Xerox 5550B - Phaser B/W Laser Printer Administrator's Manual
Xerox 5550B - Phaser B/W Laser Printer Administrator's Manual

Xerox 5550B - Phaser B/W Laser Printer Administrator's Manual

System administrator guide
Hide thumbs Also See for 5550B - Phaser B/W Laser Printer:
Table of Contents

Advertisement

Office Printers
P h a s e r
®
5 5 5 0 p r i n t e r
System
Administrator
Guide
www.xerox.com/support

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 5550B - Phaser B/W Laser Printer and is the answer not in the manual?

Questions and answers

Summary of Contents for Xerox 5550B - Phaser B/W Laser Printer

  • Page 1 Office Printers P h a s e r ® 5 5 5 0 p r i n t e r System Administrator Guide www.xerox.com/support...
  • Page 2 Copyright © 2007 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission of Xerox Corporation. Copyright protection claimed includes all forms of matters of copyrightable materials and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as styles, templates, icons, screen displays, looks, etc.
  • Page 3: Table Of Contents

    Xerox Usage Analysis Tool........
  • Page 4 Contents Protocol Control ............3-6 HTTP.
  • Page 5 Contents Printing Features Secure, Personal, Personal Saved, Proof, Print With and Saved Print Jobs ... . . 5-2 Smart Trays ............. . 5-2 Jam Recovery .
  • Page 6 Contents FTP Parameters ............A-6 Status Notification Parameter .
  • Page 7: Overview

    PrintingScout Alerts on page 1-2 PhaserSMART Technical Support on page 1-2 ■ ■ Xerox Support Centre on page 1-4 ■ CentreWare Internet Services (IS) on page 1-5 You can obtain information regarding your printer and its capabilities from the following sources.
  • Page 8: Printingscout Alerts

    PrintingScout Alerts PrintingScout Alerts PrintingScout is an automated tool that is installed with the Xerox printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout automatically displays an alert on the user’s computer screen to let them know that the printer needs attention.
  • Page 9 Select the PhaserSMART Technical Support link. Follow the instructions on the screen. Using the Xerox Support Centre To access PhaserSMART Technical Support from the Xerox Support Centre: Select one of the following options: ■ Windows: Double-click the Xerox Support Centre icon on your desktop.
  • Page 10: Xerox Support Centre

    Xerox Support Centre Xerox Support Centre The Xerox Support Centre is a utility that is installed when running the driver installer. It is available for systems with Windows 2000 and later or Mac OS X, version 10.2 and higher. The Xerox Support Centre appears on the desktop for Windows systems or is placed in the Mac OS X dock.
  • Page 11: Centreware Internet Services (Is)

    ■ Define a link to your local web server’s support page. ■ Access online manuals and technical support information located on the Xerox website. Note: CentreWare IS requires a web browser and a TCP/IP connection between the printer and the network (in Windows, Macintosh, or UNIX environments). TCP/IP and HTTP must be enabled in the printer.
  • Page 12: Network Installation Features

    Network Installation Features This chapter includes: ■ Using a Startup Network Configuration File on page 2-2 ■ Printer Driver Installation Features on page 2-3 Discovery Protocols on page 2-5 ■ See also: Advanced Features Guide at www.xerox.com/support System Administrator Guide...
  • Page 13: Using A Startup Network Configuration File

    Configuration File Requirements The configuration file must be: A valid PostScript or PCL file that contains the appropriate PostScript, PCL, or PJL ■ commands. For a list of the Xerox-unique PCL and PJL commands, see Printer Commands on page B-1.
  • Page 14: Printer Driver Installation Features

    Software and Documentation CD-ROM, supplied with the printer, and is available on the web. When you run the installer, the main screen lists the Xerox printers of that model discovered on the network or connected via USB. You can choose one of the discovered printers, enter the IP address of the desired printer, or use Walk-Up Technology.
  • Page 15: Installation From The Printer's Hard Drive Or The Web

    Printer Driver Installation Features Installation from the Printer’s Hard Drive or the Web You can install the printer driver from the printer’s hard drive. This is especially useful if you do not have the Software and Documentation CD-ROM. Note: If the printer doesn’t have a hard drive but is connected to the internet, you can use this procedure to automatically connect to the web to install the driver.
  • Page 16: Discovery Protocols

