Ricoh Aficio MP C5502 User Manual

Ricoh Aficio MP C5502 User Manual

User guide
Hide thumbs Also See for Aficio MP C5502:
Table of Contents

Advertisement

Quick Links

Printed in China
EN
US
D143-7008
Read This First
D1437008
Manuals Provided with This Machine
Safety Information
Information for This Machine
Appendix
For information not in the printed manual,
refer to the HTML/PDF files on the supplied
CD-ROM.
Read this manual carefully before you use this machine and keep it
handy for future reference. For safe and correct use, be sure to read the
Safety Information in this manual before using the machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Aficio MP C5502

  • Page 1 Read This First Manuals Provided with This Machine Safety Information Information for This Machine Appendix For information not in the printed manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it Printed in China handy for future reference.
  • Page 2: Table Of Contents

    TABLE OF CONTENTS Introduction.................................3 How to Read the Manuals..........................4 Symbols Used in the Manuals........................4 Disclaimer................................4 Notes................................4 Machine Types...............................5 1. Manuals Provided with This Machine Manuals for This Machine..........................7 Manuals List..............................10 On-screen Operating Instructions........................11 Formats of the Operating Instructions......................11 Reading the HTML Manuals on the CD-ROM..................11 Installing and Opening the HTML Manuals....................12 Reading the PDF Manuals on the CD-ROM....................12 2.
  • Page 3 Part 68 of the FCC Rules regarding Facsimile Unit...................42 Important Safety Instructions for Facsimile Unit.....................44 IMPORTANTES MESURES DE SÉCURITÉ de l'unité Fax................44 Notes to Canadian Users of Facsimile Unit....................45 Remarques à l'attention des utilisateurs canadiens de l'unité Fax............45 ENERGY STAR Program..........................46 Energy Saving Functions..........................47 Notes to users in the state of California (Notes to Users in USA)..............49 4.
  • Page 4: Introduction

    Introduction Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine.
  • Page 5: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 6: Machine Types

    • Type 3: MP C4502/MP C4502A/Aficio MP C4502/Aficio MP C4502A/MP C4502G/Aficio MP C4502G • Type 4: MP C5502/MP C5502A/Aficio MP C5502/Aficio MP C5502A/MP C5502G/Aficio MP C5502G Certain types might not be available in some countries. For details, please contact your local dealer.
  • Page 8: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 9 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 10 Manuals for This Machine • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian. • The following software products are referred to using general names: Product name General name ScanRouter EX Professional the ScanRouter delivery software ScanRouterEX Enterprise *1 The ScanRouter EX Professional and ScanRouterEX Enterprise are no longer available for sale.
  • Page 11: Manuals List

    1. Manuals Provided with This Machine Manuals List Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided User Guide Read This First Easy Search Getting Started Paper Specifications and Adding Paper Convenient Functions Maintenance and Specifications Troubleshooting Copy/ Document Server Print Scan Connecting the Machine/ System...
  • Page 12: On-Screen Operating Instructions

    On-screen Operating Instructions On-screen Operating Instructions This chapter describes the on-screen operating instructions of this machine. The on-screen operating instructions are included in the supplied manual CD-ROM. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 13: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language and a product, and then click [OK].
  • Page 14 On-screen Operating Instructions Insert the CD-ROM in the CD-ROM drive of your computer. Select a language and a product, and then click [OK]. Click [Read PDF manuals]. • To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your computer.
  • Page 15 1. Manuals Provided with This Machine...
  • Page 16: Safety Information

    2. Safety Information This chapter describes the safety precautions. Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property.
  • Page 17: Safety Precautions To Be Followed

    2. Safety Information Safety Precautions to Be Followed This section explains safety precautions that should always be followed when using this machine. Environments where the machine can be used This section explains safety precautions about environments where the machine can be used. •...
  • Page 18: Handling Power Cords And Power Cord Plugs

    Safety Precautions to Be Followed • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. • Machine sound levels exceeding LWAd > 63 dB (A) are not suitable for desk work environments, so place the machine in another room. Handling power cords and power cord plugs This section explains safety precautions about handling power cords and power cord plugs.
  • Page 19 2. Safety Information • The supplied power cord is for use with this machine only. Do not use it with other appliances. Doing so could result in fire or electric shock. • It is dangerous to handle the power cord plug with wet hands. Doing so could result in electric shock.
  • Page 20: Handling The Main Machine

    Safety Precautions to Be Followed • If this machine is not going to be used for several days or longer at a time, disconnect its power cord from the wall outlet. • When disconnecting the power cord from the wall outlet, always pull the plug, not the cord. Pulling the cord can damage the power cord.
  • Page 21 2. Safety Information • Do not touch this machine if a lightning strike occurs in the immediate vicinity. Doing so could result in electric shock. • The following explains the warning messages on the plastic bag used in this product's packaging.
  • Page 22: Handling The Machine's Interior

    Safety Precautions to Be Followed Handling the machine's interior This section explains safety precautions about handling the machine's interior. • Do not remove any covers or screws other than those explicitly mentioned in this manual. Inside this machine are high voltage components that are an electric shock hazard and laser components that could cause blindness.
  • Page 23: Handling The Machine's Supplies

    2. Safety Information • If the machine's interior is not cleaned regularly, dust will accumulate. Fire and breakdown can result from heavy accumulation of dust inside this machine. Contact your sales or service representative for details about and charges for cleaning the machine's interior. Handling the machine's supplies This section explains safety precautions about handling the machine's supplies.
  • Page 24 Safety Precautions to Be Followed • If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment. Consult a doctor if necessary. • If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult a doctor if necessary.
  • Page 25: Safety Labels Of This Machine

    2. Safety Information Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels for Users of Types 1 and 2 This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated.
  • Page 26 Safety Labels of This Machine CJZ004 Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper.
  • Page 27 2. Safety Information Paper trays CJZ005 CJZ006 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. CKA025 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 28 Safety Labels of This Machine Bridge unit CJZ023 CKA023 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. CJZ002 Do not touch the parts a label indicates. The inside of the bridge unit could be very hot. Caution should be taken when removing misfed paper.
  • Page 29 2. Safety Information Booklet Finisher SR3100 CJZ007 CJZ008 Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam. You might trap your fingers if you do not. Take care not to touch the booklet finisher tray during operation.
  • Page 30 Safety Labels of This Machine Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam. You might trap your fingers if you do not. Finisher SR3090 CJZ010 CJZ011 During operation, rollers for transporting the paper revolve.
  • Page 31 2. Safety Information CJZ028 Do not lean against Finisher SR3070. It may fall off the machine and cause an injury. External tray CJZ031 CKA023 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur.
  • Page 32: Positions Of Warning And Caution Labels For Users Of Types 3 And 4

    Safety Labels of This Machine Positions of WARNING and CAUTION labels for Users of Types 3 and 4 This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. Main unit CJZ012 CJZ013...
  • Page 33 2. Safety Information CJZ004 Do not touch the parts a label indicates. The inside of the machine could be very hot. Caution should be taken when removing misfed paper.
  • Page 34 Safety Labels of This Machine Paper trays CJZ014 CJZ006 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. CKA025 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 35 2. Safety Information Bridge unit CJZ026 CKA023 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. CJZ002 Do not touch! Surface may be very hot.
  • Page 36 Safety Labels of This Machine Finisher SR3120 or Booklet Finisher SR3110 CJZ022 CJZ011 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. CJZ008...
  • Page 37 2. Safety Information Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam. You might trap your fingers if you do not. Take care not to touch the booklet finisher tray during operation.
  • Page 38: Power Switch Symbols

    Safety Labels of This Machine During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. External tray CJZ032 CKA023 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation.
  • Page 39 2. Safety Information...
  • Page 40: Information For This Machine

    3. Information for This Machine This chapter describes laws and regulations related to this machine. Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 41: Laser Safety

    3. Information for This Machine Laser Safety Laser Safety for Types 1 and 2 CDRH Regulations This equipment complies with requirements of 21 CFR subchapter J for class I laser products. This equipment contains four AlGaInP laser diodes, 9 milliwatts, 648–663 nanometer wavelength for each emitter.
  • Page 42: Notes To Usa Users Of Fcc Requirements

    • MP C3002G/Aficio MP C3002G • MP C3502G/Aficio MP C3502G • MP C4502/Aficio MP C4502 • MP C4502A/Aficio MP C4502A • MP C5502/Aficio MP C5502 • MP C5502A/Aficio MP C5502A • MP C4502G/Aficio MP C4502G • MP C5502G/Aficio MP C5502G...
  • Page 43: Part 68 Of The Fcc Rules Regarding Facsimile Unit

    7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is...
  • Page 44 Notes to USA Users of FCC Requirements causing problems with your telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. 8. In the event of operation problems (document jam, copy jam, communication error indication), see the manual provided with this machine for instruction on resolving the problem.
  • Page 45: Important Safety Instructions For Facsimile Unit

    3. Information for This Machine Important Safety Instructions for Facsimile Unit When using your telephone equipment, basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons, including the following: • Do not use this product near water, for example, near a bath tub, wash bowl, kitchen sink or laundry tub, in a wet basement or near a swimming pool.
  • Page 46: Notes To Canadian Users Of Facsimile Unit

    Notes to Canadian Users of Facsimile Unit Notes to Canadian Users of Facsimile Unit This product meets the applicable Industry Canada technical specifications. The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.
  • Page 47: Energy Star Program

    3. Information for This Machine ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ® ENERGY STAR Program.
  • Page 48: Energy Saving Functions

    Energy Saving Functions Energy Saving Functions To reduce its power consumption, this machine has the following functions: Low Power mode • If this machine remains idle for a specified period, it automatically reduces its electrical consumption. • The default period the machine waits before entering Low Power mode is "Off". This default time can be changed.
  • Page 49 3. Information for This Machine Type 3 Type 4 Time of switch out from Low Power 10 seconds 10 seconds mode Reduced electrical consumption in Sleep 1.0 W 1.0 W mode Time of switch into Sleep mode 1 minute 1 minute Time of switch out from Sleep mode 15 seconds 20 seconds...
  • Page 50: Notes To Users In The State Of California (Notes To Users In Usa)

    Notes to users in the state of California (Notes to Users in USA) Notes to users in the state of California (Notes to Users in USA) Perchlorate Material - special handling may apply, See www.dtsc.ca.gov/hazardouswaste/ perchlorate...
  • Page 51 3. Information for This Machine...
  • Page 52: Appendix

    4. Appendix This chapter describes trademarks. Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. ® Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the United States and other countries.
  • Page 53 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 54 © 2011...
  • Page 55 Errata This supplement provides notes and corrections for the manuals provided with this machine. Topic Error Corrections Fax > Changing/Confirming Com- If Memory Lock Reception and re- Settings for both Memory Lock ceived document storage are both Reception and received document munication Information >...
  • Page 56 Topic Error Corrections Security Guide > 4. Preventing If you use hard disk erase-by-over- If you use hard disk erase- Leakage of Information from Ma- write and encryption simultaneous- by-overwrite and encryption chines > Encrypting Data on the ly and you select overwrite three simultaneously and you select Hard Disk >...
  • Page 57 Topic Error Corrections Security Guide > 7. Managing Step 7 Step 7 the Machine > Managing Device Specify the encryption key if the Specify the encryption key that was settings file was encrypted during created when the file was exported. Information >...
  • Page 58 Errata for copyrights Connecting the Machine/ System Settings > Appendix > Copyrights Official information on Racoon and SPX/IPX is as follows: racoon Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 59 User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 61 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine I Want to Save Paper............................9 I Want to Convert Documents to Electronic Formats Easily................10 I Want to Register Destinations........................11 I Want to Operate the Machine More Effectively..................12 You Can Customize the [Home] Screen as You Like..................13...
  • Page 62 Turning Off the Main Power........................59 When the Authentication Screen is Displayed....................61 User Code Authentication Using the Control Panel..................61 Logging In Using the Control Panel......................61 Logging Out Using the Control Panel......................62 Placing Originals..............................63 Placing Originals on the Exposure Glass....................63 Placing Originals in the Auto Document Feeder..................63 3.
  • Page 63 Storing a Document............................97 Sending Stored Documents.........................98 Printing the Journal Manually........................100 5. Print Quick Install..............................101 Displaying the Printer Driver Properties......................102 Standard Printing............................103 When Using the PCL 6 Printer Driver.......................103 Locked Print..............................104 Sending a Locked Print File........................104 Printing a Locked Print File Using the Control Panel................104 Hold Print................................106 Sending a Hold Print File..........................106 Printing a Hold Print File Using the Control Panel...................106...
  • Page 64 7. Document Server Storing Data..............................127 Printing Stored Documents..........................129 8. Web Image Monitor Displaying Top Page.............................131 Viewing Received Fax Documents Using Web Image Monitor..............133 9. Adding Paper and Toner Loading Paper into Paper Trays........................135 Loading Paper into the Bypass Tray......................137 Settings to Use the Bypass Tray under the Printer Function..............138 Loading Paper into the Small Size Paper Tray....................142 Loading Paper into Tray 3 (LCT)........................144 Loading Paper into the Large Capacity Tray (LCT)..................146...
  • Page 65 INDEX ................................235...
  • Page 66: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 67: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CJS021 The following information is region-specific.
  • Page 68: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Reverse Document Feeder ARDF • Auto Document Feeder ADF (in this manual, "ADF" refers to the ARDF and the one-pass duplex scanning ADF) •...
  • Page 69: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a procedure either by keyword or by what you want to do. I Want to Save Paper BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax)) See "Combined Copying", Copy/ Document Server...
  • Page 70: I Want To Convert Documents To Electronic Formats Easily

    1. What You Can Do with This Machine I Want to Convert Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan Storing scan files in a shared folder See "Basic Procedure When Using Scan to Folder", Scan...
  • Page 71: I Want To Register Destinations

    I Want to Register Destinations I Want to Register Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax See "Entering an E-mail Address Manually", Scan Using Web Image Monitor to register destinations from a computer See "Registering Internet Fax Destination Information Using Web Image Monitor", Fax Downloading destinations registered in the machine to the LAN-Fax driver destination list See "Using the machine's Address Book as the LAN-Fax destination list", Fax...
  • Page 72: I Want To Operate The Machine More Effectively

    1. What You Can Do with This Machine I Want to Operate the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Fax/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions Registering frequently-used printing settings to the printer driver...
  • Page 73: You Can Customize The [Home] Screen As You Like

    You Can Customize the [Home] Screen as You Like You Can Customize the [Home] Screen as You Like The icons of each function are displayed on the [Home] screen. CJQ611 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 74: You Can Make Copies Using Various Functions

    1. What You Can Do with This Machine You Can Make Copies Using Various Functions CJQ601 • You can make copies in full color. You can switch the color copy mode depending on the type of originals used and the desired finish. •...
  • Page 75: You Can Print Data Using Various Functions

    You Can Print Data Using Various Functions You Can Print Data Using Various Functions CJQ602 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 76: You Can Utilize Stored Documents

    1. What You Can Do with This Machine You Can Utilize Stored Documents You can store files scanned in copier, facsimile, printer, or scanner mode on the machine's hard disk. With Web Image Monitor, you can use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 77: You Can Send And Receive Faxes Without Paper

    You Can Send and Receive Faxes without Paper You Can Send and Receive Faxes without Paper Reception You can store and save received fax documents as electronic formats in the machine's hard disk without printing them. CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents).
  • Page 78 1. What You Can Do with This Machine CJQ605 • To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer, and then specify the destination. • You can also check the sent image data. •...
  • Page 79: You Can Send And Receive Faxes Using The Internet

    You Can Send and Receive Faxes Using the Internet You Can Send and Receive Faxes Using the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx CJQ606 E-mail Transmission and Reception This machine converts scanned document images to e-mail format, and transmits and receives this data over the Internet.
  • Page 80 1. What You Can Do with This Machine • For details about how to transmit and receive documents over the Internet, see "Transmission" and "Reception", Fax...
  • Page 81: You Can Send And Receive Faxes By Using The Machine Without Fax Unit Installed

