custom administrator privileges to assign to external administrators as templates for custom privileges.
  • Page 259 Introduction 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator]. 5. Press [Template Management] under Custom Privileges. 6. Select [* Not Registered], and then press [Register/Change]. 7. Enter a template name for Template Name. 8. Select custom administrator privileges that you want assign to the template. Select a privilege from the following custom administrator privileges.
  • Page 260 9. Security • To change the name or privilege(s) of the registered template for custom privileges, select a template name in step 6, and then press [Register/Change]. • To delete the registered template for custom privileges, select a template name in step 6, and then press [Delete].
  • Page 261 Introduction 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator]. 5. Press [External Administrator Setting] under External Administrator. 6. Select [On] from the list next to External Administrator, and then press [OK]. 7. Press [External Administrator Group Management] under External Administrator. 8.
  • Page 262 9. Security 10. Select [Custom Privileges] next to Privilege Type, and then select the template for custom privileges that you want assign to the external administrator. You can view the privileges specified for each template for custom privileges by selecting a template and pressing [Privileges List]. 11.
  • Page 263 Introduction Logging in to the machine using the control panel 1. On the Home screen, press [Login]. 2. Enter the login user name and login password of an external administrator with custom administrator privileges, and then press [Login]. If an administrator with custom privileges has no privilege to use an application, such as the copy application, the process is completed.
  • Page 264 9. Security • For the characters that can be used for login user names and passwords, see page 268 "Usable Characters for User Names and Passwords". Logging in to the machine using Web Image Monitor 1. Launch the Web browser. 2.
  • Page 265 Introduction Viewing the Assigned Custom Privileges Custom-privileges administrators can view which privileges are assigned to themselves. Viewing the assigned privileges using the control panel 1. Log in to the machine as a custom-privileges administrator on the control panel. page 260 "Logging in to the Machine as a Custom-Privileges Administrator" 2.
  • Page 266: Using The Supervisor Privilege

    9. Security 2. Click [Configuration] on the [Device Management] menu. 3. Click [Program/Change Administrator] in the "Device Settings" category. 4. Click [List of Privileges of Logged In User]. The list of privileges is displayed. A check mark appears to the left of every assigned privilege.
  • Page 267 Introduction 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator] [Set Administrator Login User Name/Login Password]. 5. Press [Supervisor]. 6. Enter the login user name for Login User Name. 7. Press [Change] next to Login Password. 8. Enter the login password for New Password. 9.
  • Page 268 9. Security 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator] [Set Administrator Login User Name/Login Password]. 5. Press the desired built-in administrator ([Administrator 1] to [Administrator 4]). 6.
  • Page 269 Introduction • You cannot specify the same login user name for the supervisor and the administrators. • Using Web Image Monitor, you can log in as the supervisor and delete an administrator's password or specify a new one. Changing the Administrator Login Setting Only the supervisor has the privilege to allow/prohibit login to the machine by the built-in administrators.
  • Page 270: Usable Characters For User Names And Passwords

    9. Security 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator] [Administrator Login Setting]. 5. Select [Allow] or [Prohibit] from the list next to Administrator Login. 6. Press [OK] twice. When settings are complete, the machine logs you out automatically. Usable Characters for User Names and Passwords The following characters can be used for login user names and passwords.
  • Page 271 Introduction Supervisor/Built-in Administrators/Users External Administrators • There are no restrictions on the types • For the other of characters that can be used for a conditions, the password. For security, it is password policy of recommended to create passwords the external consisting of uppercase or lowercase authentication characters, numbers, and symbols.
  • Page 272: Preventing Unauthorized Accesses

    9. Security Preventing Unauthorized Accesses Taking Measures to Prevent Unauthorized Access Specify the machine to prevent access by anyone from any location so as to protect the information asset. You can prevent unauthorized access by restricting the users who can use the machine and encrypting or restricting the network.
  • Page 273: Verifying Users To Operate The Machine (User Authentication)

    Preventing Unauthorized Accesses Restricting the network connection To block access from an unauthorized computer for TCP/IP communication, restrict the range of IP addresses allowed to access the machine. Also, specify the unused protocols to reduce the risk of intrusion. page 300 "Access Control" Encrypting the network communication Reduce the risk of information leaks by encrypting communication between this machine and the computers or external devices.
  • Page 274 9. Security Select a method depending on the usage condition or the number of users. You cannot use more than one authentication method at the same time. User Authentication Explanation Method User Code Authentication is performed using an up to eight-digit user authentication code registered in the Address Book of the machine.
  • Page 275 Preventing Unauthorized Accesses • If user authentication cannot be performed due to a problem with the machine or network, the machine administrator can disable user authentication temporarily in order to use the machine. Take this measure only during emergencies. • User authentication can also be activated via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 276: Specifying Basic Authentication

    9. Security 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [User Authentication Management]. 5. Select [User Code Authentication] from the list next to User Authentication Management. 6. Under Functions to Restrict, select the functions to restrict against use. •...
  • Page 277 Preventing Unauthorized Accesses 1. Log in to the machine as the machine administrator on the control panel. page 248 "Logging in to the Machine as an Administrator" 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.]...
  • Page 278: Specifying Windows Authentication

    9. Security 7. Press [OK]. 8. Press [Home] ( 9. When the confirmation dialog is displayed, press [OK] to log out of the machine. If registration of the user information is not completed, register the user in the Address Book and specify the login information. See "Registering a User in the Address Book and Specifying the Login Information", User Guide in English.
  • Page 279 Preventing Unauthorized Accesses 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [User Authentication Management]. 5. Select [Windows Authentication] from the list next to User Authentication Management. 6. Register the server for authentication and specify the usable functions. •...
  • Page 280: Specifying Ldap Authentication

    9. Security Users who are registered in multiple groups can use all functions available to those groups. A user who is not registered in any group can use the authority specified in [* Default Group]. By default, all functions are available to the Default Group members.
  • Page 281 Preventing Unauthorized Accesses 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [User Authentication Management]. 5. Select [LDAP Authentication] from the list next to User Authentication Management. 6. Select the server for authentication and specify the available functions. •...
  • Page 282: Registering/Changing/Deleting User Codes