    Discovery Protocols Discovery Protocols This section includes: ■ DDNS/WINS on page 2-5 DNS (Domain Name Services) on page 2-6 ■ ■ Service Location Protocol on page 2-6 ■ UPnP (Universal Plug and Play) on page 2-7 DDNS/WINS DDNS/WINS settings can be obtained from the BOOTP or DHCP server, if enabled. These settings enable the printer to register its IP name and address so other devices on the network can refer to it by name.
  • Page 17: Dns (Domain Name Services)

    Discovery Protocols DNS (Domain Name Services) DNS settings reference servers by name and allow you to enter and view host names rather than IP addresses. Note: Turning Multicast DNS ON allows the printer to be automatically discovered on a TCP/IP network by Apple Macintosh OS X Bonjour technology. To change the DNS settings: Launch your web browser.
  • Page 18: Upnp (Universal Plug And Play)

    Discovery Protocols UPnP (Universal Plug and Play) UPnP provides a simplified method to obtain an IP Address for a printer, locate devices on the network, and display those devices on desktop computers. Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties.
  • Page 19: Network Administration Features

    Printer Neighborhood on page 3-2 ■ Job Accounting on page 3-3 Usage Profile Reports on page 3-4 ■ ■ Xerox Usage Analysis Tool on page 3-5 ■ Protocol Control on page 3-6 ■ Cloning on page 3-14 System Administrator Guide...
  • Page 20: Printer Neighborhood

    Printer Neighborhood Printer Neighborhood Printer Neighborhood is a tool in CentreWare IS that enables you to search for printers on your network, check their status, and manage them remotely. You can also install, manage, and view printer usage information. Access to the embedded server in each printer enables you to perform other management tasks.
  • Page 21: Job Accounting

    The log file is stored either in the printer’s RAM memory or on the hard drive if one is installed in the printer. Xerox recommends that a hard drive be used for job accounting. ■ With a hard drive, the printer can store information about 5000 print jobs. The data in the log file is saved when the printer is turned off or reset.
  • Page 22: Usage Profile Reports

    Usage Profile Reports Usage Profile Reports Usage Profile reports provide information on many aspects of printer usage, such as ink or toner used, number of pages printed, and paper types used, gathered during the life of the printer. From this page you can view or print a report, and also send it to an email address you enter below, or to users who are specified in the Usage Profile Properties page.
  • Page 23: Xerox Usage Analysis Tool

    Xerox Usage Analysis Tool Xerox Usage Analysis Tool The Xerox Usage Analysis Tool (UAT) enables you to collect and analyze enterprise-wide Xerox network printer usage data with customizable features: ■ Cost Analysis: Track printing costs by groups of users or by groups of printers.
  • Page 24: Protocol Control

    For example, if you want to use IPP for a secure printing channel, disable the other printing protocols, Port 9100 and LPR. HTTP By default, HTTP is enabled. For information on disabling HTTP, contact Xerox Technical Support at www.xerox.com/support. See also:...
  • Page 25: Tcp/Ip

    Protocol Control TCP/IP To change TCP/IP settings: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocols folder on the left navigation panel. Select TCP/IP. If prompted, enter your Admin or Key User name and password. In the BOOTP/DHCP box, select one of the following: On: The printer issues BOOTP and DHCP requests on startup.
  • Page 26: Lpr

    Protocol Control LPR is an application-level printing protocol that uses TCP/IP to establish connections between printers and workstations on a network. To change LPR settings: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties.
  • Page 27: Snmp (Simple Network Management Protocol)

    Protocol Control SNMP (Simple Network Management Protocol) SNMP is a set of protocols designed to help manage complex networks. SNMP-compliant devices store data about themselves in MIBs and return this data to the SNMP requesters. The SNMP Configuration pages provide control over SNMP security, including methods to configure: ■...
  • Page 28: Email Server Or Smtp (Simple Mail Transfer Protocol)

    Protocol Control Email Server or SMTP (Simple Mail Transfer Protocol) The Email server settings page enables you to configure email server settings and to specify a return email address for undeliverable email. You can configure email server settings in CentreWare IS by either: ■...
  • Page 29: Mailinx Remote Printing