    You Can Send and Receive Faxes by Using the Machine without Fax Unit Installed You Can Send and Receive Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). CJQ612 •...
  • Page 82: You Can Use The Facsimile And The Scanner In A Network Environment

    1. What You Can Do with This Machine You Can Use the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). • You can send scan files directly to folders (Sending scan files by Scan to Folder). •...
  • Page 83: You Can Prevent Information Leakage (Security Functions)

    You Can Prevent Information Leakage (Security Functions) You Can Prevent Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 84: You Can Monitor And Set The Machine Using A Computer

    1. What You Can Do with This Machine You Can Monitor and Set the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 85: You Can Prevent An Unauthorized Copy

    You Can Prevent an Unauthorized Copy You Can Prevent an Unauthorized Copy You can print embedded pattern on paper to prevent them from being copied. CJQ613 • Using the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy, preventing confidential information from being copied.
  • Page 86 1. What You Can Do with This Machine...
  • Page 87: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components Guide to Components of Types 1 and 2 • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur.
  • Page 88 2. Getting Started 2. Exposure glass Place originals face down here. 3. Ventilation holes Prevent overheating. 4. Main power switch To operate the machine, the main power switch must be on. If it is off, open the cover and turn the switch on. 5.
  • Page 89 Guide to Names and Functions of Components 1. Ventilation holes Prevent overheating. 2. Bypass tray Use to copy or print on OHP transparencies and label paper (adhesive labels). 3. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 4.
  • Page 90: Guide To Components Of Types 3 And 4

    2. Getting Started Guide to Components of Types 3 and 4 • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur. Front and left view CJS004 1.
  • Page 91 Guide to Names and Functions of Components 4. Main power switch To operate the machine, the main power switch must be on. If it is off, open the cover and turn the switch on. 5. Control panel See p.45 "Guide to the Names and Functions of the Machine's Control Panel". 6.
  • Page 92 2. Getting Started 3. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 4. Extender Pull this extender out when loading sheets larger than A4 , 8 × 11 in the bypass tray. 5.
  • Page 93: Guide To Functions Of The Machine's Options

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options External options for types 1 and 2 (mainly Europe and Asia) CJS007 1. Small size paper tray Holds small size sheets of paper or envelopes. To use the small size paper tray, install it in trays 2–4.
  • Page 94 2. Getting Started 5. Large capacity tray (LCT) Holds up to 1,200 sheets of paper. 6. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 7. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down.
  • Page 95 Guide to Functions of the Machine's Options External options for types 1 and 2 (mainly North America) CJS008 1. Handset Used as a receiver when a fax unit is installed. Allows you to use the On Hook Dial and Manual Dial functions. It also allows you to use the machine as a telephone.
  • Page 96 2. Getting Started 7. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 8. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 9.
  • Page 97 Guide to Functions of the Machine's Options External options for types 3 and 4 (models equipped with the ARDF) (mainly Europe and Asia) CJS009 1. Scanner accessibility unit This unit lets you operate the machine or scan documents from the side instead of using the control panel on the machine.
  • Page 98 2. Getting Started 5. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 6. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 7.
  • Page 99 Guide to Functions of the Machine's Options External options for types 3 and 4 (models equipped with the ARDF) (mainly North America) CJS010 1. Scanner accessibility unit This unit lets you operate the machine or scan documents from the side instead of using the control panel on the machine.
  • Page 100 2. Getting Started 5. Large capacity tray (LCT) Holds up to 1,200 sheets of paper. 6. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 7. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down.
  • Page 101 Guide to Functions of the Machine's Options External options for types 3 and 4 (models equipped with the one-pass duplex scanning ADF) (mainly Europe and Asia) CJS011 1. Small size paper tray Holds small size sheets of paper or envelopes. To use the small size paper tray, install it in trays 2–4.
  • Page 102 2. Getting Started 6. Bridge unit Relays paper to the finisher. 7. Internal shift tray Sorts and stacks multiple sheets of paper. 8. External tray If you select this as the output tray, copied/printed paper and fax messages are delivered here face down. 9.
  • Page 103 Guide to Functions of the Machine's Options External options for types 3 and 4 (models equipped with the one-pass duplex scanning ADF) (mainly North America) CJS012 1. Handset Used as a receiver when a fax unit is installed. Allows you to use the On Hook Dial and Manual Dial functions. It also allows you to use the machine as a telephone.
  • Page 104 2. Getting Started 5. Lower paper trays Consists of two paper trays. Holds up to 1,100 sheets of paper. Each paper tray holds 550 sheets. 6. Internal tray 2 If you select this as the output tray, copied/printed paper or fax messages are delivered here face down. 7.
  • Page 105: Guide To The Names And Functions Of The Machine's Control Panel

    Guide to the Names and Functions of the Machine's Control Panel Guide to the Names and Functions of the Machine's Control Panel This illustration shows the control panel of the machine with options fully installed. CJS060 1. [Home] key Press to display the [Home] screen. For details, see p.48 "How to Use the [Home] Screen". 2.
  • Page 106 2. Getting Started See "Registering Frequently Used Functions", Convenient Functions • Press to program defaults for the initial display when modes are cleared or reset, or immediately after the main power switch is turned on. See "Changing the Default Functions of the Initial Screen", Convenient Functions 6.
  • Page 107 Guide to the Names and Functions of the Machine's Control Panel 18. [Check Status] key Press to check the machine's system status, operational status of each function, and current jobs. You can also display the job history and the machine's maintenance information. 19.
  • Page 108: How To Use The [Home] Screen

    2. Getting Started How to Use the [Home] Screen The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 109: Adding Icons To The [Home] Screen

    How to Use the [Home] Screen 7. Shortcut icon You can add shortcuts to programs or Web pages to the [Home] screen. For details about how to register shortcuts, see p.49 "Adding Icons to the [Home] Screen". The program number appears on the bottom of the shortcut icon.
  • Page 110 2. Getting Started Point to [Device Management], and then click [Home Management]. Click [Edit Icons]. Point to [Icon can be added.] of the position that you want to add, and then click [Add]. Select the function or shortcut icon you want to add. Click [OK] four times.
  • Page 111 How to Use the [Home] Screen Press [Add Icon]. Press the [Program] tab. Make sure that [Copier Program] is selected. Select the program you want to add.
  • Page 112 2. Getting Started Specify the position where [Blank] is displayed. Press [OK]. Press the [User Tools/Counter] key. • Press [ ] on the upper-right corner of the screen to check the position on the simple screen.
  • Page 113: Registering Functions In A Program

    Registering Functions in a Program Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Color mode, original type, density, Special Original, paper tray, Store File (except for User Name...
  • Page 114 2. Getting Started Press the [Home] key on the top left of the control panel, and press the [Copier] icon on the [Home] screen. CJS113 Edit the copy settings so all functions you want to store in a program are selected. Press the [Program] key.
  • Page 115: Example Of Programs

    Registering Functions in a Program • The number of characters you can enter for a program name varies depending on the functions as follows: • Copier: 34 characters • Document Server: 34 characters • Facsimile: 20 characters • Scanner: 34 characters •...
  • Page 116 2. Getting Started Program name Program description Magazine copy Specify [Magazine] in [Dup./Combine/Series] and [Staple: Centre] in [Finishing]. You can save paper. Also, you can print documents in-house instead of having them printed by an outside printing company. Size unity copy Specify [Mixed Sizes] in [Special Original] and [Auto Reduce / Enlarge] in the initial display.
  • Page 117 Registering Functions in a Program Program name Program description Size unity scan Select [Mixed Original Sizes] in [Scan Settings], and specify a paper size in the initial display. You can skip this procedure to unify the size when reprinting scanned data. Digital signature scan In [Send File Type / Name], specify [PDF], [High Compression PDF], or [PDF/A] in [File Type], and also...
  • Page 118 2. Getting Started • Depending on the options installed, some functions cannot be registered. For details, see "Functions Requiring Optional Configurations", Getting Started • The names of programs given above are just examples. You can assign any name to a program according to your objectives.
  • Page 119: Turning On/Off The Power

    Turning On/Off the Power Turning On/Off the Power The main power switch is on the left side of the machine. Turning off this switch makes the main power indicator on the right side of the control panel go off. When this is done, machine power is off. When the fax unit is installed, fax files in memory may be lost if you turn this switch off.
  • Page 120 2. Getting Started • Make sure to turn off the main power switch before pulling out the power plug. Not doing so may result in damage to the hard disk or memory, leading to malfunctions. • Do not turn off the power while the machine is in operation. Open the main power switch cover, and then turn off the main power switch.
  • Page 121: When The Authentication Screen Is Displayed

    When the Authentication Screen is Displayed When the Authentication Screen is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 122: Logging Out Using The Control Panel

    2. Getting Started Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging Out Using the Control Panel This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 123: Placing Originals

    Placing Originals Placing Originals Placing Originals on the Exposure Glass • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF. Be sure to lift the ADF by more than 30 degrees. Otherwise, the size of the original might not be detected correctly.
  • Page 124 2. Getting Started ARDF (Types 1 and 2) CJW003 ARDF (Types 3 and 4) CJW004 One-pass duplex scanning ADF (Types 3 and 4) CJW005 1. Sensors Adjust the original guide to the original size. Set the aligned originals squarely face up in the ADF. Do not stack originals beyond the limit mark.
  • Page 125 Placing Originals CJW006 • ARDF (Types 3 and 4) CJW007 • One-pass duplex scanning ADF (Types 3 and 4) CJW008 1. Limit mark 2. Original guide...
  • Page 126 2. Getting Started...
  • Page 127: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 128 3. Copy When the copy job is finished, press the [Reset] key to clear the settings.
  • Page 129: Auto Reduce / Enlarge

    Auto Reduce / Enlarge Auto Reduce / Enlarge The machine automatically detects the original size and then selects an appropriate reproduction ratio based on the paper size you select. CKN008 • If you select a reproduction ratio after pressing [Auto Reduce / Enlarge], [Auto Reduce / Enlarge] is canceled and the image cannot be rotated automatically.
  • Page 130 3. Copy (mainly North America) Original location Original size and orientation Exposure glass 11 × 17 , 8 × 14 , 8 × 11 × 8 11 × 17 , 8 × 14 , 8 × 11 × 8 , 10 × 14 , 7 ×...
  • Page 131: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page. 2 Sided 2 Sided Copies one 2-sided page on one 2-sided page.
  • Page 132 3. Copy Original Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Dup./Combine/Series]. Make sure that [Duplex] is selected. If [Duplex] is not selected, press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output.
  • Page 133: Combined Copying

    Combined Copying Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 134: One-Sided Combine

    3. Copy CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 There are six types of One-Sided Combine. 1 Sided 2 Originals Combine 1 Side Copies two 1-sided originals to one side of a sheet. 1 Sided 4 Originals Combine 1 Side Copies four 1-sided originals to one side of a sheet.
  • Page 135: Two-Sided Combine

    Combined Copying 2 Sided 4 Pages Combine 1 Side Copies two 2-sided originals to one side of a sheet. 2 Sided 8 Pages Combine 1 Side Copies four 2-sided originals to one side of a sheet. Press [Dup./Combine/Series]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original:].
  • Page 136 3. Copy CKN074 There are six types of Two-Sided Combine. 1 Sided 4 Originals Combine 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Combine 2 Sides Copies eight 1-sided originals to one sheet with four pages per side. 1 Sided 16 Originals Combine 2 Sides Copies 16 1-sided originals to one sheet with eight pages per side.
  • Page 137 Combined Copying Select [1 Sided] or [2 Sided] for [Original:]. Press [Combine 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original:] and/or [Copy:], and then press [OK]. Select the number of originals to combine. Press [OK]. Select the paper size.
  • Page 138: Copying Onto Custom Size Paper From The Bypass Tray

    3. Copy Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 148.0–457.2 mm (5.83–18.00 inches) and a vertical length of 90.0–305.0 mm (3.55–12.00 inches) can be fed in from the bypass tray. Note however that the limitation on the horizontal and vertical length range will vary depending on which options are installed.
  • Page 139: Copying Onto Envelopes

    Copying onto Envelopes Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Envelopes should be fed from the bypass tray or paper tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see p.148 "Recommended Paper Sizes and Types".
  • Page 140: Copying Onto Envelopes From The Paper Tray

    3. Copy Place the original face down on the exposure glass. The original should be aligned to the rear left corner. CJW001 1. Positioning mark Load the envelopes face down in the bypass tray. [Bypass] is automatically selected. Press the [ ] key. Press [Paper Size].
  • Page 141: Finishing

    Finishing Finishing Staple Each copy set can be stapled together. CKN021 • You cannot use the bypass tray with this function. Original orientation and staple position Place all the originals in the ADF in the orientation in which they can be read normally. When placing the original on the exposure glass, keep the same orientation, but place the original facing downwards.
  • Page 142 3. Copy Placing the original on Placing the original in the Staple position the exposure glass Bottom Slant Left 2 Top 2 *2 *3 Center *1 The above tables show staple positioning. The orientation of the paper does not indicate orientation of delivery.
  • Page 143: Punch

    Finishing Select one of the staple positions. When you select a staple position, Sort is automatically selected. Press [OK]. Enter the number of copy sets with the number keys. Place the originals, and then press the [Start] key. Punch You can make punch holes in copies. CKN022 The available number of punch holes is shown below: (mainly Europe and Asia): 2 holes, 4 holes...
  • Page 144 3. Copy When the paper that is loaded is the same size and orientation as the original, the relationship between the orientation in which you place the original and the punch hole positions is as follows. You can confirm the punch hole positions that can be selected on the screen that appears when [Finishing] is pressed.
  • Page 145 Finishing Press [Finishing]. Select one of the punch hole positions. Press [OK]. Enter the number of copy sets with the number keys. Place the originals, and then press the [Start] key.
  • Page 146: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents from the Document Server screen. For details about the Document Server, see p.127 "Storing Data".
  • Page 147: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 148 4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Make the scan settings such as scan size and resolution. Configure the transmission settings such as "TX Mode" as necessary. Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 149: Registering A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) If you send documents to Internet Fax or e-mail destinations or enable the "E-mail TX Results" function, specify a sender. Press the [Start] key. Registering a Fax Destination Press the [User Tools/Counter] key. Press [Address Book Management]. Check that [Program / Change] is selected.
  • Page 150: Deleting A Fax Destination

    4. Fax Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Deleting a Fax Destination •...
  • Page 151 Basic Procedure for Transmissions (Memory Transmission) Press [Delete All], and then press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 152: Transmitting While Checking Connection To Destination (Immediate Transmission)

    4. Fax Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 153 Transmitting while Checking Connection to Destination (Immediate Transmission) Specify a destination. If you make a mistake, press the [Clear] key, and then enter again. Press the [Start] key.
  • Page 154: Canceling A Transmission

    4. Fax Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Press the [Reset] key. CJN023 Canceling a Transmission While the Original Is Being Scanned Use this procedure to cancel scanning or transmitting of the original while it is being scanned.
  • Page 155: Canceling A Transmission After The Original Is Scanned

    Canceling a Transmission Press [Cancel Scanning] or [Cancel TX]. Depending on the transmission mode and function you use, either [Cancel Scanning] or [Cancel TX] is displayed. Canceling a Transmission After the Original Is Scanned Use this procedure to cancel a transmission after the original is scanned. You can cancel transmission of a file while the file is being sent, stored in memory, or if it fails to transmit.
  • Page 156: Sending At A Specific Time (Send Later)

    4. Fax Sending at a Specific Time (Send Later) Using this function, you can instruct the machine to delay transmission of your fax document until a specified later time. This allows you to take advantage of off-peak telephone charges without having to be by the machine at the time.
  • Page 157: Storing A Document