    9. Security the server as the Unique Attribute. You can enter "cn" or "employeeNumber" to use as "serialNumber" or "uid" as long as it is unique. • Available Functions: Specify the functions available to the user for each function. For Printer Job Authentication, specify the security level for print jobs using the printer driver.
  • Page 283 Preventing Unauthorized Accesses 4. On the Address Book screen, select a user, and then press [Edit]. 5. Press [User Management / Other] tab [User Management]. 6. Enter a user code for User Code. When changing a user code, delete the existing user code and enter a new user code.
  • Page 284: Preparing The Server To Use For User Authentication

    9. Security Preparing the Server to Use for User Authentication When using Windows authentication or LDAP authentication as the user authentication method for the first time, check that your server environment meets the requirements for user authentication, and configure the required settings. To use Windows authentication Prepare the server as follows: 1.
  • Page 285 Preventing Unauthorized Accesses Items Explanation • Data transmission between the machine and the KDC (Key Distribution Center) server must be encrypted if Kerberos authentication is enabled. page 306 "Encrypting Network Communication" • The server can authenticate users managed in other domains, but cannot obtain information such as an e-mail address.
  • Page 286 9. Security Items Explanations • To use Kerberos authentication, register the realm to distinguish the network area. See "Registering the Realm", User Guide in English. • Data transmission between the machine and the KDC (Key Distribution Center) server must be encrypted if Kerberos authentication is enabled.
  • Page 287 Preventing Unauthorized Accesses 1. On the [Start] menu, click [Server Manager]. 2. On the [Manage] menu, click [Add Roles and Features]. 3. Click [Next]. 4. Select [Role-based or feature-based installation], and then click [Next]. 5. Select a server, and then click [Next]. 6.
  • Page 288 9. Security 11. Check the role services to install under Web server (IIS), and then click [Next]. 12. Click [Install]. 13. When using Windows Server 2019 or Windows Server 2022, click [Close]. 14. After completing the installation, click the notification icon of the server manager, and then click [Configure Active Directory Certificate Service on the destination server].
  • Page 289: Logging In To The Machine Using An Ic Card Or A Smart Device

    • To authenticate an IC card, use the IC card reader connected to the machine. • To authenticate a smart device, install the cooperative application (RICOH Smart Device Connector) in the smart device so that the Bluetooth function built in the control panel of the machine can authenticate the smart device.
  • Page 290 9. Security 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Network/Interface] [Control Panel: External Interface Software Settings]. 5. From the list next to Select IC Card Reader, select the type of the IC card reader to use.
  • Page 291 Preventing Unauthorized Accesses 8. Press [Home] ( 9. On the Home screen, press the application list. 10. To use a smart device to authenticate, press [Connector] on the [APPS] tab. 11. Press [ ], and then press [Bluetooth Settings]. 12. From the list next to Bluetooth, select [ON]. 13.
  • Page 292 • Hold the smart device over the control panel after performing the following steps. In advance, enable the Bluetooth function of the smart device. 1. Swipe the menu of the RICOH Smart Device Connector application, and then select [Login to MFP].
  • Page 293: Limiting Available Functions

    Preventing Unauthorized Accesses Limiting Available Functions To prevent unauthorized operations, you can specify who is allowed to access each of the machine's functions. Specify the functions available to registered users. By configuring this setting, you can limit the functions available to users. 1.
  • Page 294: Executing A Print Job With Authentication Information Only

    9. Security 6. Press [OK] several times until the Address Book screen is displayed. 7. Press [Exit]. 8. When the confirmation dialog box is displayed, press [Close], and then log out of the machine. To back up the changed contents, press [Go to Backup]. See "Backing Up/Restoring the Address Book Using Control Panel", User Guide in English.
  • Page 295 Preventing Unauthorized Accesses • Simple (All): Authenticates only print jobs from the printer drivers that support user authentication. Print jobs without authentication information specified from a printer driver that does not support user authentication or specified by a command are performed without being authenticated. Select this when printing with a printer driver or device that cannot be identified by the machine.
  • Page 296: Specifying The Policy On Login/Logout

    9. Security *1 Printing is not performed when the encryption method (encryption algorithm) is specified to AES (Advanced Encryption Standard). *2 Printing is not performed when the encryption method (encryption algorithm) is specified to DES (Data Encryption Standard) or AES (Advanced Encryption Standard). •...
  • Page 297 Preventing Unauthorized Accesses page 296 "Specifying User Lockout" • By default, an incorrect login password entry is permitted up to five times and the locked-out state is not released automatically. • The User lockout function is enabled on all users only when Basic authentication is specified.
  • Page 298 9. Security page 298 "Specifying the Time Period to Allow Users to Log In to and Use the Machine" • For details about auto logout from Web Image Monitor, see Web Image Monitor Help. Time Settings Allowing Operating Machine by Logging in When the time period to allow users to log in to and use the machine is specified, the machine logs you out upon completion of the time period.
  • Page 299 Preventing Unauthorized Accesses It takes about 60 seconds for the locked-out state to be actually released after the machine restarts. 5. Click [OK]. 6. Log out of the machine, and then exit the Web browser. Releasing the Locked-out State When a general user is locked out, the user administrator must log in and release the locked-out state.
  • Page 300 9. Security 3. Press [System Settings]. 4. Press [Date/Time/Timer] [Timer] [Auto Logout Timer]. 5. From the list next to Auto Logout Timer, select [On], enter the period of time until the machine logs you out automatically. You can enter from 10 to 999 seconds. 6.
  • Page 301 Preventing Unauthorized Accesses When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Authentication/Charge privilege as well. page 260 "Logging in to the Machine as a Custom-Privileges Administrator" 2. On the Home screen, press [Settings]. 3.
  • Page 302: Access Control