    Internet-connected printers and create groups and subgroups of printers for easy distribution of print jobs. ■ A CentreWare IS Printing Service on a Xerox printer processes the print jobs from the clients. System Requirements ■...
  • Page 30: Mailinx Alerts

    Protocol Control MaiLinX Alerts About MaiLinX Alerts MaiLinX alerts enable the printer to automatically send email to you and/or specified users when the following conditions occur: ■ The printer requires attention or when service is needed. ■ The printer displays an error, warning, or alert. ■...
  • Page 31: Ethertalk

    Protocol Control EtherTalk To change EtherTalk settings: Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocols folder on the left navigation panel. Select EtherTalk. If prompted, enter your Admin or Key User name and password. Select On or Off in the EtherTalk box.
  • Page 32: Cloning

    Click the Clone Selected Settings button. A list of the selected settings to clone is displayed. Click the Clone button to clone the destination printer with the selected settings from the source printer. To access CentreWare Web, go to www.xerox.com/office/pmtools. System Administrator Guide 3-14...
  • Page 33: Security Features

    Security Features This chapter includes: ■ Basic Concepts on page 4-2 ■ Securing the Printer in a High Security Environment on page 4-5 Managing Certificates on page 4-6 ■ ■ Configuring SSL on page 4-7 ■ Configuring Administrator and Key User Settings on page 4-8 ■...
  • Page 34: Basic Concepts

    Basic Concepts Basic Concepts This section includes: ■ About Admin and Key User Accounts on page 4-2 About HTTP, HTTPS, and SSL/TLS on page 4-3 ■ ■ About Certificates on page 4-3 ■ About Access Control Lists on page 4-4 About Admin and Key User Accounts Admin and Key User accounts in CentreWare IS enable you to limit access to specific printer functions by specifying passwords for user classes.
  • Page 35: About Http, Https, And Ssl/Tls

    Basic Concepts About HTTP, HTTPS, and SSL/TLS HTTP (Hyper Text Transfer Protocol) is the protocol used to communicate across the internet between the printer web server and the web browser (clients). Because the data is transmitted in plain text and passwords are only slightly encrypted, it is not secure; the data can be read or intercepted by other people.
  • Page 36: About Access Control Lists

    Basic Concepts If you want to use HTTPS, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use HTTPS and encrypt data between the web browser and the printer. In addition, because each printer’s certificate is unique, you must load a different certificate into the browser for each printer the browser will access.
  • Page 37: Securing The Printer In A High Security Environment

    Securing the Printer in a High Security Environment Securing the Printer in a High Security Environment If you are concerned about the security of your printer in a high security environment, such as a college or printing kiosk, you can configure settings in CentreWare IS to “lockdown” or fully secure the printer.
  • Page 38: Managing Certificates

    Managing Certificates Managing Certificates To modify a self-signed certificate so it is specific to your printer or to install a downloaded root-signed certificate on the printer: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties.
  • Page 39: Configuring Ssl

    Configuring SSL Configuring SSL Once a certificate is set up, you can select when to use SSL to secure the connection between the printer and the server. Note: You can restrict user access to SSL pages in CentreWare IS. For more information, see Configuring Administrator and Key User Settings on page 4-8.
  • Page 40: Configuring Administrator And Key User Settings

    Configuring Administrator and Key User Settings Configuring Administrator and Key User Settings To prevent unauthorized changes to printer settings: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Security folder on the left navigation panel. Select Administrative Security Settings.
  • Page 41: Configuring The Print Host Access List

    Configuring the Print Host Access List Configuring the Print Host Access List To prevent unauthorized printing to your printer: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Security folder on the left navigation panel. Select Printing Security Settings.
  • Page 42: Controlling Access To Color Printing

    Controlling Access to Color Printing Controlling Access to Color Printing Note: Color access controls are available on color printers only. To control the user’s access to color printing, you can require the use of a 4-digit numeric password to print in color. To require a password: Launch your web browser.
  • Page 43: Securing The Hard Drive