    Storing a Document Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 158: Sending Stored Documents

    4. Fax Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 159 Storing a Document Press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [User Name] to place the documents in order by programmed user name. •...
  • Page 160: Printing The Journal Manually

    4. Fax Printing the Journal Manually To print the Journal manually, select the printing method: "All", "Print per File No.", or "Print per User". Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 161: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 162: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 163: Standard Printing

    Standard Printing Standard Printing • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete. In this case, check if the document was printed.
  • Page 164: Locked Print

    5. Print Locked Print Sending a Locked Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 165 Locked Print Press the [Print Jobs] tab. Press [Locked Print Job]. Select the files you want to print. You can select all the Locked Print files at once by pressing [Select All Jobs] after selecting a file. Press [Print]. Enter the password using the number keys, and then press [OK]. To change the print settings of the document, press [Detailed Settings].
  • Page 166: Hold Print

    5. Print Hold Print Sending a Hold Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 167 Hold Print Press the [Print Jobs] tab. Press [Hold Print Job]. Select the files you want to print. You can select all the Hold Print files at once by pressing [Select All Jobs] after selecting a file. Press [Print]. To change the print settings of the document, press [Detailed Settings]. Enter the number of copies using the number keys if necessary, and then press [Print].
  • Page 168: Stored Print

    5. Print Stored Print Sending a Stored Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 169: Printing A Stored Print File Using The Control Panel

    Stored Print Printing a Stored Print File Using the Control Panel • The stored documents are not deleted even after the printing has been completed. For the procedure to delete the documents, see "Deleting Stored Print files", Print Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 170: Direct Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing Files from an External Memory Device Printing Files from an External Memory Device Direct Printing from a Removable Memory Device • Using the Media Slot • Printable File Formats • Printing from a Removable Memory Device •...
  • Page 171 Printing Files from an External Memory Device Using the Media Slot • USB flash memory devices and SD cards are supported for direct printing. However, certain types of USB flash memory devices and SD cards cannot be used. For details, contact your sales or service representative.
  • Page 172: Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing from a Removable Memory Device Insert a removable memory device into the media slot. For details about inserting a removable memory device, see "Inserting/Removing a Memory Storage Device", Getting Started. Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 173 Printing Files from an External Memory Device • Depending on the security setting, [Prt. From Dev.] may not appear. For details, see Security Guide • You cannot select multiple files of different formats at the same time. • Files or groups of files larger than 1 GB cannot be printed. •...
  • Page 174: Screen For Direct Printing

    Printing Files from an External Memory Device Screen for Direct Printing To display this screen, press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen, and then press [Prt. From Dev.]. You can view files either as a list or as thumbnails.
  • Page 175 Printing Files from an External Memory Device Press to display the print image of the 1st page of the selected document. You can change the scale factor and display position of the print image. [Start Printing] Press to print the selected file. List/Thumbnail Press to switch between list view and thumbnail view.
  • Page 176: Using Pictbridge

    Printing Files from an External Memory Device Direct Printing from a Digital Camera (PictBridge) You can connect a PictBridge-compatible digital camera to this machine using a USB cable. This allows you to print photographs taken using the digital camera directly by operating the digital camera.
  • Page 177: Exiting Pictbridge

    Printing Files from an External Memory Device • Some digital cameras require settings for manual PictBridge operation. For details, see your digital camera's manual. Exiting PictBridge • Do not disconnect the USB cable while data is being sent to the machine. If you do, printing will fail.
  • Page 178: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 179: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Colour: Text / Photo] in the [Original Type] tab. •...
  • Page 180 Basic Procedure When Using Scan to Folder Confirm the user name. The user name is displayed under [USERNAME]. Step 2: Creating a shared folder on a computer running Microsoft Windows Create a shared destination folder in Windows and enable sharing. In the following procedure, a computer which is running under Windows 7 Professional and participating in a domain is used as an example.
  • Page 181: Registering An Smb Folder

    6. Scan Step 3: Specifying access privileges for the created shared folder If you want to specify access privileges for the created folder to allow other users or groups to access the folder, configure the folder as follows: Right-click the folder created in above step 1, and then click [Properties]. On the [Security] tab, select [Edit...].
  • Page 182 Basic Procedure When Using Scan to Folder • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title. You can select [Frequent] and one more key for each title.
  • Page 183 6. Scan Press [Exit]. If the connection test fails, check the settings, and then try again. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Locating the SMB folder manually Press [Change] under "Path". Enter the path where the folder is located. For example: if the name of the destination computer is "User", and the folder name is "Share", the path will be \\User\Share.
  • Page 184: Deleting An Smb Registered Folder

    Basic Procedure When Using Scan to Folder You can press [Up One Level] to switch between levels. Select the folder you want to register. Press [OK]. Deleting an SMB Registered Folder Press the [User Tools/Counter] key. Press [Address Book Management]. Check that [Program / Change] is selected.
  • Page 185: Entering The Path To The Destination Manually

    6. Scan Entering the Path to the Destination Manually Press [Manual Entry]. Press [SMB]. Press [Manual Entry] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 186: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E- mail Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen. CJS113 Make sure that no previous settings remain. If a previous setting remains, press the [Clear Modes] key.
  • Page 187: Registering An E-Mail Destination

    6. Scan Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Colour: Text / Photo] in the [Original Type] tab. • Press [Original Feed Type], and then press [2 Sided Original]. •...
  • Page 188: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail You can select [Frequent] and one more key for each title. Press [E-mail]. Press [Change] under "E-mail Address". Enter the e-mail address. Press [OK]. Select [E-mail / Internet Fax Destination] or [Internet Fax Destination Only]. If [E-mail / Internet Fax Destination] is specified, registered e-mail addresses appear in both the internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 189: Entering An E-Mail Address Manually

    6. Scan Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 190: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 191: Checking A Stored File Selected From The List

    6. Scan Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. • File Name Press [File Name], enter a file name, and then press [OK]. •...
  • Page 192: Specifying The File Type

    Specifying the File Type Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a removable memory device.
  • Page 193: Specifying Scan Settings

    6. Scan Specifying Scan Settings Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 194: Basic Procedure For Saving Scan Files On A Removable Memory Device

    Storing the Scanned Documents to a USB Flash Memory or SC Card Storing the Scanned Documents to a USB Flash Memory or SD Card This section explains how to save data on external media using the scanner function. • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately.
  • Page 195 Storing the Scanned Documents to a USB Flash Memory or SC Card Insert a removable memory device in the media slot. You can connect only one removable memory device at a time. The media slot cannot be used if both an SD card and a USB flash memory are inserted into it at the same time. Make sure that no previous settings remain.
  • Page 196 Storing the Scanned Documents to a USB Flash Memory or SC Card Remove the memory device from the media slot. Remove the media from the media slot only after data has been written completely. Removing the media while data is being written will result in corrupted data. •...
  • Page 197 Storing the Scanned Documents to a USB Flash Memory or SC Card 126D...
  • Page 198: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 199 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. CJS113 Press [To Scanning Screen]. Press [User Name]. Specify a user name, and then press [OK]. The user names shown are names that were registered in the Address Book.
  • Page 200: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [Finishing] ([Sort] / [Rotate Sort] / [Stack] / [Staple] / [Punch]) •...
  • Page 201 7. Document Server...
  • Page 202: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 203 8. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 204: Viewing Received Fax Documents Using Web Image Monitor

    Viewing Received Fax Documents Using Web Image Monitor Viewing Received Fax Documents Using Web Image Monitor Start Web Image Monitor. Click [Fax Received File] on the [Print Job/Stored File] menu in the left pane. If you have programmed a user code for the stored reception file, enter the code, and then press [OK].
  • Page 205 8. Web Image Monitor...
  • Page 206: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Loading Paper into Paper Trays Every paper tray is loaded in the same way. In the following example procedure, paper is loaded into tray 2. •...
  • Page 207 9. Adding Paper and Toner CJW012 Carefully push the paper tray fully in. • Various sizes of paper can be loaded in trays 2–4 by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in Trays 2-4", Paper Specifications and Adding Paper •...
  • Page 208: Loading Paper Into The Bypass Tray

    Loading Paper into the Bypass Tray Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Load only as much paper as can be held between the paper guides on the bypass tray.
  • Page 209: Settings To Use The Bypass Tray Under The Printer Function

    9. Adding Paper and Toner • Certain types of paper might not be detected properly when placed on the bypass tray. If this happens, remove the paper and place it on the bypass tray again. • Pull the extender out when loading sheets larger than A4 , 8 ×...
  • Page 210 Loading Paper into the Bypass Tray Setting the paper size using the control panel Press the [User Tools/Counter] key. CJS039 Press [Tray Paper Settings]. Press [Printer Bypass Paper Size]. Select the paper size. Press [OK]. Press the [User Tools/Counter] key. •...
  • Page 211 9. Adding Paper and Toner Setting custom size paper using the control panel Press the [User Tools/Counter] key. CJS039 Press [Tray Paper Settings]. Press [Printer Bypass Paper Size]. Press [Custom Size]. If a custom size is already set, press [Change Size]. Press [Vertical], enter the size of the paper using the number keys, and then press [ ].
  • Page 212 Loading Paper into the Bypass Tray Press the [User Tools/Counter] key. CJS039 Press [Tray Paper Settings]. Press [ Next]. Press [Paper Type: Bypass Tray]. Select the proper items, according to the paper type you want to set. • Press [OHP (Transparency)] on the [Paper Type] area when loading OHP transparencies. •...
  • Page 213: Loading Paper Into The Small Size Paper Tray

    9. Adding Paper and Toner Loading Paper into the Small Size Paper Tray • Check the paper edges are aligned at the right side. • If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side fences may slip out of place.
  • Page 214 Loading Paper into the Small Size Paper Tray • Various sizes of paper can be loaded in the small size paper tray by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in the Small Size Paper Tray", Paper Specifications and Adding Paper •...
  • Page 215: Loading Paper Into Tray 3 (Lct)

    9. Adding Paper and Toner Loading Paper into Tray 3 (LCT) • When paper loaded in the right side of Tray 3 (LCT) runs out, paper on the left is automatically shifted to the right. Do not pull out Tray 3 (LCT) while the tray is moving paper; wait until sounds stop coming from the tray.
  • Page 216 Loading Paper into Tray 3 (LCT) • Left half of the tray pulled out CJW017 Carefully push the paper tray fully in. • You can load paper even if Tray 3 (LCT) is in use. It is okay to pull out the left half of the tray while Tray 3 (LCT) is in use.
  • Page 217: Loading Paper Into The Large Capacity Tray (Lct)

    9. Adding Paper and Toner Loading Paper into the Large Capacity Tray (LCT) • (mainly Europe and Asia) The large capacity tray (LCT) can hold A4 paper only. If you want to print on 8 × 11 or B5 JIS from the large capacity tray (LCT), contact your service representative. •...
  • Page 218 Loading Paper into the Large Capacity Tray (LCT) CJW020 Load paper by repeating steps 2 and 3. Close the right cover of the large capacity tray (LCT).
  • Page 219: Recommended Paper Sizes And Types

    9. Adding Paper and Toner Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use damp or curled paper, a staple clogging or paper jam may occur. • Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed.
  • Page 220 Recommended Paper Sizes and Types Trays 2–4 Paper type and weight Paper size Paper capacity 52–256 g/m (14 lb. Bond–140 Paper sizes that can be 550 sheets lb. Index) detected automatically: Thin Paper–Thick Paper 3 A3 , A4 , A5 , B4 JIS , B5 JIS ×...
  • Page 221 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–256 g/m (14 lb. Bond–140 Custom size: 550 sheets lb. Index) Thin Paper–Thick Paper 3 Vertical: 182.0–297.0 mm Horizontal: 148.0–432.0 Vertical: 7.17–11.69 inches Horizontal: 5.83–17.00 inches Envelopes Select the paper size using 50 sheets the System Settings menu:...
  • Page 222 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 52–256 g/m (14 lb. Bond–140 Custom size: 550 sheets lb. Index) Thin Paper–Thick Paper 3 Vertical: 100.0–220.0 mm Horizontal: 148.0–432.0 Vertical: 3.94–8.66 inches Horizontal: 5.83–17.00 inches Envelopes Select the paper size using •...
  • Page 223 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52–300 g/m (14 lb. • Thin Paper–Middle Bond–110 lb. Cover) Thick: 100 sheets Thin Paper–Thick • Thick Paper 1: 40 B4 JIS , B5 JIS , B6 JIS , Paper 4 sheets 11 ×...
  • Page 224 Recommended Paper Sizes and Types *2 Enter the paper size. For copier mode, see "Copying onto Custom Size Paper from the Bypass Tray", Copy/ Document Server . For printer mode, see p.140 "Setting custom size paper using the control panel". *3 In printer or facsimile mode, the maximum horizontal length of the custom size is 600.0 mm (23.62 inches).
  • Page 225 9. Adding Paper and Toner Paper Thickness Paper Thickness Paper weight Thin Paper 52–59 g/m (14–15 lb. Bond) Plain Paper 1 60–74 g/m (16–20 lb. Bond) Plain Paper 2 75–81 g/m (20 lb. Bond) Middle Thick 82–105 g/m (20–28 lb. Bond) Thick Paper 1 106–169 g/m (28 lb.
  • Page 226 Recommended Paper Sizes and Types • If you load paper of the same size and same type in two or more trays, the machine automatically shifts to the other tray when the first tray in use runs out of paper. This function is called Auto Tray Switching.
  • Page 227: Thick Paper

    9. Adding Paper and Toner • If coated sheets of paper jam, make noise, or if more than one sheet is fed at a time, feed them from the bypass tray one at a time. Thick Paper This section gives you various details about and recommendations concerning thick paper. When loading thick paper of 106–256 g/m (28 lb.
  • Page 228: Envelopes

    Recommended Paper Sizes and Types • Prints might be noticeably curled. Flatten out prints if they are creased or curled. Envelopes This section gives you various details about and recommendations concerning envelopes. • Do not use window envelopes. • Fan the envelopes before loading them to separate them and prevent the glue on them from causing them to stick together.
  • Page 229 9. Adding Paper and Toner Paper trays 2–4 Orientation of Exposure glass Bypass tray envelopes Small size paper tray Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of • Bottom side of • Flaps: closed envelopes: toward envelopes: toward •...
  • Page 230 Recommended Paper Sizes and Types Paper trays 2–4 Types of envelopes Bypass tray Small size paper tray Side-opening envelopes • Flaps: closed • Bottom side of envelopes: • Flaps: closed toward the back of the • Bottom side of envelopes: machine toward the back of the •...
  • Page 231 9. Adding Paper and Toner • High temperature and high humidity conditions can reduce print quality and cause envelopes to become creased. • Depending on the environment, copying or printing on envelopes may wrinkle them even if they are recommended. •...
  • Page 232: Adding Toner

    Adding Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 233: Sending Faxes Or Scanned Documents When Toner Has Run Out

    9. Adding Paper and Toner • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible. •...
  • Page 234: Disposing Of Used Toner

    Adding Toner • If number of communications executed after the toner has run out and not listed in the automatically output Journal exceeds 200, communication is not possible. Make sure the machine is in facsimile or scanner mode. Press [Exit], and then perform transmission operation. The error message disappears.
  • Page 235 9. Adding Paper and Toner...
  • Page 236: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. Indicators This section describes the indicators displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Indicator Status : Paper Misfeed indicator Appears when a paper misfeed occurs. For details about removing jammed paper, see "Removing Jammed Paper", Troubleshooting : Original Misfeed indicator...
  • Page 237: When An Indicator For The [Check Status] Key Is Lit

    10. Troubleshooting When an Indicator for the [Check Status] Key Is Lit If an indicator for the [Check Status] key lights up, press the [Check Status] key to display the [Check Status] screen. Check the status of each function in the [Check Status] screen. [Check Status] screen CJH001 1.
  • Page 238 When an Indicator for the [Check Status] Key Is Lit The following table explains problems that cause the indicator to light. Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out.
  • Page 239: Panel Tone