    9. Security Access Control The administrator can limit devices or protocols that can be connected to the machine to avoid unintended access. Also, the administrator can select a security level at which to enable or disable a protocol and to configure the port status. Limiting machine access (access control) You can limit the IP addresses from which devices can access the machine or limit machine access with a firewall.
  • Page 303 Preventing Unauthorized Accesses 1. Log in to the machine as the network administrator from Web Image Monitor. page 248 "Logging in to the Machine as an Administrator" 2. Click [Configuration] on the [Device Management] menu. 3. Click [Access Control] in the "Security" category. 4.
  • Page 304 9. Security • Remote IP Address: Enter destination IP addresses to which to allow outgoing communications. To allow outgoing access to all IP addresses, select [All]. • Remote Port Number: Enter port numbers to which to allow outgoing communications. To allow outgoing communications to all ports, select [All].
  • Page 305 Preventing Unauthorized Accesses Protocol/Port Setting Function that cannot be used when Protocol/Port is method disabled HTTP 2, 3 Transmissions that require HTTP TCP:80 Print using IPP on port 80 HTTPS 2, 3 Transmissions that require HTTP TCP:443 (You can make settings to require SSL transmission only and to reject non-SSL transmission using the control panel or Web Image Monitor.) NetBIOS designated functions on the WINS server...
  • Page 306 UPD:5004, 5005 (Voice) TCP/UDP:49152 (T.38) Bonjour 2, 3 Transmissions that require Bonjour UDP:5353 @Remote 1, 2, 3 RICOH @Remote TCP:7443 TCP:7444 DIPRINT 2, 3, 4, 5 Transmissions that require DIPRINT TCP:9100 1, 2, 3 Remote updating of firmware TCP:10021 WSD (Device)
  • Page 307 Preventing Unauthorized Accesses When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Network/Interface privilege as well. page 260 "Logging in to the Machine as a Custom-Privileges Administrator" 2. On the Home screen, press [Settings]. 3.
  • Page 308: Encrypting Network Communication

    9. Security 2. Click [Configuration] on the [Device Management] menu. 3. Click [Network Security] in the "Security" category. 4. Specify protocols to disable or port numbers to close. 5. Click [OK]. 6. Log out of the machine, and then exit the Web browser. Encrypting Network Communication To protect communicated information, it is necessary to encrypt communication between computers and external equipment.
  • Page 309 Preventing Unauthorized Accesses Data to encrypt Encryption method Process/Reference Kerberos authentication Varies depending on the Select an encryption method. data KDC server • Encrypting Communication Between KDC and the Machine • The administrator is required to manage the expiration of certificates and renew the certificates before they expire.
  • Page 310 9. Security 3. Press [System Settings]. 4. Press [Settings for Administrator] [Security] [Register/Delete Device Certificate]. 5. Select [Certificate 1] and press [Register]. 6. Specify the information to include in the certificate. • Common Name: Enter the name of the device certificate to create. You must enter a name.
  • Page 311 Preventing Unauthorized Accesses 2. Click [Configuration] on the [Device Management] menu. 3. Click [Device Certificate] in the "Security" category. 4. On the "Device Certificate" screen, install a self-signed certificate or certificate issued by a certificate authority by following the instructions below: To install a self-signed certificate Create and install a self-signed certificate.
  • Page 312 9. Security 6. After the device certificate has been issued by the certificate authority, select the number of the issued certificate from the list on the "Device Certificate" screen, and then click [Install]. 7. Enter the contents of the device certificate in the entry fields. •...
  • Page 313: Enabling Ssl/Tls

    Preventing Unauthorized Accesses Flow of SSL/TLS encrypted communications 1. The user's computer requests the SSL/TLS device certificate and public key when accessing the machine. 2. The device certificate and public key are sent from the machine to the user's computer. 3.
  • Page 314 9. Security 2. Click [Configuration] on the [Device Management] menu. 3. Click [SSL/TLS] in the "Security" category. 4. Select the protocol to enable encrypted communication on "SSL/TLS" to specify the details about the communication method. • Permit SSL/TLS Communication: Select one of the encryption communication modes below, and then specify whether to activate HSTS.
  • Page 315 Preventing Unauthorized Accesses • Depending on the states you specify for TLS 1.3, TLS 1.2, TLS 1.1, TLS 1.0, and SSL 3.0, the machine might not be able to connect to an external LDAP server. Enabling SSL for SMTP connection 1.
  • Page 316 9. Security • When [Auto Select] is specified, the encryption method is determined based on the port number. • When a number other than 465 or 578 is specified for the port number, encryption using STARTTLS is attempted, but if it fails, the communication is encrypted using SMTP over SSL.
  • Page 317 Preventing Unauthorized Accesses See "Applying Security Settings to an E-mail When Sending a Scanned Document", User Guide in English. Registering a user certificate to the user that will receive e-mails To send an encrypted e-mail, first register a user certificate to the user that will receive the e-mail.
  • Page 318 9. Security 2. Click [Configuration] on the [Device Management] menu. 3. Click [S/MIME] in the "Security" category. 4. Configure the e-mail encryption and electronic signature. Encryption • Encryption Algorithm: Select the encryption algorithm of the shared key used to encrypt e-mails with S/MIME. Select the encryption algorithm that is supported by the user's e-mail software.
  • Page 319 Preventing Unauthorized Accesses • If an error occurs outside the validity period of the certificate when an e-mail is sent automatically using Memory Transmission or at a specified time, an error will be reported by clear text e-mail to the e-mail address of the sender or administrator.
  • Page 320 9. Security 3. Press [System Settings]. 4. Press [Network/Interface] [Permit SNMPv3 Communication]. 5. From the list next to Permit SNMPv3 Communication, select [Encryption Only]. 6. Press [OK]. 7. Press [Home] ( ), and then log out of the machine. • To change the settings specified in the machine from Device Manager NX, specify an encryption password to the network administrator in [Register/Change Administrator], and then register the encryption password in the SNMP account of Device Manager NX.
  • Page 321 Preventing Unauthorized Accesses • To perform printing from a LAN inside the office, specify the driver encryption key. • To perform IPP printing from an external network, encrypt the password of IPP printing. Specifying a Driver Encryption Key to Encrypt Passwords Specify the driver encryption key specified in the machine also to the printer driver to encrypt and decrypt passwords.
  • Page 322 9. Security 4. Press [Settings for Administrator] [Security] [Extended Security Settings]. 5. Press [Change] next to Driver Encryption Key. 6. Enter the password to be used as the driver encryption key. 7. Enter the password for Confirm Password again. 8. Press [OK] twice. 9.
  • Page 323 Preventing Unauthorized Accesses 2. Click [Configuration] on the [Device Management] menu. 3. Click [IPP Authentication] in the "Security" category. 4. Select [DIGEST] in "Authentication". 5. Enter User Name and Password. • Click [On] of "User Authentication Function of Main Unit" to use the user authentication information specified on the machine instead of the username and password for IPP authentication.
  • Page 324: Preventing Information Leaks