    Securing the Hard Drive Securing the Hard Drive This section includes: ■ Selecting the Hard Drive Overwrite Security Option on page 4-11 Selecting the Automatic Removal of Secure, Personal, and Proof Jobs Option ■ page 4-12 Selecting the Hard Drive Overwrite Security Option When a file is deleted from the printer’s hard drive, only the file name is deleted;...
  • Page 44: Selecting The Automatic Removal Of Secure, Personal, And Proof Jobs Option

    Securing the Hard Drive Using CentreWare IS To select the Hard Drive Overwrite Security option: Launch your web browser. Enter the printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Security folder on the left navigation panel. Select Printing Security Settings.
  • Page 45 Securing the Hard Drive To remove all secure, personal, and proof print files every day at a set time: Select Daily Removal, and then press the OK button to select or Off. Remove At HH:MM, and then press the OK button. Select Enter the hour, and then press the OK button.
  • Page 46: 802.1X Configuration

    802.1X Configuration 802.1X Configuration Introduction to 802.1X and EAP The 802.1X IEEE standard defines port-based, authenticated network access control for Ethernet local area networks (LANs). With 802.1X, the user or device must pass network access control by successfully authenticating with credentials, such as a name and password, or network access is denied.
  • Page 47 802.1X Configuration Install root certificate – If you select EAP method(s) that require a root certificate, you can: ■ Install a new root certificate. ■ Use the already existing root certificate. ■ Choose not to validate server. Install device certificate – If you select EAP method(s) that require a device certificate, you can: ■...
  • Page 48: Locking The Control Panel Menus

    Locking the Control Panel Menus Locking the Control Panel Menus To prevent others from changing settings in the printer setup menus, you can lock some of the control panel menus. This is useful when printers are located in public places, such as schools, libraries, and office/print centers.
  • Page 49: Configuring Snmp

    Configuring SNMP Configuring SNMP This section includes: ■ Configuring SNMP for Maximum Security on page 4-17 Configuring SNMP v1/v2c on page 4-18 ■ ■ Configuring SNMP v3 on page 4-20 ■ Configuring the SNMP Access Control List on page 4-22 ■...
  • Page 50: Configuring Snmp V1/V2C

    Configuring SNMP On the Administrative Security Settings page, clear the View Configuration Web Pages and Modify Configuration Web Pages check boxes for users who should not have access to these pages. Configure SNMP v3 by setting up the SNMP Administrative and Key User accounts: Select the Protocols folder on the left navigation panel, and then select SNMP.
  • Page 51 Configuring SNMP Adding or Editing Traps for SNMP v1/v2c To add or edit traps for SNMP v1v2c: On the SNMP Configuration page: Click the Configure SNMP v1v2c button, and then click the Configure Traps button. The Configure Traps page lists the current Trap Destination Addresses for the SNMP protocol.
  • Page 52: Configuring Snmp V3

    Configuring SNMP Configuring SNMP v3 When configuring SNMP v3, you can set up: ■ Administrative, Key, Any User, and Driver accounts with Privacy and Authentication Keys associated with each account. ■ SNMP user read and write access. ■ An access control list that limits SNMP printer access to the specific hosts. See Configuring the SNMP Access Control List on page 4-22.
  • Page 53 (default). Note: If the Driver Account is disabled, it breaks communication between the printer and any applications using SNMP v3, such as Xerox printer drivers and PrintingScout. For a complete list of applications disabled, see Disabling SNMP on page 4-23.
  • Page 54: Configuring The Snmp Access Control List

    Configuring SNMP Configuring the SNMP Access Control List To set up a list of hosts that are authorized to access the printer using SNMP: Launch your web browser. Enter your printer’s IP address in the browser’s Address field (http://xxx.xxx.xxx.xxx). Click Properties. Select the Protocol folder on the left navigation panel.
  • Page 55: Disabling Snmp

    Configuring SNMP Disabling SNMP If you are not using SNMP, disable it to prevent unauthorized access through applications that use these protocols. If you disable SNMP, the following driver features are also disabled: ■ PrintingScout alerts ■ Walk-Up Printing Installer ■...
  • Page 56: Printing Features

    Printing Features This chapter includes: ■ Secure, Personal, Personal Saved, Proof, Print With and Saved Print Jobs on page 5-2 ■ Smart Trays on page 5-2 Jam Recovery on page 5-3 ■ System Administrator Guide...
  • Page 57: Secure, Personal, Personal Saved, Proof, Print With And Saved Print Jobs