    10. Troubleshooting Panel Tone The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep Panel/screen input A control panel or screen key was accepted.
  • Page 240: When You Have Problems Operating The Machine

    When You Have Problems Operating the Machine When You Have Problems Operating the Machine This section describes common problems and messages. If other messages appear, follow the instructions displayed. Problem Causes Solutions The [Facsimile] or [Scanner] Functions other than the Wait a little longer.
  • Page 241 10. Troubleshooting Problem Causes Solutions Nothing happens when the The main power switch is Turn on the main power switch. [Check Status] key or the turned off. [Energy Saver] key is pressed. "Please wait." appears. This message appears when Wait for a while. If the machine does you press the [Energy Saver] not get ready in five minutes, contact key.
  • Page 242 When You Have Problems Operating the Machine Problem Causes Solutions The user code entry screen is Users are restricted by User For details about how to log in when displayed. Code Authentication. User Code Authentication is enabled, see "When the Authentication Screen is Displayed", Getting Started The Authentication screen Basic Authentication,...
  • Page 243 10. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. The tray's side or end fences • Remove misfed paper. For details may not be set properly. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting • Check that the side or end fences are set properly.
  • Page 244 When You Have Problems Operating the Machine Problem Causes Solutions Sheets are curled when they Certain types of A3 and 11 Paper misfeeds can occur if the output are output. 17 sheets can become tray is set to internal tray 2 and multiple curled when they are output.
  • Page 245 10. Troubleshooting Problem Causes Solutions "Shutting down... Please The shut down procedure Follow the message that appears and wait. Main power will be has begun because the main wait until the machine has shut down. turned off automatically." power switch was turned off Do not turn on the main power switch appears.
  • Page 246 When You Have Problems Operating the Machine Problem Causes Solutions "The image data size is not The image data size is not For details about file size for shortcut valid. See the manual for valid. image, see "Customizing the [Home] required data."...
  • Page 247: When Messages Are Displayed On The Control Panel

    10. Troubleshooting When Messages Are Displayed on the Control Panel Messages Displayed When Using the Copy/Document Server Function This section describes the machine's main messages. If other messages appear, follow their instructions. • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper.
  • Page 248 When Messages Are Displayed on the Control Panel Message Causes Solutions "Cannot punch this paper The Punch function cannot be For details about paper, see size." used with paper size selected. "Specifications for Punch Unit (Booklet Finisher SR3100)", or "Specifications for Punch Unit (Finisher SR3120, Booklet Finisher SR3110)", Maintenance and Specifications...
  • Page 249 10. Troubleshooting Message Causes Solutions "File being stored exceeded The scanned originals have Press [Exit], and then store again with max. number of pages per too many pages to store as an appropriate number of pages. file. Copying will be one document.
  • Page 250 When Messages Are Displayed on the Control Panel Message Causes Solutions "Original(s) is being A function of the machine Cancel the job that is being scanned for a different other than the Copier function processed. For example, press [Exit], function." is being used such as the and then press the [Home] key.
  • Page 251: Messages Displayed When Using The Facsimile Function

    10. Troubleshooting Message Causes Solutions "The selected file(s) You have tried to delete files Files can be deleted by the person contained file(s) without without the authority to do so. who created the file. To delete a file access privileges. Only which you are not authorized to file(s) with access privileges delete, contact the person who...
  • Page 252 When Messages Are Displayed on the Control Panel • Settings that can be confirmed in System Settings or Facsimile Features on the control panel can also be confirmed from Web Image Monitor. For details about how to confirm the settings from Web Image Monitor, see Web Image Monitor Help.
  • Page 253 10. Troubleshooting Message Causes Solutions "Check whether there are Registering of user name is • Correct that the correct SIP Server any network problems." rejected by SIP server. IP Address and SIP User Name are listed in [SIP Settings] of [13-17] [Facsimile Features].
  • Page 254 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are The "Effective Protocol" and • Check that the correct IP address any network problems." "SIP Server IP Address" is specified for the machine in settings are different, or an [System Settings].
  • Page 255 10. Troubleshooting Message Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or listed correctly.
  • Page 256 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3 / IMAP4 Settings] of [15-01] [System Settings].
  • Page 257 10. Troubleshooting Message Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 258 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are • No IP address has • Check that the correct IP address any network problems." been registered. is specified for the machine in [System Settings]. For details [16-00] •...
  • Page 259 10. Troubleshooting Message Causes Solutions "Exceeded time limit for A network error has • Try the operation again. If the LDAP server search. Check occurred and connection message is still shown, the the server status." has failed. network may be busy. •...
  • Page 260 When Messages Are Displayed on the Control Panel Message Causes Solutions "Original(s) is being A function of the machine Before sending a file by fax, cancel the scanned for a different other than the Facsimile job in progress. For example, press function."...
  • Page 261 10. Troubleshooting Message Causes Solutions "Some page(s) are near The first page of the The original's blank side might have blank." document is almost blank. been scanned. Be sure to place your originals correctly. For details about determining the cause of blank pages, see "Detecting Blank Pages", Fax "The selected file(s) You tried to delete a...
  • Page 262 When Messages Are Displayed on the Control Panel Message Causes Solutions "Connection with the remote A network error occurred • Check that the remote machine machine has failed. Check while using the remote fax supports the remote fax function. the remote machine status." function.
  • Page 263 10. Troubleshooting Message Causes Solutions "Connection with the remote A timeout error occurred • Check that the LAN cable is machine has failed. Check while an attempt was made correctly connected to the the remote machine status." to connect the device via machine.
  • Page 264 When Messages Are Displayed on the Control Panel Message Causes Solutions "The destination cannot be The user certificate A new user certificate must be installed. selected because its (destination certificate) has For details about the user certificate certificate is not currently expired.
  • Page 265 10. Troubleshooting Message Causes Solutions "Transmission cannot be The user certificate A new user certificate must be installed. performed because the (destination certificate) has For details about the user certificate certificate for encryption is expired. (destination certificate), see Security not currently valid." Guide "XXX cannot be YYY The device certificate (S/...
  • Page 266 When Messages Are Displayed on the Control Panel Message Causes Solutions "The device certificate used The device certificate (S/ For details about the device certificate for the S/MIME signature is MIME) has expired. (S/MIME), see Security Guide not currently valid. XXX which is registered to the program cannot be recalled."...
  • Page 267 10. Troubleshooting Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the PDF Digital with digital signature) has digital signature) must be installed. For Signature's device certificate expired. details about how to install a device is not currently valid."...
  • Page 268: Messages Displayed When Using The Printer Function

    When Messages Are Displayed on the Control Panel When the memory becomes full while using the facsimile function Message Causes Solutions "Memory is full. Cannot scan The memory is full. If you press [Exit], the machine returns more. Transmission will be to standby mode and starts transmitting stopped."...
  • Page 269 10. Troubleshooting Message Status "Setting change..." The machine is changing settings. You cannot use the control panel while this message is displayed. Wait a while. "Waiting for print data..." The machine is waiting for the next data to print. Wait a while. "Suspending print jobs..."...
  • Page 270 When Messages Are Displayed on the Control Panel Message Causes Solutions "Hardware Problem: HDD" An error has occurred in the Turn off the main power switch, and hard disk. then back on again. If the message appears again, contact your service representative.
  • Page 271 10. Troubleshooting Message Causes Solutions "Paper size and type are The printer driver settings are • Check that the printer driver mismatched. Select another incorrect or the tray does not settings are correct, and then tray from the following and contain paper of the size or load paper of the size selected press [Continue].
  • Page 272 When Messages Are Displayed on the Control Panel Message Causes Solutions "The selected file(s) You have tried to delete files To check your access permission for contained file(s) without without the authority to do so. stored documents, or to delete a access privileges.
  • Page 273: Other Messages

    10. Troubleshooting Message Causes Solutions "The size of the selected • The size of the selected Files or groups of files larger than 1GB file(s) is too large." file exceeds 1GB. cannot be printed. • The total size of the •...
  • Page 274 When Messages Are Displayed on the Control Panel Message Causes Solutions "86: Error" Parameters of the control Check the print settings. code are invalid. "91: Error" Printing was canceled by Check that the data is valid. the auto job cancel function due to a command error.
  • Page 275 10. Troubleshooting Message Causes Solutions "Auto-registration of user Automatic registration of For details about automatic registration information has failed." information for LDAP of user information, see Security Guide Authentication or Windows Authentication failed because the Address Book is full. "Cannot store data of this The paper size exceeded Reduce the paper size of the file that size."...
  • Page 276 When Messages Are Displayed on the Control Panel Message Causes Solutions "Compressed Data Error." The printer detected corrupt • Check the connection between the compressed data. computer and the printer. • Check that the program you used to compress the data is functioning correctly.
  • Page 277 10. Troubleshooting Message Causes Solutions "Exceeded max. number of The maximum file capacity Delete some of the files stored in the files of Document Server. of the Document Server was Document Server. Cannot store." exceeded. "Exceeded max. number of While printing a Sample Delete unneeded files stored in the files to print for temporary / Print, Locked Print, Hold...
  • Page 278 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded the maximum The number of pages the For details about print volume use unit count for Print Volume user is permitted to print has limitation, see Security Guide Use.
  • Page 279 10. Troubleshooting Message Causes Solutions "Information for user The user name for LDAP or For details about user authentication, authentication is already Integration Server see Security Guide registered for another user." authentication was already registered in a different server with a different ID, and a duplication of the user name occurred due to a switching of domains...
  • Page 280 When Messages Are Displayed on the Control Panel Message Causes Solutions "Output tray has been The output tray was Specify the proper output tray. changed." changed because the paper size of the specified output tray is limited. "Print overrun." Images were discarded PCL 6 while printing.
  • Page 281 10. Troubleshooting Message Causes Solutions "The print job has been The hard disk became full Delete the files stored in the Document cancelled because capture after a file was stored. Server or reduce the file size to be sent. file(s) could not be stored: Exceeded max.
  • Page 282: Messages Displayed When Using The Scanner Function

    When Messages Are Displayed on the Control Panel Messages during Direct print from a removable memory device Message Causes Solutions "99: Error" This data cannot be printed. Check that the data is valid. For details The specified data is either about the kinds of data supported by corrupt or not supported by the Direct printing function from...
  • Page 283 10. Troubleshooting Message Causes Solutions "Cannot detect original size. The original placed on the • Place the original correctly. Select scan size." exposure glass is a • Specify the scan size. nonstandard size. • When placing an original directly on the exposure glass, the lifting/ lowering action of the ADF triggers the automatic original size detection process.
  • Page 284 When Messages Are Displayed on the Control Panel Message Causes Solutions "Cannot start scanning The [Take no action] setting Open scanner properties, click the because communication was has been selected on the [Events] tab, and then select [Start this failed." client computer, forcing the program] as the computer's response client computer to remain...
  • Page 285 10. Troubleshooting Message Causes Solutions "Captured file exceeded The maximum number of Reduce the number of pages in the max. number of pages per pages per file has been transmitted file, and then resend the file. Cannot send the exceeded. file.
  • Page 286 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. E-mail size. The file size per page has Change the facsimile features settings Sending E-mail has been reached the maximum e- as follows: cancelled. Check [Max. E- mail size specified in •...
  • Page 287 10. Troubleshooting Message Causes Solutions "Exceeded max. number of The maximum enterable Check the maximum number of alphanumeric characters." number of alphanumeric characters which can be entered, and characters has been then enter it again. For details about exceeded. the maximum enterable number of characters, see "Values of Various Set Items for Transmission/ Storage / Delivery Function", Scan...
  • Page 288 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. page The scan could not be Reduce the number of documents to be capacity per file. Press completed because the written to the memory device, and then [Write] to write the scanned maximum number of pages try again.
  • Page 289 10. Troubleshooting Message Causes Solutions "Memory is full. Do you Because there is not enough Specify whether to use the data or not. want to store scanned file?" free hard disk space in the machine for storing in the Document Server, only some of the pages could be scanned.
  • Page 290 When Messages Are Displayed on the Control Panel Message Causes Solutions "Original(s) is being A function of the machine Cancel the job that is being processed. scanned for a different other than the Scanner For example, press [Exit], and then function."...
  • Page 291 10. Troubleshooting Message Causes Solutions "Selected file is currently in You cannot change the Cancel transmission ("Waiting..." status use. Password cannot be password of a file whose cleared) or the DeskTopBinder setting, changed." status is "Waiting..." or that is and then change the password. being edited with DeskTopBinder.
  • Page 292 When Messages Are Displayed on the Control Panel Message Causes Solutions "The entered file name The file name contains a Check the file name specified at the contains invalid character(s). character that cannot be time of scanning. The file name Enter the file name again used.
  • Page 293 10. Troubleshooting Message Causes Solutions "Updating the destination list A network error has • Check whether the server is has failed. Try again?" occurred. connected. • Antivirus programs and firewalls can prevent client computers from establishing connection with this machine. •...
  • Page 294 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. data The data being scanned is Reduce the resolution or [Specify Size] capacity." too large for the scale ratio value, and then try to scan the original specified in [Specify Size].
  • Page 295 10. Troubleshooting Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the PDF Digital with digital signature) has digital signature) must be installed. For Signature's device certificate expired. details about how to install a device is not currently valid."...
  • Page 296 When Messages Are Displayed on the Control Panel Message Causes Solutions "Transmission cannot be The device certificate (S/ A new device certificate (S/MIME) performed because the MIME) has expired. must be installed. For details about certificate used for the S/ how to install a device certificate (S/ MIME signature is not MIME), see Security Guide...
  • Page 297: When Messages Are Displayed On Your Computer Screen

    10. Troubleshooting When Messages Are Displayed on Your Computer Screen Messages Displayed When Using the Scanner Function This section describes likely causes of and possible solutions for the main error messages displayed on the client computer when using the TWAIN driver. If a message not described here appears, act according to the message.
  • Page 298 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Cannot detect the paper The set original was • Place the original correctly. size of the original. Specify misaligned. • Specify the scan size. the scanning size." • When placing an original directly on the exposure glass, the lifting/ lowering action of the ADF triggers the automatic original...
  • Page 299 10. Troubleshooting Message Causes Solutions "Clear Misfeed(s) in ADF." A paper misfeed has • Remove jammed originals, and occurred inside the ADF. then insert them again. For details about jammed paper, see "Removing Jammed Paper", Troubleshooting • When a misfeed occurs, replace the jammed originals.
  • Page 300 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help.
  • Page 301 10. Troubleshooting Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such • Cancel the job that is being as the Copier function.
  • Page 302 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Scanner is not available. The machine is not • Check whether the machine is Check the scanner connected to the network connected to the network connection status." correctly. correctly. •...
  • Page 303 10. Troubleshooting...
  • Page 304: 11. Appendix