    9. Security Preventing Information Leaks Taking Measures to Prevent Information Leaks Information leaks may be caused by loss of documents or data, or by human error. The information asset in the machine will be safer by decreasing these problems and promoting user awareness of file management.
  • Page 325: Preventing Information Leaks By Sending Data To A Wrong Destination

    Preventing Information Leaks • Specifies also to print embedded text to warn of unauthorized copying. page 326 "Preventing Data Leaks from Printed Sheets" Encrypting data in the internal storage or deleting data by overwriting The internal storage of the machine stores all data about documents and users in the Address Book.
  • Page 326 9. Security Restricting new registration of destinations in the Address Book (Restrict Adding of User Destinations) • If a wrong destination is registered, you may send data to an unintended destination repeatedly. Disable registering or editing destinations in the address book to avoid sending data repeatedly to a wrong destination.
  • Page 327: Preventing Information Leaks From The Media Slot

    Preventing Information Leaks 4. Press [Settings for Administrator] [Security] [Extended Security Settings]. 5. From the list next to Restrict Use of Destinations (Fax) or Restrict Adding of User Destinations (Fax), select [On]. To restrict the method to specify destinations with the Scanner function, select [On] from the list next to Restrict Use of Destinations (Scanner) or Restrict Adding of User Destinations (Scanner).
  • Page 328: Preventing Data Leaks From Printed Sheets

    9. Security page 260 "Logging in to the Machine as a Custom-Privileges Administrator" 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Machine] [External Device] [Allow Media Slots Use]. 5. For each condition, select whether to prohibit from the list. •...
  • Page 329 Preventing Information Leaks The following functions in the machine can promote user awareness of file management and discourage unauthorized copying or leaving of printed sheets. Adding the name of the user printing the job on printed sheets (Compulsory Security Stamp) Always adding a printed name can promote user awareness of file management.
  • Page 330 9. Security Compulsory Security Stamp can be used with the Copier, Document Server, Fax, and Printer functions. 1. Log in to the machine as the machine administrator on the control panel. page 248 "Logging in to the Machine as an Administrator" When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Security Pattern/Stamp privilege as well.
  • Page 331 Preventing Information Leaks Security Stamp: Printer, select [On], and then specify the stamp information and position. • Date/Time: Prints the job output time. • Printout User Name: • Stamp User Name: Prints the name in the address book. • Stamp Login User Name: Prints the user code or login user name in the authentication information in the address book.
  • Page 332 9. Security 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Security Pattern/Stamp] [Unauthorized Copy Prevention Printing: Copier]. To specify the unauthorized copy prevention function for the functions other than the Copier function, press [Unauthorized Copy Prevention Printing: Document Server] or [Unauthorized Copy Prevention Printing: Printer].
  • Page 333 Preventing Information Leaks Printing of the embedded pattern is mandatory. Users can specify the embedded pattern settings except for type and thickness from the Copier/Document Server screen. • On: User Cannot Change Settings: Printing of the embedded pattern is mandatory. Users cannot specify the embedded pattern settings from the Copier/Document Server screen.
  • Page 334 9. Security The added pattern is not printed. Specify the unauthorized copy prevention function on the control panel or in the printer driver as necessary. • Driver/Command (Most Settings): The settings specified in the machine are applied to the mask type for pattern and density, and the settings specified on the control panel or in the printer driver are applied to the other items.
  • Page 335 Preventing Information Leaks Specifying the Restrict Direct Print Jobs Function 1. Log in to the machine as the machine administrator on the control panel. page 248 "Logging in to the Machine as an Administrator" When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Printer Settings privilege as well.
  • Page 336: Preventing Printing Personal Information In Fax Reports

    9. Security 6. Press [OK]. 7. Press [Home] ( ), and then log out of the machine. Preventing Printing Personal Information in Fax Reports You can specify not to print destinations or sender names in the reports output in the Fax function such as communication result reports or communication failure reports.
  • Page 337: Controlling Access To Untrusted Websites From The Control Panel

    Preventing Information Leaks 4. Press [Others] [Report Output Settings] [Report Contents Settings]. 5. From the list next to Include Destination(s), select [Off]. 6. From the list next to Include Sender's Name, select [Off]. 7. Press [OK]. 8. Press [Home] ( ), and then log out of the machine.
  • Page 338: Encrypting Data To Prevent Data Leaks Caused By A Stolen Or Disposed Machine

    9. Security • A PEM (Base64 Encoded X.509) root certificate can be imported. • Enable SSL/TLS on the machine in advance. page 306 "Encrypting Network Communication" Install the certificate of the Website to enable the Root Certificate Check function. 1. Log in to the machine as the network administrator from Web Image Monitor. page 248 "Logging in to the Machine as an Administrator"...
  • Page 339 Preventing Information Leaks You can delete data that you do not want to be restored. The Auto Erase Memory Setting function deletes the data temporarily stored on the machine for copying or printing, and the Erase All Memory function deletes all data and initializes the internal storage of the machine.
  • Page 340 9. Security completing the encryption/decryption, install device certificate again and restart the machine as necessary. page 307 "Installing a Self-signed Certificate/Certificate Issued by a Certificate Authority" 1. Log in to the machine as the machine administrator on the control panel. page 248 "Logging in to the Machine as an Administrator"...
  • Page 341 Preventing Information Leaks • Back Up Encryption Key: Makes a backup of the encryption key. The encryption setting is not changed. 6. Select the location to store the encryption key. • Save to Media: Saves the encryption key to a USB flash memory device. Insert a USB flash memory device into the media slot, and then press [Save to Media] [OK].
  • Page 342 9. Security • The machine will not enter Sleep mode until the overwriting process is completed. 1. Log in to the machine as the machine administrator on the control panel. page 248 "Logging in to the Machine as an Administrator" When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 343 Preventing Information Leaks • DoD : Overwrites data with a random number, then with its complement, then with another random number, and the data is verified. • Random Numbers: Overwrites data multiple times with random numbers. Select the number of overwrites from one to nine. *1 National Security Agency (U.S.A) *2 Department of Defense (U.S.A) 6.
  • Page 344 9. Security The Copier, Fax, and Printer functions take priority over the Auto Erase Memory Setting function. Overwriting will start after the job is completed. No data remains. The trash box of the icon is empty when there is no data to be overwritten.
  • Page 345 Preventing Information Leaks takes up to 2 hours and 15 minutes. You cannot operate the machine during overwriting. • The Erase All Memory function also clears the machine's security settings, so that neither machine nor user administration will be possible. Ensure that users do not save any data on the machine after the Erase All Memory process is completed.
  • Page 346: Restricting Operations Of The Customer Engineer Without The Supervision Of The Machine Administrator