    Note: For information about special job types, see Printing Special Job Types in the Advanced Features Guide for your printer at www.xerox.com/support. Select one of the following special job types: ■ Normal: Prints the job without requiring a password. ■...
  • Page 58: Jam Recovery

    Jam Recovery Jam Recovery Note: Jam recovery is not available on all printers, check the documentation that came with your printer for more information. The jam recovery settings enable you to select how the printer handles jobs that are in the process of printing when a media jam occurs.
  • Page 59: Glossary

    Glossary Terms and Abbreviations Terms and Abbreviations Definitions access control list A CentreWare IS feature that enables you to limit access to devices, as well as device configuration and management features. Admin account A CentreWare IS feature that enables you to limit access to specific printer functions by specifying a name and password.
  • Page 60 A feature in CentreWare IS that allows the printer to automatically send email to you and others under certain conditions. MaiLinX remote printing A feature in CentreWare IS that enables you to print to Xerox printers over the Internet, directly from Windows applications. The print jobs are sent as email.
  • Page 61 PrintingScout alerts PrintingScout is a tool that is installed with the Xerox printer driver. It automatically checks the printer status when a print job is sent. If the printer is unable to print a job, PrintingScout automatically displays an alert on the user’s computer screen to let them know that the printer...
  • Page 62 UDP (User Datagram Protocol) is a minimal message-oriented transport layer protocol found on domain name servers (DNS). Walk-Up Printing Driver The Xerox Walk-Up Printing Driver enables printing from a PC to any Xerox Postscript-enabled printer. For more information, see Walk-Up Printing Driver on page 2-3.
  • Page 63: Configuration Card Parameters

    Configuration Card Parameters The printer has a configuration card that stores network parameters and configuration (N, DN, DX, etc.) data. The configuration card is hot swappable, enabling you to share or replace it, providing an alternative to on-site service. Network settings are saved on the configuration card. If the configuration card is removed from an old printer and inserted into a new printer, the saved settings on the configuration card are copied to the new printer when it is powered on.
  • Page 64: General Information Parameters

    General Information Parameters General Information Parameters Printer Name ■ ■ Startup Page Enabled ■ Printer ID ■ Sys/Start Job ■ Job Timeout ■ Load Paper Timeout ■ Menu Timeout ■ Power Saver Timeout ■ Intelligent Ready ■ Paper Source Tray 1 or Tray 1 (MPT) ■...
  • Page 65: Pcl Parameters

    PCL Parameters PCL Parameters Font Number ■ ■ Pitch ■ Point Size ■ Symbol Set ■ Orientation ■ Form Length ■ Line Termination ■ Color Mode (on color printers) ■ Wide A4 USB 2.0 Parameters ■ Language ■ Wait Timeout Hard Drive Parameters The hard drive parameters are only stored on the configuration card if the printer has an internal hard drive.
  • Page 66: Certificates

    Certificates Certificates Device Certificate ■ ■ Friendly Name ■ Root Certificate 802.1x ■ Enabled Disabled ■ EtherTalk Parameters Enabled ■ ■ Disabled ■ Language Filtering ■ ■ Name ■ Printer Type ■ Zone ■ Network Node TCP/IP Parameters ■ Enabled ■...
  • Page 67: Dns Parameters

    DNS Parameters DNS Parameters Primary Server ■ ■ Secondary Server ■ Multicast DNS (Bonjour) Enable SLP Parameters ■ Enabled Disabled ■ ■ Directory Agent Discovery Enable ■ Directory Agent ■ Scope 1 ■ Scope 2 ■ Scope 3 ■ SLP Multicast Enable ■...
  • Page 68: Appsocket (Port 9100) Parameters

    AppSocket (Port 9100) Parameters AppSocket (Port 9100) Parameters Enabled ■ ■ Disabled ■ Language ■ Filtering IPP (Internet Printing Protocol) Parameters Enabled ■ ■ Disabled ■ Language ■ Filtering ■ Network Path SNMP Parameters ■ SNMP v1/v2c ■ SNMP v3 ■...
  • Page 69: Status Notification Parameter