    Adobe Systems Incorporated in the United States and/or other countries. ® The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license. ® ® ®...
  • Page 305 11. Appendix ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ® ® Microsoft Windows Server 2008 Standard ® ® Microsoft Windows Server 2008 Enterprise...
  • Page 306 INDEX 2 Sided Print............. E-mail address............. E-mail destination........120, 121 E-mail transmission..........Address Book............Energy Saver key..........ADF..............8, 63 Enter key..............ARDF............8, 27, 30 Envelope..........79, 80, 157 Authentication screen..........Envelope feeder............Auto document feeder..........Exposure glass.......... 27, 30, 63 Auto Reduce/Enlarge........
  • Page 307 Interrupt key............Paper size............ 139, 148 IP-Fax..............Paper thickness............ Paper tray..........27, 30, 135 Paper type............Journal..............Path............... Placing originals............ Preventing information leakage......LAN-Fax............. 9, 17 Printer........... 48, 103, 197, 198 Large capacity tray. . 8, 33, 35, 37, 39, 41, 43, 146 Printer driver..........
  • Page 308 Standard printing..........Staple..............Start key..............Stop key..............Stored documents......... 98, 129 Stored file............. Stored Print............ 15, 108 Stored print file........... 108, 109 Storing a document..........Storing data............Storing received documents......... Symbols..............Thick paper..........140, 156 Thin paper............Toner............161, 162 Trademark............
  • Page 309 MEMO...
  • Page 310 MEMO...
  • Page 311 MEMO D143...
  • Page 312 © 2011...
  • Page 313 D143-7003...
  • Page 314 PCL 6/5c Printer Driver Installation Guide This manual assumes that you are familiar with general Windows procedures and practices. If you are not, see the documentation that comes with Windows for details. Before starting this installation, close all documents and applications. In a net- ❒...
  • Page 315 Installing the PCL 6/5c Printer Driver Auto Run starts the installer automatically when you load the CD-ROM in the CD-ROM drive. Two kinds of PCL printer drivers, PCL 6 and PCL 5c, are provided with this machine. We recommend PCL 6 as your first choice. TCP/IP requires the following: •...
  • Page 316: Setting Up Options

    Auto Run might not automatically work with certain OS settings. In this ❒ case, launch “Setup.exe” located on the CD-ROM root directory. Setting up options If the machine is equipped with certain options, you should set up the op- ❒ tions with the printer driver.
  • Page 317 Trademarks Microsoft , Windows , Windows Server , and Windows Vista are either regis- ® ® ® ® tered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. is a registered trademark of Hewlett-Packard Company. ® Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 318 Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine’s functions, and instruc- tions on resolving user errors.
  • Page 319: Operating Instructions

    Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 321 TABLE OF CONTENTS 1. Introduction Start Installer................................3 Software and Utilities Included on the CD-ROM.....................5 Printer Drivers..............................5 TWAIN Driver..............................7 LAN-Fax Driver...............................8 Font Manager..............................9 For Mac OS X Users............................10 2. Installing the Printer Driver Confirming the Connection Method.......................11 Network Connection...........................11 Local Connection............................12 Quick Install..............................13 Installing the Printer Driver for a Network Connection..................14 Installing the Printer Driver for the Selected Port..................14...
  • Page 322 Editing the Configuration File........................44 Installing the LAN-FAX driver in "Add Printer"...................45 Setting LAN-Fax Driver Properties........................47 Setting Print Properties..........................47 Configuring Option Settings for the Facsimile...................48 5. Troubleshooting Messages Displayed When Installing the Printer Driver................49 If USB Connection Fails...........................51 6. Installing the Printer Driver Under Mac OS X Installing the PPD Files............................53 Registering the Printer............................54 USB Connection............................54...
  • Page 323: Introduction

    1. Introduction This chapter explains the software included on the supplied CD-ROM. Start Installer To connect this machine to a client computer and use its printer, scanner, and fax functions, the software included on the provided CD-ROM must be installed on the client computer. The installer starts automatically when you insert the provided CD-ROM into the CD-ROM drive of a client computer running under Windows or Windows Server.
  • Page 324 1. Introduction Select Language Change the interface language. Browse This CD-ROM Browse the contents of this CD-ROM. Exit Quit Installer. • Manage Printers permission is required to install the driver. Log on as an Administrators group member. • Auto Run might not work automatically with certain OS settings. If this is the case, double-click "SETUP.EXE", located on the CD-ROM root directory, or click [Run SETUP.EXE] in the [AutoPlay] dialog box.
  • Page 325: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD-ROM This section explains the software and utilities CD-ROM provided with this machine. • For the latest information on the corresponding operating system, see "Readme.txt" file in the DRIVERS folder.
  • Page 326 1. Introduction *7 Mac OS X 10.2 or later (native mode). Any versions higher than Mac OS X 10.6 are not supported. PCL printer drivers Two kinds of PCL printer driver (PCL 5c and PCL 6) are included. These drivers allow your computer to communicate with this machine via a printer language.
  • Page 327: Twain Driver

    Software and Utilities Included on the CD-ROM Printer Language Supported languages PCL 5c PCL 6 PostScript 3 PPD (Mac OS X) Hungarian Czech Polish Portuguese Russian Catalan Turkish Brazilian Portuguese Greek : Supported : Supported, but the printer language is displayed in English *1 The PCL 5c printer driver does not support Brazilian Portuguese and Greek.
  • Page 328: Lan-Fax Driver

    1. Introduction Windows XP/Vista/7 Windows Server 2003/2003 R2/2008/2008 R2 *1 Operates in 32-bit compatibility mode on 64-bit operating systems • Display resolution 800 × 600 pixels, 256 colors or higher Supported languages The TWAIN driver uses the same interface language as the one specified by your operating system.
  • Page 329: Font Manager

    Software and Utilities Included on the CD-ROM Font Manager For installing new screen fonts, or organizing and managing fonts already in the system. For details about Font Manager, see the manual on the CD-ROM. File path The software is included in the following folder on the CD-ROM: \FONTMAN\DISK1 •...
  • Page 330: For Mac Os X Users

    1. Introduction For Mac OS X Users If you are using Mac OS X, the following limitations apply to each function: • When using the scanner function, the TWAIN driver cannot be used. • When using the fax function, the LAN-Fax driver cannot be used. •...
  • Page 331: Installing The Printer Driver

    2. Installing the Printer Driver This chapter explains how to install and configure the printer drivers for use on the Windows operating system. Confirming the Connection Method This machine supports network and local connection. Before installing the printer driver, check how the machine is connected. Follow the driver installation procedure that is appropriate to the connection method.
  • Page 332: Local Connection

    2. Installing the Printer Driver • For details about how to install the printer driver for each type of port, see p.14 "Installing the Printer Driver for the Selected Port". Using as a network printer This machine can be used as a remote printer using the Windows or NetWare print server function. Client OS Using Server •...
  • Page 333: Quick Install

    Quick Install Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set. When the machine is connected to a client computer via parallel connection, the printer port is set to [LPT1].
  • Page 334: Installing The Printer Driver For A Network Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Network Connection This section describes the installation procedure of the printer drivers for network connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 335 Click [Next]. Enter the machine name or IP address, and then click [Next]. When the device type selection appears, select "RICOH Network Printer C model". Click [Finish]. Check that the port of the selected printer is displayed in [Port :].
  • Page 336 2. Installing the Printer Driver • Installation of the certificate is especially necessary for users who want to print via IPP-SSL from Windows Vista/7 or Windows Server 2008/2008 R2. For details, consult your administrator. • If a certificate authority issues a certificate that must be authenticated by an intermediate certificate authority, and the certificate is installed on this machine, an intermediate certificate must be installed on the client computer.
  • Page 337 Installing the Printer Driver for a Network Connection Select the manufacturer and model name of the machine you want to use, and then click [Next]. The installation starts. Follow the instructions that appear. Modify settings such as printer name and default printer configuration, as necessary.
  • Page 338 2. Installing the Printer Driver Using the WSD port • The WSD port can be used under Windows Vista/7, or Windows Server 2008/2008 R2. • You can connect to the printer only if both the printer and computer are on the same network segment, or "Network discovery"...
  • Page 339 Installing the Printer Driver for a Network Connection • To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the printer's icon in the [Network] window, and then click [Uninstall]. Windows 7, Windows Server 2008 R2 Quit all applications.
  • Page 340 2. Installing the Printer Driver Click [Finish]. If installation is successful, the icon of the printer connected to the WSD port will appear in the window for configuring printers. • To stop installation of the selected driver, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the machine's icon in the [Network] window, and then click [Uninstall].
  • Page 341 Installing the Printer Driver for a Network Connection In the [Printer URL] box, enter "http://machine's IP address/printer" as the machine's address. If the server authentication is issued, enter "https://machine's IP address/printer" to enable SSL (a protocol for encrypted communication). Example IP address: 192.168.15.16 http://192.168.15.16/printer https://192.168.15.16/printer You can enter "http://machine's IP address/ipp"...
  • Page 342: Using As A Network Printer

    2. Installing the Printer Driver Click the [Ports] tab, and then click [Configure Port]. The [Port Configuration:] window appears. Windows 7, Windows Server 2008 R2: On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to use, and then click [Printer Properties]. Click the [Ports] tab, and then click [Configure Port].
  • Page 343 Installing the Printer Driver for a Network Connection The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. If installing the PostScript 3 printer driver, proceed to step 7. Select a printer driver you want to use, and then click [Next].
  • Page 344 2. Installing the Printer Driver Select a printer driver you want to use, and then click [Next]. Select the check box of the machine model you want to use. Double-click the machine name to display the printer settings. Click [Port :], and then click [Add] in the [Change settings for 'Port'] box. Click [Network Printer], and then click [OK].
  • Page 345 Installing the Printer Driver for a Network Connection • The protocol is set to inactive as default. Enable the protocol on the control panel, using Web Image Monitor, SmartDeviceMonitor or telnet. Notes when using NetWare Form Feed Do not use NetWare to configure form feed. Form feed is controlled by the printer driver on Windows.
  • Page 346 2. Installing the Printer Driver 5. Click [OK]. Printing after Resetting the Printer Printer to print server connection requires 30 - 40 seconds to resume after the printer is reset. During this period, jobs may be accepted (depending on NetWare specifications) but not printed. To print after resetting the printer as the remote printer, check on the print server that the remote printer is disconnected, or wait for two minutes before trying to print.
  • Page 347: Installing The Printer Driver For A Local Connection

    Installing the Printer Driver for a Local Connection Installing the Printer Driver for a Local Connection This section describes the installation procedure of the printer drivers for USB, parallel, or Bluetooth connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 348 2. Installing the Printer Driver Connect the machine and computer using the USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Select [No, not this time], and then click [Next]. Click [Install from a list or specific location [Advanced]], and then click [Next].
  • Page 349 Installing the Printer Driver for a Local Connection Check that the power of the machine is off. Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. In the [Found New Hardware] window, click [Locate and install driver software (recommended)].
  • Page 350 2. Installing the Printer Driver Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Click [Devices and Printers] from the [Start] menu. Double-Click the icon of machine you want to use in the [Unspecified] category.
  • Page 351: Parallel Connection

    Installing the Printer Driver for a Local Connection Parallel Connection To use a printer connected using a parallel interface, click [LPT1] when installing the printer driver. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Run AUTORUN.EXE].
  • Page 352 2. Installing the Printer Driver Restrictions on SPP, HCRP • A maximum of two Bluetooth adaptor or Bluetooth-equipped computers can be connected at the same time using the Bluetooth interface: one by SPP, one by HCRP. • When connecting more than one Bluetooth adaptor or Bluetooth-equipped computer at the same time, the first device that establishes connection is selected.
  • Page 353 Installing the Printer Driver for a Local Connection Click [Bluetooth Printer], and then click [Next]. The computer begins searching for available Bluetooth printers. If a new printer is discovered, the [Found New Hardware Wizard] window appears. To ignore a discovered device and continue searching, click [Cancel]. The computer resumes searching for other available Bluetooth printers.
  • Page 354 2. Installing the Printer Driver In the [Found New Hardware] window, select the printer driver you want to use, and then click [Next]. The installation starts. If the [Windows Security] window appears, click [Install this driver software anyway]. Click [Close]. If you want to change the printer name, enter the new name in the [Printer Name Settings] window.
  • Page 355: Configuring Option Settings For The Printer

    Configuring Option Settings for the Printer Configuring Option Settings for the Printer When bidirectional communication works correctly, your computer obtains information about option, paper size and paper feed direction settings from the machine automatically. Bidirectional communication also allows you to monitor machine status. When bidirectional communication is disabled, you have to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 356: If Bidirectional Communication Is Disabled

    2. Installing the Printer Driver If Bidirectional Communication is Disabled This section describes how to set up option, paper size and paper feed direction settings on your computer manually. • Manage Printers permission is required to change the printer properties. Log on as an Administrators group member.
  • Page 357: Installing Font Manager

    Installing Font Manager Installing Font Manager • Manage Printers permission is required to install Font Manager. Log on as an Administrators group member. • The operating systems compatible with Font Manager are Windows XP/Vista. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 358: Using Adobe Pagemaker Version 6.0, 6.5, Or 7.0

    2. Installing the Printer Driver Using Adobe PageMaker Version 6.0, 6.5, or ® Under Windows XP with Adobe PageMaker , you need to copy PPD files to the PageMaker folder. PPD files have the .ppd extension in the folder "X86\DRIVERS\PS\PM6\ (Language)" on the CD-ROM. The third folder "(Language)"...
  • Page 359: Installing The Scanner Driver

    3. Installing the Scanner Driver This chapter explains how to install the TWAIN driver on a client computer. Installing the TWAIN Driver To use the network TWAIN scanner, you must install the TWAIN driver on a client computer. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 360 3. Installing the Scanner Driver...
  • Page 361: Installing The Facsimile Driver

    4. Installing the Facsimile Driver This chapter explains how to install and configure the LAN-Fax driver on a client computer. Installing the LAN-Fax Driver Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps you edit LAN-Fax transmission destinations. LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover sheets.
  • Page 362: Specifying The Port When Installing The Lan-Fax Driver

    4. Installing the Facsimile Driver Click [LAN-Fax Driver]. The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. Click [Next]. Double-click [Printer Name : <LAN-Fax M(number)>]. Click [Port:].
  • Page 363 Installing the LAN-Fax Driver Procedure/description in the Procedure/description in the Items to be replaced printer driver LAN-Fax driver • Select the check box of the machine model you want to use. The procedures in the [Install Double-click [Printer Name : Printer Driver] dialog box <LAN-Fax M(number)>].
  • Page 364: Enabling The Function To Prevent Transmission To The Wrong Destination

    4. Installing the Facsimile Driver Enabling the Function to Prevent Transmission to the Wrong Destination To enable the function to prevent transmission to the wrong destination, edit the configuration file before you install the driver. This section explains how to edit the configuration file and install the LAN-Fax driver using the edited configuration file.
  • Page 365: Installing The Lan-Fax Driver In "Add Printer

    Enabling the Function to Prevent Transmission to the Wrong Destination Save the configuration file that has been edited. Installing the LAN-FAX driver in "Add Printer" Install the LAN-FAX driver after the configuration file has been edited. Open the printer window. •...
  • Page 366 4. Installing the Facsimile Driver Click [Finish]. When you are prompted to restart your computer, restart it by following the instructions that appear.
  • Page 367: Setting Lan-Fax Driver Properties

    Setting LAN-Fax Driver Properties Setting LAN-Fax Driver Properties • Manage Printers permission is required to set the properties for the LAN-Fax driver. Log on as an Administrators group member. • The method for selecting the LAN-Fax driver will vary according to your operating system. For details, see Windows Help.
  • Page 368: Configuring Option Settings For The Facsimile

    4. Installing the Facsimile Driver Configuring Option Settings for the Facsimile Open the printer windows. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Printers and Faxes]. • Windows Vista, Windows Server 2008: On the [Start] menu, select [Control Panel], and then click [Printers] in [Hardware and Sound] category.
  • Page 369: Troubleshooting

    5. Troubleshooting This chapter provides solutions for driver installation and USB connection problems. Messages Displayed When Installing the Printer Driver This section describes what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using Add Printer Wizard.
  • Page 370 5. Troubleshooting • Available ports vary according to your Windows operating system or the type of interface. For details, see p.11 "Confirming the Connection Method".
  • Page 371: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section describes how to troubleshoot a problem related to USB connections. Problem Causes Solutions The machine is not The USB cable is not Disconnect the USB cable, and then automatically recognized. connected properly.
  • Page 372 5. Troubleshooting...
  • Page 373: Installing The Printer Driver Under Mac Os