    9. Security • NSA : Overwrites data twice with random numbers and once with zeros. • DoD (5220.22-M) : Overwrites data with a random number, then with its complement, then with another random number, and the data is verified. • Random Numbers: Overwrites data multiple times with random numbers. Select the number of overwrites from one to nine.
  • Page 347 Preventing Information Leaks When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Security privilege as well. page 260 "Logging in to the Machine as a Custom-Privileges Administrator" 2. On the Home screen, press [Settings]. 3.
  • Page 348 9. Security...
  • Page 349: 10. Specifications

    10. Specifications Specifications for Paper Recommended Paper Sizes and Types The recommended paper sizes and types for each tray are as described below. • When performing multiple sheet feeding, fan sheets thoroughly or load sheets one by one from the bypass tray. •...
  • Page 350 10. Specifications Paper type and weight Paper size Paper capacity A4 , A5, A6 , B5 JIS , B6 JIS × 11 , 5 × 8 Custom size: (mainly Europe and Asia)/ (Taiwan) Vertical: 90.0-297.0 mm Horizontal: 148.0-216.0 mm (mainly North America) Vertical: 3.55-11.69 inches Horizontal: 5.83-8.50 inches Label paper (adhesive...
  • Page 351 Specifications for Paper Lower Paper Tray (Trays 2, 3, 4) Paper type and weight Paper size Paper capacity Select the paper size using the 500 sheets (When the 60–162 g/m (Approx. Tray Paper Settings menu: paper being used is 80 16-40 lb.
  • Page 352 10. Specifications Paper type and weight Paper size Paper capacity A4 , A5, A6 , B5 JIS , B6 JIS × 11 , 5 × 8 Custom size: (mainly Europe and Asia)/ (Taiwan) Vertical: 90.0-297.0 mm Horizontal: 148.0-216.0 mm (mainly North America) Vertical: 3.55-11.69 inches Horizontal: 5.83-8.50 inches •...
  • Page 353 Specifications for Paper Paper type and weight Paper size Paper capacity Custom size: (mainly Europe and Asia)/ (Taiwan) • Vertical: 90.0–297.0 mm • Horizontal: 148.0- 900.0mm (mainly North America) • Vertical: 3.55–11.69 inches • Horizontal: 5.83–35.43 inches Label paper (adhesive 30 sheets Specify the paper size labels)
  • Page 354 10. Specifications page 79 "Basic Procedure for Copying Documents" • Using the Printer function. page 119 "Basic Procedure for Printing Documents" *2 When paper larger than 432 mm (17.1 inches) in size is used, the paper may become wrinkled, may not be fed into the machine, or may cause paper jams. Notes on Special Paper Paper Type Note...
  • Page 355 Specifications for Paper Unusable Paper • Do not use stapled sheets of paper, aluminum foil, carbon paper, or any kind of conductive paper. Doing so can result in fire. Paper causing faults Do not use any of the following kinds of treated paper. Doing so may cause faults. •...
  • Page 356: Saving Printouts

    10. Specifications Paper Storage When storing paper, the following precautions should always be followed: • Do not store paper where it will be exposed to direct sunlight. • Store paper in a dry environment (humidity: 70% or less). • Store on a flat surface. •...
  • Page 357: Paper Storage

    Specifications for Paper Direction of paper grain Tray 1–4 Bypass Tray Longitudinal direction Lateral direction Paper Storage • Temperature: 20–25°C (68–77°F) • Humidity: 30–65%. Do not use together paper that has been stored in different environments. Minimum Number of Sheets •...
  • Page 358 10. Specifications Before setting envelopes • Before loading envelopes, press down on them to remove any air from inside and flatten out all four edges. If they are bent or curled, flatten their leading edges (the edge going into the machine) by running a pencil or ruler across them.
  • Page 359: Loading Orientation-Fixed Paper Or Two-Sided Paper

    Specifications for Paper Orientation of Envelopes Exposure Glass Bypass Tray Flaps: closed Flaps: closed Side to be scanned: face Side to be printed: face down down Bottom side of envelopes: Bottom side of envelopes: toward the back of the toward the back of the machine machine When loading envelopes, specify the envelope size and thickness.
  • Page 360: Original Orientation

    10. Specifications Copying onto Letterhead Paper Specify the settings of this machine as described below, and then place an original and load the paper. • [Settings] [Copier / Document Server Settings] [Paper/Paper Input] [Letterhead Setting] [Yes] Original Orientation Exposure Glass Paper Orientation Copy Side Tray 1–4...
  • Page 361 Specifications for Paper Paper Orientation Copy Side Tray 1-4 Bypass Tray One-sided originals Two-sided originals • When you set [Letterhead Setting] to [On (Always)], you can print onto letterhead paper when the paper type in the printer driver’s settings is set to [Letterhead]. •...
  • Page 362: Specifications For Originals

    10. Specifications Specifications for Originals Recommended Original Size and Weight (mainly Europe and Asia)/ (Taiwan) Original location Original size Original weight Exposure glass Up to A4 One-sided –B6 JIS, 11 × 52-128 g/m originals 17–5 × 8 (Approx. 14-34 lb. Bond) Two-sided –B6 JIS, 11 ×...
  • Page 363: Sizes Detectable With Auto Paper Select

    Specifications for Originals *1 A5 can be used only in the scanner function. • An original whose size is within the range of the maximum original scan area can be placed. page 364 "Specifications for the Main Unit_Lfy1" • On all sides of the original, there is a missing image area. Even if you place originals on the exposure glass or in the ADF correctly, the missing image area on all four sides of the original might not be copied.
  • Page 364 10. Specifications (mainly North America) Origin 11 × 11 × × × × × × × × locati Expos glass *3*4 *3*4 *2*5 : Detectable size, -: Undetectable size *1 If you want to detect 5 × 8 , contact your service representative. *2 If you want to switch the detectable size from 11 ×...
  • Page 365: Machine And Options Specifications

    Machine and Options Specifications Machine and Options Specifications Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to.
  • Page 366: List Of Specifications