    Status Notification Parameter Status Notification Parameter ■ Disabled Enabled ■ ■ SysAdmin Email Address ■ Service Email Address ■ Key User email Address MaiLinX Remote Printing Parameters Language ■ ■ Filtering ■ POP3 Server ■ POP3 User Name POP3 Password ■...
  • Page 70: Printer Commands

    Printer Control Language (PCL) and Printer Job Language (PJL) commands can be used to control print job settings and printer defaults. In addition to the standard PCL and PJL commands, the Phaser printers support Xerox-unique PCL and PJL commands. This appendix lists the most commonly used standard and Xerox-unique PCL and PJL commands.
  • Page 71: Phaser Pcl Commands

    Phaser PCL Commands Phaser PCL Commands This section includes: ■ Media Size on page B-2 Media Type on page B-3 ■ ■ Input Trays on page B-4 ■ Output Trays on page B-4 Media Size The following table lists the most common PCL commands for supported media sizes. For information on which media sizes are supported in your printer, and the trays that support them, print the Paper Tips page from your printers control panel.
  • Page 72: Media Type

    Phaser PCL Commands Media Size PCL 5 Command DL Envelope (110 x 220 mm) <Esc>&l90A C6 Envelope (114 x 162 mm) <Esc>&l92A Choukei 3 Gou <Esc>&l87A Choukei 4 Gou <Esc>&l86A Custom <Esc>&l101A * The character that follows the “&” in the command is the lowercase letter “L”. Media Type The following table lists the most common PCL commands for supported media types.
  • Page 73: Input Trays

    Phaser PCL Commands Input Trays The following table lists the most common PCL commands for the input trays supported by your printer. The table also lists the alternate tray used if the optional input tray is not installed. Note: When more than one command is listed, you can use either command. Phaser 8560 Phaser 6360 Phaser 4510...
  • Page 74: Phaser Pjl Commands

    Phaser PJL Commands Phaser PJL Commands The following table lists the most commonly used HP PJL and Xerox-unique PJL commands. See also: HP Printer Job Language Technical Reference for the standard set of PJL commands. PJL Command Values Description @PJL FSDELETE NAME=“pathname”...
  • Page 75: System Administrator Guide