    6. Installing the Printer Driver Under Mac OS X This chapter explains how to install and configure the printer drivers for use on the Mac OS X operating system. Installing the PPD Files To print using the printer specific features under Mac OS X, install the PPD files. •...
  • Page 374: Registering The Printer

    6. Installing the Printer Driver Under Mac OS X Registering the Printer To use the machine, the printer must be registered in the printer list. Make sure the machine and computer are connected and turned on, and perform the following procedure.
  • Page 375: Network Connection

    Registering the Printer Click [Choose]. Click [Add]. If the option settings need to be configured, see p.57 "Configuring Option Settings for the Printer Under Mac OS X". Quit Print Center or Printer Setup Utility. Mac OS X 10.4 - 10.6 Start System Preferences.
  • Page 376 6. Installing the Printer Driver Under Mac OS X Select the machine you are using from the [Printer Model:] pop-up menu. If the machine you are using is not selected in [Printer Model:], select its manufacturer or [Other...] in the pop-up menu, and then select the PPD file of the machine. For the location of the PPD files, see p.53 "Installing the PPD Files".
  • Page 377: Configuring Option Settings For The Printer Under Mac Os X

    Configuring Option Settings for the Printer Under Mac OS X Configuring Option Settings for the Printer Under Mac OS X This section explains how to configure the printer driver. Mac OS X 10.2 - 10.3 Start Print Center or Printer Setup Utility in Applications\Utilities. Click [Set Up Printers...].
  • Page 378 6. Installing the Printer Driver Under Mac OS X...
  • Page 379: Appendix

    7. Appendix Updating or Deleting the Driver • Administrator permission is required to update or delete the driver in use. Log on as an Administrators group member. • If the [User Account Control] dialog box appears, click [Yes] or [Continue]. •...
  • Page 380: Deleting The Driver

    7. Appendix Click [OK]. Select the machine model, and then click [Next]. The driver update starts. Click [Finish]. Click [OK] to close the printer properties window. Restart the computer. TWAIN driver You can download the most recent version of the TWAIN driver from the manufacturer's Web site. Delete the old version of the TWAIN driver first, and then install the new TWAIN driver.
  • Page 381 Updating or Deleting the Driver Click [Delete]. Click [OK]. Click [Close] to close the print server properties window. Windows 7, Windows Server 2008 R2 On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to delete, and then click [Remove Device]. Click [Yes].
  • Page 382 7. Appendix Quit uninstaller.
  • Page 383: Trademarks

    Trademarks Trademarks Adobe, PageMaker, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or countries. Macintosh, and Mac OS are registered trademarks of Apple Inc, registered in the U.S. and other countries. IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States or other countries.
  • Page 384 7. Appendix ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition •...
  • Page 385: Index

    INDEX Network printer..........12, 22 Bidirectional communication........ BIP................Option settings.......... 35, 48, 57 Bluetooth..............Bluetooth printer............ PageMaker............Parallel connection......... 13, 31 CD-ROM..............PCL............5, 13, 14, 22 Confirming the connection method...... PostScript 3..........5, 14, 22 Connection fails............. PPD................Prevent Transmission to the Wrong Destination. . Printer driver..........
  • Page 386 MEMO...
  • Page 387 MEMO...
  • Page 388 MEMO D143-7038...
  • Page 390 D143-7038 © 2011...
  • Page 391 Operating Instructions UNIX Supplement For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 393 TABLE OF CONTENTS Notice..................................3 Important.................................3 How to Read This Manual..........................4 Symbols................................4 Notes................................4 Laws and Regulations............................5 Legal Prohibition.............................5 1. UNIX Configuration Before Setup................................7 Using the lp/lpr Commands..........................7 Using the rsh/rcp/ftp Commands........................7 Using the Installation Shell Script........................8 Assigning the IP Address..........................8 Executing the Installation Shell Script......................9 After Executing the Installation Shell Script....................12 Printing Method..............................17 Printing with lpr, lp............................17...
  • Page 394 Binding................................34 Orientation..............................34 Image Direction............................35 Resolution..............................35 Gradation Quality............................36 Billing Code..............................37 Fold................................37 Staple................................38 Punch, Punchhole............................39 Usercode..............................41 Symbol Set..............................41 Trademarks...............................45 INDEX ................................47...
  • Page 395: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good output quality, the manufacturer recommends that you use genuine toner from the manufacturer.
  • Page 396: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 397: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 399: Unix Configuration

    1. UNIX Configuration This section explains how to set up a network printer and check print status using UNIX Before Setup • To print from a UNIX workstation, use a file that the printer supports. • Setup varies depending on the print command. Make sure to configure settings accordingly. Using the lp/lpr Commands Use the installation shell script to register the device option, as well as the printer host name and the IP address.
  • Page 400: Using The Installation Shell Script

    1. UNIX Configuration Using the Installation Shell Script The installation shell script helps with the setup process. The installation shell script automates some of the tasks in configuring/etc/hosts, /etc/printcap; creating the spool directory for BSD UNIX; and running the lpadmin command for System V UNIX. •...
  • Page 401: Executing The Installation Shell Script

    Using the Installation Shell Script • For details about how to make the above settings, see the manual that comes with this machine. Checking the IP address configuration Follow the procedure below to make sure that the IP address has been configured correctly. •...
  • Page 402 1. UNIX Configuration Insert a period and slash before the current directory. Enter a number to select the workstation operating system that you are using. Network printer install shell Select your workstation OS type 1. SunOS 4.x.x 2. Solaris 2.x, Solaris 7-9 (SunOS5.x) 3.
  • Page 403 Using the Installation Shell Script Enter remote printer name [default lp]:text You can enter up to 14 characters for HP-UX 11.0, 256 for Solaris 8 and Red Hat Linux 7.0, and 51 for Red Hat Linux 6.2. After setup with the installation shell script is complete, and if you entered the IP address in step 4, the following message appears: hosts file is modified Perform a test print to make sure that the settings are correct.
  • Page 404: After Executing The Installation Shell Script

    1. UNIX Configuration # /usr/sbin/lpadmin -x printer_name 3. Restart the scheduler. # /usr/lib/lpsched After Executing the Installation Shell Script The printing environment is set up automatically when the installation shell script is executed. This section describes setup contents when the installation shell script is executed under Red Hat Linux, Solaris, and HP-UX.
  • Page 405 Using the Installation Shell Script • The /etc/printcap file is used to register the name and attributes of a printer. You must make an entry for the network printer in the /etc/printcap file of all workstations using the network printer. •...
  • Page 406 1. UNIX Configuration • The spool directory is used to control data used for print jobs. For example, when a print job is created, a temporary copy of the data used is created in the spool directory. All workstations accessing the network printer need to have a spool directory for the network printer. •...
  • Page 407 Using the Installation Shell Script • The /etc/hosts file contains a list of IP addresses and host names of all hosts communicating on the network. Each entry is delimited with a space or a tab, and each line is separated with a return. •...
  • Page 408 1. UNIX Configuration Registering the printer The installation shell script registers the printer as a remote printer following the procedure below: 1. Stop the scheduler. /usr/lib/lpshut 2. Register the printer. /usr/lib/lpadmin -Pnp -v/dev/null -mrmodel -ormnphost -orpoption -ob3 • "np" is the printer name, "nphost" is the host name. For details about "option", see p.22 "Specifying the Device Option".
  • Page 409: Printing Method

    Printing Method Printing Method This section explains how to print documents using commands. Printing with lpr, lp Execute one of the following commands according to the type of workstation used: BSD UNIX workstation, Linux % lpr -Pprinter_name file_name [file_name...] For example: The printer name is np, file names are file1 and file2 % lpr -Pnp file1 file2 Solaris, HP-UX...
  • Page 410 1. UNIX Configuration • The message "print session full" appears when the maximum number of print requests is reached. • The maximum number of print sessions varies depending on the command. • When using the rsh or rcp command, the maximum number of print sessions is 5; when using the ftp command, the number is 3.
  • Page 411 Printing Method • File names cannot contain "=", ",", or ";". • You can use wild cards ( * or ? ) for the file name with the mput command. To print one file ftp> put file_name [Option] To print several files ftp>...
  • Page 412: Printer Status

    1. UNIX Configuration Printer Status You can use the following commands to have information and printer status displayed or copied to a file. Use the lpq or lpstat command to display the status of the printer or information about print jobs. Use the rsh, rcp or ftp commands to get more detailed information from the printer.
  • Page 413: Copying Information To A File

    Printer Status Parameter Information returned Status of the printer. stat Information about print jobs. Information about the paper tray, output tray and info printer language. prnlog Record of the last 10 jobs printed. Record of messages about the network interface syslog board.
  • Page 414: Specifying The Device Option

    1. UNIX Configuration Specifying the Device Option With the following options, you can print with specific printer functions. This manual covers all models, and therefore contains functions and settings that may not be available for your model. Configuring the Device Option •...
  • Page 415 Specifying the Device Option • Enter the option using the lp or lpr command, when the shell script is implemented. • The option settings made here are configured as default. You must create another printer if you want to change printer option settings. For details about changing the configured option, see p.11 "Deleting the printer".
  • Page 416 1. UNIX Configuration Device option Value Function summary plain, recycled, special, special2, special3, thick, thick2, thick3, thick4, thin, tabstock, transparency, letterhead, preprinted, labels, bond, mediatype Specifies the paper type. cardstock, translucent, usercolor1, usercolor2, color, middlethick, prepunched, plainorrecycled, envelope, coated, glossy, auto upper, inner, lower, finishershift, finisherproof, finisherbooklet, optionaloutputbin1,...
  • Page 417 Specifying the Device Option Device option Value Function summary value of resolution (200, 300, Specifies the resolution for resolution 400, 600, 1200) printing. bitsperdot 1, 2, 4 Specifies the print quality. Value of billing code (0x09 billing code (<HT>), 0x20-0xFF (except Specifies the billing code.
  • Page 418: Printer Language

    1. UNIX Configuration Device option Value Function summary arabic8, desktop, greek8, hebrew7, hebrew8, iso4, iso6, iso11, iso15, iso17, iso21, iso60, iso69, isocyr, isogrk, isoheb, isol1, isol2, isol5, isol6, isol9, legal, math8, mctext, mspubl, pc8, pc775, pc850, Specifies the set of print symbol set pc851, pc852, pc858, pc862, characters.
  • Page 419: Text Printing

    Specifying the Device Option • The value or actions that can be selected differ depending on the model you are using. For details about available printer languages, see the manual that comes with this machine. Text Printing Set this function when printing text files directly. filter=text The following sample shows how to print text files directly.
  • Page 420: Paper Size

    1. UNIX Configuration • rsh % rsh nphost print tray=tray2 < file1 • rcp % rcp file1 nphost:tray=tray2 • ftp ftp> put file1 tray=tray2 • The value or actions that can be selected differ depending on the model you are using. For details about available tray, see the manual that comes with this machine.
  • Page 421 Specifying the Device Option Paper size Value 11 14 inch11x14 10 15 nch10x15 10 14 inch10x14 legal letter governmentlg 8 10 engquatro halfletter executive 8 13 8 10 foolscap folio com10 6.38 9.02 (162 229 mm) 4.49 6.38 (114 162 mm) 4.33 8.66 (110 220 mm) monarch 10.5 15 .35 (267 390 mm)
  • Page 422: Paper Type

    1. UNIX Configuration % rcp file1 nphost:paper=a4 • ftp ftp> put file1 paper=a4 • The value or actions that can be selected differ depending on the model you are using. For details about available paper size, see the manual that comes with this machine. Paper Type Select the paper type.
  • Page 423: Output Tray

    Specifying the Device Option Paper type Value Preprinted paper preprinted Labels labels Bond paper bond Cardstock cardstock Translucent translucent Usercolor1 usercolor1 Usercolor2 usercolor2 Middle thick middlethick Envelope envelope Color Paper color Prepunched paper prepunched Coated Paper coated Glossy Paper glossy Auto Paper Select auto The following sample shows how to print using recycled paper (host name: nphost, file name: file1):...
  • Page 424: Copies

    1. UNIX Configuration • Only installed output trays are available. outbin=value of output tray Value upper, inner, lower, finishershift, finisherproof, finisherbooklet, optionaloutputbin1, optionaloutputbin2, optionaloutputbin3, optionaloutputbin4, optionaloutputbin5, optionaloutputbin6, optionaloutputbin7, optionaloutputbin8, optionaloutputbin9, optionaloutputbin10 The following sample shows how to print to the standard tray (standard tray: upper, host name: nphost, file name: file1): •...
  • Page 425: Collating

    Specifying the Device Option Collating Specify the number of collated sets. qty=number of collated sets (1 to 999) The following sample shows how to print 10 copies using the collate function (host name: nphost, file name: file1): • rsh % rsh nphost print qty=10 < file1 •...
  • Page 426: Binding

    1. UNIX Configuration Binding Select the binding direction for duplex printing. binding=value of binding Binding direction Value Longedge longedge Shortedge shortedge Left left Right right The following sample shows how to set duplex printing and long-edge binding (host name: nphost, file name: file1): •...
  • Page 427: Image Direction

    Specifying the Device Option The following sample shows how to print the paper vertically using the orientation function (host name : nphost, file name : file1): • rsh % rsh nphost print orientation=portrait < file1 • rcp % rcp file1 nphost:orientation=portrait •...
  • Page 428: Gradation Quality

    1. UNIX Configuration Resolution Value 600 dpi 400 dpi 300 dpi 200 dpi The following sample shows how to print with 600 dpi and better quality. (host name: nphost, file name: file1): • rsh % rsh nphost print resolution=600 < file1 •...
  • Page 429: Billing Code

    Specifying the Device Option • rsh % rsh nphost print filetype=postscript,resolution=600,bitsperdot=2 < file1 • rcp % rcp file1 nphost:filetype=postscript,resolution=600,bitsperdot=2 • ftp ftp> put file1 filetype=postscript,resolution=600,bitsperdot=2 • The value or actions that can be selected differ depending on the model you are using. For details about available gradation quality, see the manual that comes with this machine.
  • Page 430: Staple

    1. UNIX Configuration Position Value Gate fold gatefold4 Three fold In inside3 Three fold Out outside3 Double Parallel fold simple4 Two fold Bottom fold zbottom Left fold zleft Right fold zright The following sample shows how to print with the fold on the upper left using finisher shift tray (host name : nphost, file name : file1, finisher shift tray: finisherproof): •...
  • Page 431: Punch, Punchhole

    Specifying the Device Option Position Value Left top lefttop Right top righttop Left top horiz lefttophorizland, lefttophorizport Left top slant lefttopslantland, lefttopslantport Left top vert lefttopvertland, lefttopvertport Right top horiz righttophorizland, righttophorizport Right top slant righttopslantland, righttopslantport Right top vert righttopvertland, righttopvertport Left 2 left2land, left2port...
  • Page 432 1. UNIX Configuration Position Value leftport Left leftland rightport Right rightland topport topland punchhole=value of punchhole The available number of punch holes may vary depending on the type of Punch Kit installed. Specify an appropriate value referring to the table below. Number of punch holes Value eu4, neu4...
  • Page 433: Usercode

    Specifying the Device Option • The value or actions that can be selected differ depending on the model you are using. For details about available punch holes, see the manual that comes with this machine. Usercode Specify the usercode. Usercode=\"value of usercode\" The usercode must be specified using up to eight digits.
  • Page 434 1. UNIX Configuration Symbol Set Value ISO 4 iso4 ISO 6 iso6 ISO 11 iso11 ISO 15 iso15 ISO 17 iso17 ISO 21 iso21 ISO 60 iso60 ISO 69 iso69 ISO Cyrillic isocyr ISO Greek isogrk ISO Hebrew isoheb ISO L1 isol1 ISO L2 isol2...
  • Page 435 Specifying the Device Option Symbol Set Value PC-858 pc858 PC-862 pc862 PC-864 pc864 PC-866 pc866 PC-866U pc866u PC-1004 pc1004 PC-8 D/N pc8dn PC-8 Greek pc8grk PC8-TK pc8tk Pifont pifont PS Math psmath PS Text pstext Roman-8 roman8 Roman-9 roman9 UCS-2 ucs2 Win 3.0 win30...
  • Page 436 1. UNIX Configuration % rsh nphost print symset=iso4 < file1 • rcp % rcp file1 nphost:symset=iso4 • ftp ftp> put file1 symset=iso4...
  • Page 437: Trademarks