    10. Specifications • Dimensions in this manual are given in two units of measure: metric and inch. Refer to the units that are used in your country/region. List of Specifications Specifications for the Main Unit Item Specifications Configuration Desktop Memory 6 GB (2 GB on the main unit and 4 GB on the control panel) Internal 64 GB(eMMC)
  • Page 367 Machine and Options Specifications Item Specifications • IM 460F/460FTL: 4.1 seconds (China)/ (Taiwan) • IM 460F: 4.1 seconds Copy/print (mainly Europe) speed (per • IM 370: 37 sheets/minute minute) • IM 370F: 37 sheets/minute • IM 460F: 46 sheets/minute (mainly Asia •...
  • Page 368 10. Specifications Item Specifications Vertical: Up to 297 mm (11.7 inches) Horizontal: Up to 216 mm (8.6 inches) • ADF Vertical: 128 to 297 mm (5.1 to 11.7 inches) Horizontal • Copy function: 128 to 1,260 mm (5.1 to 49.7 inches) •...
  • Page 369 Machine and Options Specifications Item Specifications Missing image area (Copy) Leading edge: 4.2 ±1.5 mm (0.17 ±0.06 inches) Trailing edge: 0.5–6.0 mm (0.02–0.24 inches) Trailing edge (Two Sided): 3.0–6.0 mm (0.2–0.3 inches) Right edge: 0.5–4.0 mm (0.02–0.16 inches) Left edge: 0.5–4.0 mm (0.02–0.16 inches) Paper output or smaller: 250 sheets (80 g/m capacity of the...
  • Page 370 10. Specifications Item Specifications Resolution 600 × 600dpi (copying) Tone 256 tones Paper capacity page 347 "Recommended Paper Sizes and Types" (80 g/m Approx. 20 lb. Bond) Continuous 1–999 sheets copy run Duplex Standard Power (mainly Europe and Asia) requirements 220-240 V, 8 A, 50/60 Hz (mainly North America) 120–127 V, 12 A, 60 Hz...
  • Page 371 Machine and Options Specifications Item Specifications Ready: 26.4 W During printing: 623 W Maximum: 1780 W The power level when the main switch is turned off and the power cord is plugged into an outlet: 1 W or less (mainly North America) •...
  • Page 372 10. Specifications Item Specifications • The complete system of the IM 370F/460F consists of the main unit and lower paper tray. (mainly North America) • IM 370F/460F/460FTL Maximum: 1600 W • The complete system of the IM 370F/460F/460FTL consists of the main unit and lower paper tray.
  • Page 373 Machine and Options Specifications Item Specifications Stand-by: 16.5 dB Copying: 63.8 dB (mainly North America) • IM 370F Stand-by: 16.6 dB Copying: 61.7 dB • IM 460F/460FTL Stand-by: 16.5 dB Copying: 63.8 dB (China)/ (Taiwan) • IM 460F Stand-by: 16.5 dB Copying: 63.8 dB Noise emission (mainly Europe)
  • Page 374 10. Specifications Item Specifications Copying: 67.9 dB (China)/ (Taiwan) • IM 460F Stand-by: 17.3 dB Copying: 67.9 dB Noise emission (mainly Europe) (Sound • IM 370/370F pressure level: Stand-by: 3.0 dB Main unit only) Copying: 49.8 dB • IM 460F Stand-by: 3.3 dB Copying: 52.5 dB (mainly Asia)
  • Page 375 Machine and Options Specifications Item Specifications Noise emission (mainly Europe) (Sound • IM 370/370F pressure level: Stand-by: 3.0 dB Complete Copying: 53.4 dB system) • IM 460F Stand-by: 2.9 dB Copying: 54.3 dB (mainly Asia) • IM 370F Stand-by: 3.0 dB Copying: 53.4 dB •...
  • Page 376 10. Specifications Item Specifications • The complete system of the IM 460F consists of the main unit, three lower paper trays, and caster table. (mainly Asia) • Sound power levels and sound pressure levels are actual values measured in accordance with ISO 7779. •...
  • Page 377: Specifications For Facsimile

    Machine and Options Specifications Specifications for the Document Server Item Specifications Internal Approx. 4 GB storage Maximum: 9,000 pages (Total number of pages that can be stored (Document with all functions combined.) Server) Copy/A4 original: Approx. 9,000 pages Printer/A4/600 dpi, 2 bits: Approx. 9,000 pages Scanner/A4/200 dpi, 8 bits/JPEG: Approx.
  • Page 378 10. Specifications Item Specifications Transmission 3 seconds at 28,800 bps, Standard resolution time Data MH, MR, MMR compression method Maximum Standard: A3 or 11 × 17 original size Custom (w × h): 297 × 1,200 mm (11.7 × 47.3 inches) Maximum 297 ×...
  • Page 379 Machine and Options Specifications Item Specifications Internet Send and receive e-mail with a computer that has an e-mail address communication Encryption S/MIME method (for forwarding) Internet Fax Automatic conversion of sent documents to e-mail format and e-mail send functions: transmission. Memory transmission only. Internet Fax Automatic detection and printing of appended TIFF-F (MH) files and receive...
  • Page 380 10. Specifications Item Specifications IP-Fax Receive faxes sent from an IP-Fax compatible fax through a network. reception Also capable of receiving faxes from a G3 fax connected to a function telephone line via a VoIP gateway. Validated Peripherals Item Specifications Gateway (T.38 •...
  • Page 381 Machine and Options Specifications • You can assign multiple addresses of the machine in the IPv6 environment, but only one address can receive IP-fax. • The SIP connection is specified to connect to either IPv4 or IPv6 depending on the environment of the machine.
  • Page 382: Specifications For Printer

    10. Specifications Item Specifications Sending to Sends scanned files over the network to shared folders or FTP server folder folders. functions *1 When you send documents in TIFF format. E-mail Reception Item Specifications Network • Standard: Ethernet (10BASE-T/100BASE-TX/1000BASE-T) • Option: IEEE802.11a/b/g/n wireless LAN interface Wired LAN and wireless LAN cannot be used at the same time.
  • Page 383 Machine and Options Specifications Item Specifications • IM 370F: 37 sheets/minute • IM 460F: 46 sheets/minute *1 Except for China. (mainly North America) • IM 370F: 37 sheets/minute • IM 460F/460FTL: 46 sheets/minute (China)/ (Taiwan) • IM 460F: 46 sheets/minute (A4 , 8 ×...
  • Page 384: Specifications For Scanner