    Phaser PJL Commands PJL Command Values Description @PJL XJAUSERNAME=“username” Roman-8 Sets the user name for Job characters Accounting. 1-255 @PJL XJOBPASSWORD=value 4-digit string (1-9) Assigns the job password used by Secure Print. @PJL XPERSONALJOB Starts a Personal Print job. @PJL XPROOFJOB Starts a Proof Print job.
  • Page 76 Phaser PJL Commands PJL Command Values Description @PJL XPCLPAPERSRCx = y x is 0, 1, 2, 3, 4, 5, Overrides the tray selected in the 6, 7, 8, 20, 21, 22, <Esc>&l#H PCL tray selection 23, which is the commands. number in the <Esc>&l#H tray selection...
  • Page 77 Acknowledgements Original SSLeay License Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to.
  • Page 78 THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 79 Part 2: Networks Associates Technology, Inc. copyright notice (BSD) ----- Copyright © 2001-2003, Networks Associates Technology, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■...
  • Page 80 Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Copyright © 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 81 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 82 VxWorks This product may include software licensed to Wind River by third parties. The following notices are provided to comply with the terms of such licenses. Wind River VxWorks This product may include software developed by WIDE Project and its contributors. Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided only with the following conditions are satisfied: 1.
  • Page 83 This product may include software copyright David A. Hinds. Use, redistribution, and modification of this code is permitted subject to the following conditions: 1. Redistribution of this code must preserve this copyright notice. 2. Binary distributions must include this notice and disclaimer.
  • Page 84 THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 85 not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel Corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use of, the software and documentation in terms of correctness, accuracy, reliability, currentness, or otherwise;...
  • Page 86 distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
  • Page 87 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product may include software copyright © 2003 Ericsson Research Canada. All rights reserved.
  • Page 88 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product contains software developed by the Apache Software Foundation (www.apache.org/). This product contains ANTLR software. www.antlr.org/ This product contains software copyright ©...
  • Page 89 SNiFF+/SNiFF+ PRO Copyright © 1992–1997 Compuware Corporation Copyright © 1984–1997 FairCom Corporation Copyright © 1996–2000 Greg Stein and Mark Hammond Copyright © 1999 The Apache Software Foundation Copyright © 2001 Xperts Software Wind River USB Host Stack This product may include software developed by Wipro Limited. WIND MEDIA LIBRARY This product may include software copyright ©...
  • Page 90 WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. This product may contain software that is based in part on the work of the Independent JPEG Group.
  • Page 91 Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
  • Page 92 Other Components of this product, including without limitation Wind River Workbench, Tornado, VxWorks, and Wind River PPP, include software derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm, and copyright © RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc.
  • Page 93 redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a selfextracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source.
  • Page 94 GOVERNMENT USE: If you are acquiring this software on behalf of the U.S. government, the Government shall have only "Restricted Rights" in the software and related documentation as defined in the Federal Acquisition Regulations (FARs) in Clause 52.227.19 (c) (2). If you are acquiring the software on behalf of the Department of Defense, the software shall be classified as "Commercial Computer Software"...
  • Page 95 You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following: a.
  • Page 96 Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of this Package.
  • Page 97 We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
  • Page 98 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
  • Page 99 (For example, a function in a library to compute square roots has a purpose that is entirely welldefined independent of the application. Therefore, Subsection 2d requires that any applicationsupplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole.
  • Page 100 When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library.
  • Page 101 For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  • Page 102 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
  • Page 103 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY...
  • Page 104 OpenSSL License OpenSSL License Copyright © 1998–2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 105 gSOAP Public License Version 1.3a The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified).
  • Page 106 1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor’s choice.
  • Page 107 3. DISTRIBUTION OBLIGATIONS 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute.
  • Page 108 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice.
  • Page 109 6. VERSIONS OF THE LICENSE 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version.
  • Page 110 THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ONLINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU.
  • Page 111 10. U.S. GOVERNMENT END USERS 11. MISCELLANEOUS 12. RESPONSIBILITY FOR CLAIMS As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis.
  • Page 112 EXHIBIT B. “Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (c) 2001–2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 113 Index about the configuration file, 2-2 CentreWare IS, 1-5 access control lists, 4-4 accessing online manuals, 1-5 definition, 6-1 checking printer status, 3-2 specifying access to printer settings, 4-8 checking supplies status, 1-5 specifying printer access using SNMP, configuring Admin and Key User 4-22 settings, 4-8 specifying printing access, 4-9...
  • Page 114 Index changing disabling email server settings, 3-10 EtherTalk, 3-13 EtherTalk settings, 3-13 FTP, 3-9 FTP settings, 3-9 HTTP, 3-6 hard drive overwrite security setting, IPP, 3-8 4-11 LPR, 3-8 IPP settings, 3-8 mDNS, 2-5 LPR settings, 3-8 Port 9100, 3-7 mDNS settings, 2-5 SLP, 2-6 Port 9100 settings, 3-7...
  • Page 115 Index jobs secure, personal, proof, personal saved, getting help print with, and saved print jobs, 5-2 Online Support Assistant, 1-1 usage profile reports, 3-4 PhaserSMART Technical Support, 1-1, PrintingScout alerts, 1-2 Technical Support, 1-1 Key User glossary, 6-1 Access List, 4-4 GNU Toolkit, C-12 account, 4-2 configuring settings, 4-8...
  • Page 116 Index PrintingScout alerts, 1-2 proof print jobs, 5-2 Online Support Assistant, 1-1 protocols OpenSSL License, C-28 controlling, 3-6 options definition, 6-3 automatic removal of secure, personal, discovery, 2-5 and proof jobs, 4-12 email server, 3-10 hard drive overwrite security, 4-11 EtherTalk, 3-13 Original SSLeay License, C-1 FTP, 3-9...
  • Page 117 6-4 SSL, 4-3 configuring, 4-7 definition, 6-4 startup network configuration file, 2-2 Xerox Support Centre, 1-4 Support Centre, 1-4 Xerox Usage Analysis Tool, 3-5 system requirements definition, 6-4 MaiLinX remote printing, 3-11 Usage Analysis Tool, 3-5 TCP/IP, 3-7 definition, 6-4...

Table of Contents