    Trademarks Trademarks ® Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. ® ® ® ® Microsoft , Windows , Windows Server , and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Monotype is a registered trademark of Monotype Imaging, Inc.
  • Page 438 1. UNIX Configuration • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition • The product names of Windows Server 2003 R2 are as follows: ®...
  • Page 439: Index

    INDEX Before setup............. Note................Billing code............Notice............... Binding..............BSD UNIX workstation........17, 20 Orientation............. Output tray............. Collating..............Configuring the device option......Paper size............... Copies..............Paper type.............. Copying information..........Print job status............Printer language............ Deleting the printer..........Printer status............Device option............Printing method............
  • Page 440 MEMO D143-7042...
  • Page 442 D143-7042 © 2011...
  • Page 443 Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 445 TABLE OF CONTENTS Functions That Require Options.........................8 Main Software Products.............................9 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators..............................14 Configuring Administrator Authentication......................15 Specifying Administrator Privileges......................16 Registering and Changing Administrators....................18 Using Web Image Monitor to Configure Administrator Authentication..........21 Administrator Login Method..........................22 Logging in Using the Control Panel......................22 Logging in Using Web Image Monitor......................23...
  • Page 446 Creating the Server Certificate........................50 If the Fax Number Cannot be Obtained....................51 LDAP Authentication............................52 Specifying LDAP Authentication.........................53 Integration Server Authentication........................58 Specifying Integration Server Authentication....................58 Printer Job Authentication..........................64 Printer Job Authentication Levels.........................64 Printer Job Types............................64 "authfree" Command...........................67 Auto Registration to the Address Book......................68 Data Carry-over Setting for Address Book Auto-program...............68 User Lockout Function............................70 Specifying the User Lockout Function......................71...
  • Page 447 Clearing Print Volume Use Counters......................92 Configuring the Auto-Reset Function......................94 4. Preventing Leakage of Information from Machines Protecting the Address Book...........................97 Specifying Address Book Access Permissions...................97 Encrypting Data in the Address Book......................99 Encrypting Data on the Hard Disk........................101 Enabling the Encryption Settings......................103 Backing Up the Encryption Key........................105 Updating the Encryption Key........................106 Canceling Data Encryption........................107...
  • Page 448 User Setting for SSL/TLS...........................138 Setting the SSL/TLS Encryption Mode.....................139 Enabling SSL for SMTP Connections.......................140 Configuring S/MIME............................142 E-mail Encryption............................142 Attaching an Electronic Signature......................144 Specifying Checking of the Certificate Valid Period................146 Configuring PDFs with Electronic Signatures....................148 Selecting the Device Certificate.......................148 Configuring IPsec............................149 Encryption and Authentication by IPsec....................149 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings........150 IPsec Settings.............................151...
  • Page 449 Unauthorized Copy Prevention / Data Security for Copying..............195 Enabling Pattern Printing...........................195 Enabling Data Security for Copying......................197 Printing User Information on Paper.......................198 Managing Locked Print Files.........................201 Deleting Locked Print Files........................201 Changing the Password of a Locked Print File..................203 Unlocking a Locked Print File........................204 Enforced Storage of Documents to be Printed on a Printer................206 7.
  • Page 450 Specifying the Extended Security Functions....................262 Extended Security Function Settings......................262 Other Security Functions..........................270 Fax Function...............................270 Scanner Function............................271 System Status.............................271 Confirming Firmware Validity........................271 Limiting Machine Operations to Customers Only..................272 Settings...............................272 Additional Information for Enhanced Security....................274 Settings You Can Configure Using the Control Panel................274 Settings You Can Configure Using Web Image Monitor...............276 Settings You Can Configure When IPsec Is Available/Unavailable............277 8.
  • Page 451 Web Image Monitor: Fax..........................352 Web Image Monitor: Scanner........................354 Web Image Monitor: Interface........................357 Web Image Monitor: Network........................359 Web Image Monitor: Security........................363 Web Image Monitor: @Remote........................364 Web Image Monitor: Webpage........................365 Web Image Monitor: Extended Feature Settings..................366 Web Image Monitor: Address Book......................367 Web Image Monitor: Reset Printer Job......................368 Web Image Monitor: Reset the Machine....................369 Web Image Monitor: Device Home Management..................370 Web Image Monitor: Customize Screen per User..................371...
  • Page 452: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Data security for copying function Copy Data Security Unit...
  • Page 453: Main Software Products

    Main Software Products Product name Names in the text DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise Remote Communication Gate S Pro for @Remote Enterprise and Remote Communication Gate S Remote Communication Gate S *1 This product is no longer sold.
  • Page 455: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. 1.
  • Page 456: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. Press the [User Tools/Counter] key.
  • Page 457 Before Using This Machine Change the administrator's user name and password. For details about specifying administrators' user names and passwords, see p.21 "Using Web Image Monitor to Configure Administrator Authentication". Log out and then close Web Image Monitor. Disconnect this machine from the administrator-only access network, and then connect it to the general usage network environment.
  • Page 458: Administrators

    1. Getting Started Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 459: Configuring Administrator Authentication

    Configuring Administrator Authentication Configuring Administrator Authentication Administrator authentication is a mechanism by which an administrator ID is confirmed via a login user name and password when an administrator starts to make the various settings of this machine or when accessing the machine from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book.
  • Page 460: Specifying Administrator Privileges

    1. Getting Started A user administrator can register/delete users in the Address Book or change users' personal information. Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again.
  • Page 461 Configuring Administrator Authentication • Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will have to return the machine to its default state. This will result in all data in the machine being lost.
  • Page 462: Registering And Changing Administrators

    1. Getting Started Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. "Available Settings" varies depending on the administrator. To specify administrator authentication for more than one category, repeat steps 6 to 8. Press [OK].
  • Page 463 Configuring Administrator Authentication Press [Program / Change Administrator]. In the line for the administrator whose privilege you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. When allocating privileges for each administrators to one person each, select one administrator for each category as shown on the screens below.
  • Page 464 1. Getting Started Press [Change] for "Login User Name". Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy and how to specify it, see p.262 "Specifying the Extended Security Functions".
  • Page 465: Using Web Image Monitor To Configure Administrator Authentication

    Configuring Administrator Authentication Usable characters for user names and passwords The following characters can be used for login user names and passwords. Names and passwords are case sensitive. • Upper case letters: A to Z (26 characters) • Lower case letters: a to z (26 characters) •...
  • Page 466: Administrator Login Method

    1. Getting Started Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Press the [User Tools/Counter] key. Press the [Login/Logout] key. CJS040 The login screen appears.
  • Page 467: Logging In Using Web Image Monitor

    Administrator Login Method Enter the login user name, and then press [OK]. The default login name for administrators is "admin" and "supervisor" for supervisors. Enter the login password, and then press [OK]. There is no preset default password for administrators or supervisors. Because of this, do not enter anything for the password and simply press [OK].
  • Page 468: Administrator Logout Method

    1. Getting Started Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the [Login/Logout] key. Press [Yes]. • You can log out using the following procedures also. •...
  • Page 469: Supervisor

    Supervisor Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If logged in using the supervisor's user name and password, you cannot use normal functions or specify defaults.
  • Page 470: Changing The Supervisor

    1. Getting Started Press [Change] for the administrator you wish to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK]. Press [OK] twice. You will be automatically logged out.
  • Page 471 Supervisor Press [Administrator Tools]. Press [ Next]. Press [Program / Change Administrator]. Under "Supervisor", press [Change]. Press [Change] for "Login User Name". Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 472 1. Getting Started...
  • Page 473: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the personal information in the machine's Address Book, and can use only the functions they are permitted to access by administrators.
  • Page 474: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a process by which the user's ID is confirmed via a login user name and password when the user starts to use this machine or when accessing the machine from a network. CJC010 1.
  • Page 475: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication To control users' access to the machine, perform user authentication using login user names and passwords. There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 476 2. Configuring User Authentication authentication, or Integration Server authentication. In this case, since the User Code authentication does not have a password, the login password is set as blank. • When authentication switches to an external authentication method (Windows authentication, LDAP authentication, or Integration Server authentication), authentication will not occur, unless the external authentication device has the carried over user code account previously registered.
  • Page 477: User Code Authentication

    User Code Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Authentication Information", Connecting the Machine/ System Settings.
  • Page 478 2. Configuring User Authentication Select [User Code Auth.]. If you do not want to use user authentication management, select [Off]. Press [ Next]. In "Functions to Restrict", select the functions that you want to restrict. If the function you want to select is not displayed, press [ Next]. The selected functions are subject to User Code authentication.
  • Page 479 User Code Authentication Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see p.64 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 15. If you select [Simple (Limitation)], proceed to step 12. Press [Change].
  • Page 480 2. Configuring User Authentication Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 481: Basic Authentication

    Basic Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the personal data in the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 482 2. Configuring User Authentication Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see p.64 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 11. If you select [Simple (Limitation)], proceed to step 8. Press [Change].
  • Page 483: Authentication Information Stored In The Address Book

    Basic Authentication In "Available Functions", select which of the machine's functions you want to permit. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book. For details about specifying available functions for individuals or groups, see p.80 "Limiting Available Functions".
  • Page 484 2. Configuring User Authentication The user administrator logs in from the control panel. Press [Address Book Mangmnt]. Select the user. Press [Auth. Info]. Press [Change] for "Login User Name". Enter a login user name, and then press [OK].
  • Page 485: Specifying Login Details

    Basic Authentication Press [Change] for "Login Password". Enter a login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK]. Press [OK]. Press [Exit]. Log out. Specifying Login Details The login user name and password specified in "Address Book Management" can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication".
  • Page 486 2. Configuring User Authentication Select [Use Auth. Info at Login] in "SMTP Authentication". For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication". For LDAP authentication, select [Use Auth. Info at Login] in "LDAP Authentication". If the function you want to select is not displayed, press [ Next]. Press [OK].
  • Page 487: Windows Authentication

    Windows Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 488 2. Configuring User Authentication • During Windows Authentication, data registered in the directory server, such as the user's e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. •...
  • Page 489: Specifying Windows Authentication

    Windows Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [User Authentication Management].
  • Page 490 2. Configuring User Authentication If you want to use Kerberos authentication, press [On]. If you want to use NTLM authentication, press [Off] and proceed to step 9. Select Kerberos authentication realm and proceed to step 10. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters.
  • Page 491 Windows Authentication Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see p.64 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 15. If you select [Simple (Limitation)], proceed to step 12. Press [Change].
  • Page 492 2. Configuring User Authentication Press [On] for "Use Secure Connection (SSL)". If you are not using secure sockets layer (SSL) for authentication, press [Off]. If you have not registered a global group, proceed to step 21. If you have registered a global group, proceed to step 16. If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 493: Installing Internet Information Services (Iis) And Certificate Services

    Windows Authentication Under "Group Name", press [Change], and then enter the group name. Press [OK]. In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next]. Windows Authentication will be applied to the selected functions.
  • Page 494: Creating The Server Certificate

    2. Configuring User Authentication We recommend you install Internet Information Services (IIS) and Certificate services as the Windows components. Install the components, and then create the server certificate. If they are not installed, install them as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrator Tools], and then click [Server Manager].
  • Page 495: If The Fax Number Cannot Be Obtained

    Windows Authentication In the left column, click the server name, and then double-click [Server Certificates]. In the right column, click [Create Certificate Request...]. Enter all the information, and then click [Next]. In "Cryptographic service provider:", select a provider, and then click [Next]. Click [...], and then specify a file name for the certificate request.
  • Page 496: Ldap Authentication

    2. Configuring User Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 497: Specifying Ldap Authentication

    LDAP Authentication Select either Kerberos, DIGEST, or Cleartext authentication. • User Name You do not have to enter the user name if the LDAP server supports "Anonymous Authentication". • Password You do not have to enter the password if the LDAP server supports "Anonymous Authentication".
  • Page 498 2. Configuring User Authentication The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [User Authentication Management]. Select [LDAP Auth.]. If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication.
  • Page 499 LDAP Authentication Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see p.64 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 12. If you select [Simple (Limitation)], proceed to step 9. Press [Change].
  • Page 500 2. Configuring User Authentication Enter the login name attribute, and then press [OK]. Use the login name attribute as a search criterion to obtain information about an authenticated user. You can create a search filter based on the login name attribute, select a user, and then retrieve the user information from the LDAP server so it is transferred to the machine's Address Book.
  • Page 501 LDAP Authentication Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 502: Integration Server Authentication

    2. Configuring User Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server authentication, single sign-on is possible using DeskTopBinder.
  • Page 503 Integration Server Authentication Press [User Authentication Management]. Select [Integration Svr. Auth.]. If you do not want to use user authentication management, select [Off]. Press [Change] for "Server Name". Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IPv4 address or host name.
  • Page 504 2. Configuring User Authentication In "Authentication Type", select the authentication system for external authentication. Select an available authentication system. For general usage, select [Default]. Press [Change] for "Domain Name". Enter the domain name, and then press [OK]. You cannot specify a domain name under an authentication system that does not support domain login.
  • Page 505 Integration Server Authentication Press [Exit]. In the "Authentication Type", if you have not registered a group, proceed to step 20. If you have registered a group, proceed to step 14. If you set "Authentication Type" to [Windows (Native)] or [Windows (NT Compatible)], you can use the global group.
  • Page 506 2. Configuring User Authentication In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next]. Authentication will be applied to the selected functions. Users can use the selected functions only. For details about specifying available functions for individuals or groups, see p.80 "Limiting Available Functions".
  • Page 507 Integration Server Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 508: Printer Job Authentication

    2. Configuring User Authentication Printer Job Authentication Printer job authentication refers to the function of authenticating the user for printer jobs. The drivers that handle user authentication are PCL or PostScript3. PostScript3 only handles User Code authentication. Printer Job Authentication Levels •...
  • Page 509 Printer Job Authentication Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver. 2. The [User Authentication] and [With Encryption] check boxes are selected in the PCL mini- driver * The authentication function cannot be used with IA-64 OS.
  • Page 510 2. Configuring User Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 511: Authfree" Command

    Printer Job Authentication "authfree" Command When [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command makes it possible to specify objects to be excluded from printer job authentication. The default user name for logging in to telnet is "admin". No password is configured. For details on how to login to and use telnet, see "Using telnet", Connecting the Machine/ System Settings.
  • Page 512: Auto Registration To The Address Book

    2. Configuring User Authentication Auto Registration to the Address Book If a user logs in via Windows, LDAP or integration server authentication, their personal information is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 513 Auto Registration to the Address Book Press [Carry-over Data]. Use the number keys to enter the registration number of the Address Book that will use the setting content and press [ ]. Press [OK]. Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 514: User Lockout Function

    2. Configuring User Authentication User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 515: Specifying The User Lockout Function

    User Lockout Function Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 516: Auto Logout

    2. Configuring User Authentication Auto Logout When using Basic authentication, Windows authentication, LDAP authentication or Integration Server authentication, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 517 Auto Logout • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function. • The auto logout time for Web Image Monitor is fixed at 30 minutes.
  • Page 518: Authentication Using An External Device

    2. Configuring User Authentication Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 519: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The destination of faxes and scanned documents can be restricted to addresses that are registered in the Address Book.
  • Page 520 3. Restricting Machine Usage Press [Extended Security]. Press [ Next]. Press [On] for "Restrict Use of Destinations (Fax)" and/or "Restrict Use of Destinations (Scanner)". If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear.
  • Page 521: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 522: Menu Protect