    10. Specifications Item Specifications Fonts • PCL 5e/6(XL): 80 fonts, 13 International fonts • PostScript 3 Emulation: 80 fonts, 13 International fonts • PDF Emulation: 80 fonts, 13 International fonts • Genuine Adobe PDF: 136 fonts • Genuine Adobe PostScript 3: 136 fonts •...
  • Page 385 Machine and Options Specifications Item Specifications Length: 10–297 mm (0.4–11.6 inches), Width: 10–216 mm (0.4–8.6 inches) • ADF Length: 128–297 mm (5.1–11.6 inches), Width: 128–432 mm (5.1–17.0 inches) Scan sizes • Exposure glass automatically (mainly Europe and Asia)/ (Taiwan) detectable A4 , B5 JIS (mainly North America) ×...
  • Page 386 10. Specifications Item Specifications Basic scanning 200 dpi resolution: Image MH, MR, MMR, JBIG2 compression type for black and white (two-value) Image JPEG compression type for gray scale/full color Interface • Standard: Ethernet (10BASE-T/100BASE-TX/1000BASE-T) USB 2.0 (Type A) port (on the control panel) •...
  • Page 387 Machine and Options Specifications See "Scanning an Original as a PDF with Security Settings Specified", User Guide in English. • To specify High Compression PDF for the PDF type, the following settings are required: • Selecting Gray Scale or Full Color for [Original Type] under [Send Settings] •...
  • Page 388 10. Specifications • Specifying [PDF File Type: PDF/A Fixed] under [Settings] [System Settings] [Settings for Administrator] [File Management] to [Off] Network TWAIN Scanner Item Specifications Scanning 100–1,200 dpi resolution Protocol TCP/IP Operating • Windows 8.1/10/11 system • Windows Server 2012/2012 R2/2016/2019/2022 (TWAIN scanner runs in 32-bit compatible mode on a 64-bit operating system, so TWAIN scanner is not compatible with 64-bit applications.
  • Page 389 Machine and Options Specifications Item Specifications –A5, B4 JIS –B6 JIS, 11 × 17 –5 × 8 (mainly North America) 11 × 17 –5 × 8 –A4 Original weight 52-128 g/m (Approx. 14-34 lb. Bond) Number of 50 sheets (80 g/m , Approx.
  • Page 390 10. Specifications Item Specifications Maximum 17 W or less power consumption Dimensions 374 × 493 × 124 mm (14.8 × 19.5 × 4.9 inches) (except protruding parts) (W × D × H) Weight Approx. 8 kg (0.4 lb.) Specifications for Caster Table Item Specifications Dimensions...
  • Page 391: The Setting Values Of The Transmission Function

    Machine and Options Specifications Item Specifications • Direct Connection: Group Owner Mode • Web Image Monitor is supported. • The transmission rates of 150 Mbps in the 5 GHz band and 72.2 Mbps in the 2.4 GHz band are the theoretical values of the wireless LAN specification. The actual transmission rate may be lower, depending on the operating environment.
  • Page 392 10. Specifications Send Email Item Value Remarks Maximum number of 128 alphanumeric characters entered in a characters subject Maximum number of • When selecting an You cannot select an item characters entered in the item from the from the standard an e-mail message standard message: message and enter the...
  • Page 393 Machine and Options Specifications Send to Folder Item Value Remarks Maximum number of 256 characters characters in a path name specified for the SMB protocol Maximum number of 64 characters characters in a user name specified for the SMB protocol Maximum number of 64 characters characters in a password...
  • Page 394: Broadcast Transmission

    10. Specifications Broadcast Transmission Item Value Remarks Total number of destinations that can be specified for Send Email and Send to Folder Number of destinations Up to 50 items can be that can be specified when specified when entering an sending a document by item manually (including Send Email...
  • Page 395: Machine Options

    Machine and Options Specifications See "Maximizing the Printable Area When Printing", User Guide in English. • The maximum width of the printable area perpendicular to the feeding direction is 297 mm (11.7 inches). Printing starts from the upper left corner of the paper in relation to the feed direction.
  • Page 396 10. Specifications (1) Options Mounted to the Scanner Unit Description Option Detects a double feeding of the original when it Page keeper is placed in the ADF. Document feeder Paper of A4 size or larger can be fed. paper guide tray *1 Depending on the machine type, ADF is attached as standard.
  • Page 397 Machine and Options Specifications Guide to Functions of the Machine’s Internal Options • Fax Memory Unit Provides 60 MB of additional memory for the facsimile function. (Standard 4 MB) This enables you to increase the number of sheets of originals that can be stored in memory.
  • Page 398: Functions Requiring Optional Configurations

    10. Specifications Functions Requiring Optional Configurations When options are installed, the functions and interface of this machine can be expanded. • The options that can be installed differ depending on the models. page 393 "Machine Options" Copy Function Function/Reference Option Job Preset One of the following options is required: page 83 "Reserving a Copy Job While...
  • Page 399: Function Compatibility

    Machine and Options Specifications Functions Option See "Scanning an Original as a PDF File with Embedded Text Data", User Guide in English. Interface Functions Option Wireless LAN communication Wireless LAN board See "Connecting to a Wireless LAN", User Guide in English. Extra Ethernet Interface (for Printer) Device server option See "Connecting a LAN Cable", User Guide...
  • Page 400 10. Specifications *1 Simultaneous operations are only possible after the preceding job documents are all scanned and [Reserve] appears. *2 You can scan a document after the preceding job documents are all scanned. *3 Simultaneous operations can be performed when a different line is used. *4 During parallel reception, any subsequent job is suspended until the reception is completed.
  • Page 401 Machine and Options Specifications Copy Function Compatibility *1 Stamps include Preset Stamp, User Stamp, Date Stamp, Page Numbering, and Stamp Text.
  • Page 402: Legal And Contact Information

    10. Specifications Legal and Contact Information Environmental Regulations ENERGY STAR Program(mainly North America) ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ®...
  • Page 403 Legal and Contact Information (mainly Asia Model Name Power Time to Recover Duplex Function Consumption from Sleep Mode IM 370F 0.45 W 6.2 seconds Standard IM 460F 0.45 W 5.9 seconds Standard (mainly North America) Model Name Power Time to Recover Duplex Function Consumption from Sleep Mode...
  • Page 404 For Turkey only AEEE Yönetmeliğine Uygundur. Bu sistem sarf malzemeleri ve yedek parçaları da dahil olmak üzere AEEE Yönetmeliğine Uygundur. Üretici: Ricoh Company, Ltd. 3-6, Nakamagome 1-chome, Ohta-ku, Tokyo 143-8555 Japan +81-3-3777-811(English only/Sadece İngilizce) Note for the Battery and/or Accumulator Symbol (For EU countries only)
  • Page 405: Recycled Paper

    For details about the return program, please refer to the Web page below or consult your service person. https://www.ricoh-return.com/ Energy efficiency The amount of electricity a machine consumes depends as much on its specifications as it does on the way you use it. The machine is designed to allow you to reduce electricity costs by switching to Ready mode after it prints the last page.
  • Page 406: Notes For Wireless Lan And Bluetooth

    Perchlorate Material - special handling may apply. See: www.dtsc.ca.gov/hazardouswaste/perchlorate Information for China energy efficiency label (China) Specification model IM 460F Manufacturer name Ricoh Company, Ltd. Energy efficiency index Typical energy consumption (kW/h) 2.31 According to the national standards GB21521-2014 Notes for wireless LAN and Bluetooth This product is equipped with wireless LAN and Bluetooth functions.
  • Page 407: Copyright Information About Installed Software

    Safari is a trademark of Apple Inc., registered in the United States and other countries. ® The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license.
  • Page 408 10. Specifications Citrix is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries. Citrix XenApp is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S.
  • Page 409 Legal and Contact Information ® ® Microsoft Windows 10 Education • The product names of Windows 11 are as follows: ® ® Microsoft Windows 11 Home ® ® Microsoft Windows 11 Pro ® ® Microsoft Windows 11 Pro Education ® ®...
  • Page 410 10. Specifications Java is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. ® This product includes RSA BSAFE Cryptographic software of EMC Corporation. RSA is a registered trademark or a trademark of EMC Corporation in the United States and other countries.
  • Page 411: 11. Driver Installation Guide

    11. Driver Installation Guide Installing the Printer Driver Installing the Printer Driver by Using Device Software Manager Installer Device Software Manager is a support utility for driver installation in Windows. Device Software Manager helps you to detect the latest driver via the internet automatically according to the computer you are using and install it with a simple procedure.
  • Page 412 11. Driver Installation Guide 6. On the "End User License Agreement" screen, click [Agree and Go to Next]. 7. Select the connection between the machine and computer, and then click [Next]. • Network: Search for devices connected to the network. •...
  • Page 413: Installing The Printer Driver For Network Connection (Windows)

    Installing the Printer Driver • When you connect the machine and the computer with a USB cable, follow the instructions on the installer screen. If the machine is not detected, click [Cancel Connection]. Even if the connection is canceled, the installation is complete. After the installer screen is closed, the machine is added automatically when it is connected to the computer with the USB cable.
  • Page 414 11. Driver Installation Guide • If the "Windows Security" dialog box appears during the driver installation procedure, click [Install this driver software anyway]. Installing the PCL 6/PostScript 3 Printer Driver from the Downloaded File 1. Download the latest printer driver from the manufacturer's website. 2.
  • Page 415: Installing The Printer Driver For Windows

    Installing the Printer Driver • If the machine cannot be found at the network connection setup, see the following section. page 415 "If the Machine Cannot Be Found" 6. When prompted to select whether to install Device Software Manager, select whether to install Device Software Manager.
  • Page 416 Searching for the TCP/IP port starts. 11. When the "Additional port information required" screen is displayed, select [RICOH Network Printer C model], and then click [Next]. 12. Click [Have Disk...] [Browse...] to specify the driver (INF file), and then click [OK].
  • Page 417 Installing the Printer Driver 15. Specify the printer as a shared printer as necessary, and then click [Next] [Finish]. If the Machine Cannot Be Found The "Network Connection Error" screen is displayed. Confirm and perform , and then click [OK]. If the machine still cannot be found, specify the IP address or machine name to install the printer driver.
  • Page 418 11. Driver Installation Guide 2. Select [Specify device IP address] or [Specify device name], and then click [Next]. When specify the machine IP address 1. Enter the IP address of the machine and click [Search]. You can check the machine IP address in [Check Status] [Network] on the control panel.
  • Page 419: Installing The Printer Driver For Network Connection (Macos)

    Installing the Printer Driver 2. On the "Printer Preference" screen, select one of the port names from among "Port Name", and then click [Next]. Printer driver installation starts. For details about the procedure for specifying the IP address after installing the printer driver, see the following section: See "When You Cannot Print a Document even if the Printer Driver is Installed", User Guide in English.
  • Page 420 11. Driver Installation Guide Installing the PPD file (Network Connection) 1. Download the latest printer driver from the manufacturer's website. 2. Double-click the downloaded file. 3. Double-click the package file. 4. On the "Introduction" screen, click [Continue]. 5. On the "License" screen, click [Continue] and then click [Agree]. •...
  • Page 421 Installing the Printer Driver The installation of the PPD file starts. 8. When the installation is complete, click [Close]. Registering the Machine in [Printers & Scanners] (Network Connection) Register the PPD file of the machine in the system preferences to enable printing. 1.
  • Page 422 11. Driver Installation Guide When "Generic PostScript Printer" is displayed even though the IP address is correct Check the network connection of the machine and the computer, and then register again. • When the machine is connected to a wired LAN. Check that the cable is connected to the machine correctly.
  • Page 423 Installing the Printer Driver 1. Select [System Preferences...] from the Apple menu. 2. Click [Printers & Scanners]. 3. Select the machine from the list, and then click [Options & Supplies...]. 4. Click [Options], select the option installed on the machine, and then click [OK]. •...
  • Page 424 11. Driver Installation Guide...
  • Page 425: 12. How To Use This Manual

    12. How to use this manual Moving pages Click to expand or collapse all the items in the table of contents at once. To expand or collapse items individually, click next to each title in the table of contents. Indicates which chapter and items are shown on the current page. You can click a page to move to it.
  • Page 426 12. How to use this manual Select the title from the "Narrow down" list on the search result screen, and then click the search button ( ) again to limit the scope of searching within the selected title. Meanings of the used symbols Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury.
  • Page 428 Copyright ©2023, 2024 D0DM7025D-EN...

This manual is also suitable for:

Im 370Im 40fIm 460ftl

Table of Contents