    3. Restricting Machine Usage Menu Protect In addition to the System Settings, Menu Protect limits user permission to access the initial settings menu for each function. This function is also effective when management is not based on user authentication. To change the menu protect setting, first enable administrator authentication. For details on how to set administrator authentication, see p.15 "Configuring Administrator Authentication".
  • Page 523 Menu Protect Printer Function The machine administrator logs in from the control panel. Press [Printer Features]. Press [Maintenance]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function The machine administrator logs in from the control panel. Press [Scanner Features].
  • Page 524: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Available Functions Specify the available functions from the copier, Document Server, fax, scanner, printer, and browser functions. Specifying Which Functions are Available Specify the functions available to registered users.
  • Page 525 Limiting Available Functions In "Available Functions", select the functions you want to specify. If the function you want to select is not displayed, press [ Next]. Press [OK]. Log out.
  • Page 526: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 527 Restricting Media Slot Access • If you select [Prohibit] under "Print from Memory Storage Device", the [Print from Memory Storage Device] button is not displayed on the printer function's initial screen.
  • Page 528: Managing Print Volume Per User

    3. Restricting Machine Usage Managing Print Volume per User This function limits how much each user can print. When a user reaches their printing limit, their print job is canceled and/or a message indicating so is displayed. Either the user administrator or the machine administrator can specify the print volume available to a user.
  • Page 529: Specifying Limitations For Print Volume

    Managing Print Volume per User Things to note when limiting print volume If the following occurs, the user will not be able to print: • The login user name or user code registered in the Address Book is changed while the user is logged in and authenticated.
  • Page 530 3. Restricting Machine Usage Select [Stop Job] or [Finish Job and Limit], and then press [OK]. If you do not want to limit print volume, select [Allow Continue Use]. Press [Exit]. Press [System Settings]. Press [Administrator Tools]. Press [Print Volume Use Limitation: Unit Count Setting]. For each print condition, use the number keys to enter a per-page unit count between "0"...
  • Page 531: Specifying The Default Maximum Use Count

    Managing Print Volume per User Log out. • Limitations for print volume can also be specified in [Print Volume Use Limitation] under "Configuration" in Web Image Monitor. Restrictions When User Code Authentication is Enabled When User Code authentication is enabled, the following restrictions apply to the print volume limitation settings: •...
  • Page 532: Specifying The Maximum Use Count Per User

    3. Restricting Machine Usage [Print Volum. Use Limit.: Default Limit Value] does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached". Use the number keys to enter a value between "0" and "999,999" as the maximum available print volume, and then press [ ].
  • Page 533 Managing Print Volume per User Press [Auth. Info]. Press [ Next] twice. Press [Limit] in "Print Volum. Use Limit.". "Print Volum. Use Limit." does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached". If you do not want to limit user's print volume, press [Do not Limit].
  • Page 534: Checking Print Volume Per User

    3. Restricting Machine Usage Log out. • The maximum print volume for an individual user can also be specified in [Address Book] in Web Image Monitor. • You can search for users by entering a name in the text box at the top of the control panel, and then pressing [Search].
  • Page 535: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters. Printing a List of Print Volume Use Counters The machine administrator logs in from the control panel. Press [System Settings].
  • Page 536: Clearing Print Volume Use Counters

    3. Restricting Machine Usage To print a list of the volume use counters of every user, press [Print Counter List] under "All Users". To print a list of the volume use counters of selected users only, select the users whose counters you want to print, and then press [Print Counter List] under "Per User". Select the counter you want to print in the list, and then press [Print].
  • Page 537 Managing Print Volume per User Press [Display / Clear / Print Counter per User]. Press [Print Volume Use]. A list of users' print volume use counters is displayed. To clear the print volume use counters of every user, press [Clear] under "All Users". To clear the print volume use counters of selected users only, select the users whose counters you want to clear, and then press [Clear] under "Per User".
  • Page 538: Configuring The Auto-Reset Function

    3. Restricting Machine Usage Select [Print Volume Use], and then press [OK]. Log out. • You can also use [Address Book] in Web Image Monitor to clear the print volume use counters. However if you want to clear the print volume use counters of all users simultaneously, use the control panel.
  • Page 539 Managing Print Volume per User Press [Volume Use Counter: Scheduled/Specified Reset Settings] Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions. Press [OK]. Log out. • If the machine is off at the specified time, the volume is reset when the power is turned on. •...
  • Page 540 3. Restricting Machine Usage...
  • Page 541: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 542 4. Preventing Leakage of Information from Machines Press [Program/Change/Delete] for "Permissions for Users / Groups", under "Protect Destination". Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 543: Encrypting Data In The Address Book

    Protecting the Address Book Encrypting Data in the Address Book The user administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [Extended Security]. Press [On] for "Encrypt User Custom Settings & Address Book". Press [Change] for "Encryption Key".
  • Page 544 4. Preventing Leakage of Information from Machines Press [Encrypt / Decrypt]. Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the Address Book may take a long time. The time it takes to encrypt the data in the Address Book depends on the number of registered users.
  • Page 545: Encrypting Data On The Hard Disk

    Encrypting Data on the Hard Disk Encrypting Data on the Hard Disk Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written. When the data encryption settings are enabled, an encryption key is generated and this is used to restore the data.
  • Page 546 4. Preventing Leakage of Information from Machines Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approximately 1 Only Architecture (stored documents in hour applications' Document Server, program/log Locked Print files / Sample Print files / •...
  • Page 547: Enabling The Encryption Settings

    Encrypting Data on the Hard Disk Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 548 4. Preventing Leakage of Information from Machines Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 549: Backing Up The Encryption Key

    Encrypting Data on the Hard Disk Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 550: Updating The Encryption Key

    4. Preventing Leakage of Information from Machines Log out. Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally. • The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption key safely for retrieving backup data.
  • Page 551: Canceling Data Encryption

    Encrypting Data on the Hard Disk Press [OK]. Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 552: Deleting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 553: Auto Erase Memory

    Deleting Data on the Hard Disk Auto Erase Memory A document scanned in copier, or scanner mode, or print data sent from a printer driver is temporarily stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary data.
  • Page 554 4. Preventing Leakage of Information from Machines Methods of overwriting You can select a method of overwriting from the following: • NSA Temporary data is overwritten twice with random numbers and once with zeros. • DoD Temporary data is overwritten with a fixed value, the fixed value's complement, and random numbers.
  • Page 555 Deleting Data on the Hard Disk Press [Auto Erase Memory Setting]. Press [On]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 556 4. Preventing Leakage of Information from Machines Press [OK]. Auto Erase Memory is disabled. • To set Auto Erase Memory to [On] again, repeat the procedure in "Using Auto Erase Memory". Types of data that can or cannot be overwritten The following are the types of data that can or cannot be overwritten by "Auto Erase Memory".
  • Page 557: Erase All Memory

    Deleting Data on the Hard Disk A stored document can only be overwritten after it has been printed or deleted from Document Server. • Information registered in the Address Book Data stored in the Address Book can be encrypted for security. For details, see p.97 "Protecting the Address Book".
  • Page 558 4. Preventing Leakage of Information from Machines Press [ Next] twice. Press [Erase All Memory]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 559 Deleting Data on the Hard Disk • Should the main power switch be turned off before "Erase All Memory" is completed, overwriting will continue once the main power switch is turned back on. • If an error occurs before overwriting is completed, turn off the main power. Turn it on again, and then repeat from step 2.
  • Page 560 4. Preventing Leakage of Information from Machines...
  • Page 561: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 562: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel, or using Web Image Monitor, telnet, SmartDeviceMonitor for Admin or Remote Communication Gate S.
  • Page 563 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require FTP cannot be used. • Web Image Monitor You can restrict • telnet personal information • SmartDeviceMonitor TCP:21 from being displayed for Admin by making settings on •...
  • Page 564 5. Enhanced Network Security Protocol Port Setting method When disabled Functions that require HTTPS cannot be used. @Remote cannot be • Web Image Monitor used. • telnet HTTPS TCP:443 You can also make • SmartDeviceMonitor settings to require SSL for Admin transmission using the control panel or Web Image Monitor.
  • Page 565 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require SNMPv3 cannot be used. • Web Image Monitor You can also make • telnet settings to require • SmartDeviceMonitor SNMPv3 encrypted SNMPv3 UDP:161 for Admin transmission and restrict the use of other •...
  • Page 566 5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet IPP functions cannot be • SmartDeviceMonitor TCP:631 used. for Admin • Remote Communication Gate S TCP:1720 (H.323) UDP:1719 (Gatekeeper) • Control panel TCP/UDP:5060 • Web Image Monitor IP-Fax connecting (SIP) functions using H.323,...
  • Page 567 Enabling and Disabling Protocols Protocol Port Setting method When disabled • Web Image Monitor • telnet DIPRINT functions • SmartDeviceMonitor DIPRINT TCP:9100 cannot be used. for Admin • Remote Communication Gate S You can attempt to • Control panel TCP:10021 update firmware via •...
  • Page 568: Enabling And Disabling Protocols Using The Control Panel

    5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet WSD (Scanner) TCP-53002 • SmartDeviceMonitor WSD (Scanner) functions cannot be (variable) for Admin used. • Remote Communication Gate S WSD (Device, Printer, • telnet Scanner) search WS-Discovery UDP/TCP:3702...
  • Page 569: Enabling And Disabling Protocols Using Web Image Monitor

    Enabling and Disabling Protocols Press [Effective Protocol]. Set the desired protocols to active/inactive. Press [OK]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [Network Security] under "Security".
  • Page 570: Specifying Network Security Level

    5. Enhanced Network Security Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 571: Specifying Network Security Level Using Web Image Monitor

    Specifying Network Security Level Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 572: Status Of Functions Under Each Network Security Level

    5. Enhanced Network Security Status of Functions under Each Network Security Level TCP/IP Function Level 0 Level 1 FIPS 140 Level 2 TCP/IP Active Active Active Active HTTP > Port 80 Open Open Open Open IPP > Port 80 Open Open Open Open...
  • Page 573 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 SSDP Active Active Inactive Inactive Active Active Inactive Inactive NetBIOS over TCP/IPv4 Active Active Inactive Inactive WSD (Device) Active Active Active Active WSD (Printer) Active Active Active Active WSD (Scanner) Active...
  • Page 574 5. Enhanced Network Security TCP/IP Encryption Strength Setting Function Level 0 Level 1 FIPS 140 Level 2 ssh > Encryption Algorithm DES/ 3DES/ 3DES/ 3DES/ 3DES/ AES-128/ AES-128/ AES-128/ AES-128/ AES-192/ AES-192/ AES-192/ AES-192/ AES-256/ AES-256 AES-256 Blowfish/ Arcfour Arcfour S/MIME >...
  • Page 575: Protecting The Communication Path Via A Device Certificate

    Protecting the Communication Path via a Device Certificate Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. To use these protocols, it is necessary to create and install a device certificate for the machine in advance.
  • Page 576 5. Enhanced Network Security Press [Program / Delete Device Certificate]. Check that [Program] is selected. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. To use S/MIME, specify the e-mail address of the administrator of the machine in the mail address setting.
  • Page 577: Creating The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate This section explains the use of a self-signed certificate as the device certificate. Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [Device Certificate] under "Security". Check the radio button next to the number of the certificate you want to create.
  • Page 578: Installing The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Make the necessary settings. Click [OK]. The setting is changed. Click [OK]. "Requesting" appears for "Certificate Status". Log out. Apply to the certificate authority for the device certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority.
  • Page 579: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Click [OK]. Wait a moment for the device to restart, and then click [OK]. "Installed" appears under "Certificate Status" to show that a device certificate for the machine has been installed. Log out. Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority.
  • Page 580: Configuring Ssl/Tls

    5. Enhanced Network Security Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so makes it possible to prevent data from being intercepted during transmission, and its content from being analyzed or tampered with. Flow of SSL/TLS encrypted communications 1.
  • Page 581: Enabling Ssl/Tls

    Configuring SSL/TLS Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 582: User Setting For Ssl/Tls

    5. Enhanced Network Security Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 583: Setting The Ssl/Tls Encryption Mode

    Configuring SSL/TLS • When the operating system's standard IPP port is used with Windows Vista/7 or Windows Server 2008/2008 R2, if the host name or IP address of the [Common Name] of the device certificate is changed, delete any previously configured PC printer(s) and re-install the printers after changing the [Common Name].
  • Page 584: Enabling Ssl For Smtp Connections

    5. Enhanced Network Security Press [Permit SSL / TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 585 Configuring SSL/TLS In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out. •...
  • Page 586: Configuring S/Mime

    5. Enhanced Network Security Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 587 Configuring S/MIME 2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the certificate is specified in the Address Book.) 3. Specify the encryption algorithm using Web Image Monitor. 4. Using the shared key, encrypt the e-mail message. 5.
  • Page 588: Attaching An Electronic Signature

    5. Enhanced Network Security Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 589 Configuring S/MIME 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 590: Specifying Checking Of The Certificate Valid Period

    5. Enhanced Network Security Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending E-mail by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the fax next to "When Sending E-mail by Fax"...
  • Page 591 Configuring S/MIME Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the Operation Mode. Click [OK]. Log out. • If the validity period of a certificate is valid, but expires before an e-mail is retrieved from the mail server by a client computer, the e-mail cannot be retrieved from the server.
  • Page 592: Configuring Pdfs With Electronic Signatures

    5. Enhanced Network Security Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 593: Configuring Ipsec

    Configuring IPsec Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine has two methods that you can use to specify the shared encryption key for both parties: encryption key auto exchange and encryption key manual settings.
  • Page 594: Encryption Key Auto Exchange Settings And Encryption Key Manual Settings

    5. Enhanced Network Security • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 595: Ipsec Settings

    Configuring IPsec Settings 1-4 and default setting Using either the manual or auto exchange method, you can configure four separate sets of SA details (such as different shared keys and IPsec algorithms). In the default settings of these sets, you can include settings that the fields of sets 1 to 4 cannot contain.
  • Page 596 5. Enhanced Network Security Security level Security level features Select this level if you want to authenticate the transmission partner and prevent unauthorized data tampering, but not perform data packet encryption. Authentication Only Since the data is sent in cleartext, data packets are vulnerable to eavesdropping attacks.
  • Page 597 Configuring IPsec Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption Phase 1 Diffie- Hellman Group Phase 2 Security Protocol HMAC- HMAC- SHA512-256/ SHA512-256/ Phase 2 HMAC- HMAC- HMAC-SHA512-256/ Authentication SHA384-192/ SHA384-192/ HMAC-SHA384-192/ Algorithm HMAC- HMAC- HMAC-SHA256-128 SHA256-128/ SHA256-128/...
  • Page 598 5. Enhanced Network Security Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 599 Configuring IPsec Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners. a PSK password using up to (auto setting) 32 ASCII characters.
  • Page 600 5. Enhanced Network Security Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 601 Configuring IPsec Encryption key manual settings items Setting Description Setting value • Inactive • IPv4 Specify the address type for Address Type which IPsec transmission is • IPv6 used. • IPv4/IPv6 (Default Settings only) The machine's IPv4 or IPv6 address. Specify the machine's address.
  • Page 602 5. Enhanced Network Security Setting Description Setting value Specify the same value as Any number between 256 SPI (Input) your transmission partner's SPI and 4095 output value. To apply both encryption and • ESP authentication to sent data, specify "ESP" or "ESP+AH". Security Protocol •...
  • Page 603 Configuring IPsec Setting Description Setting value Specify a value within the ranges shown below, according to the encryption algorithm. Hexadecimal value 0-9, a-f, A-F • If HMAC-MD5-96, set 32 digits • If HMAC-SHA1-96, set 40 digits • If HMAC-SHA256-128, set 64 digits •...
  • Page 604 5. Enhanced Network Security Setting Description Setting value Specify a value within the ranges shown below, according to the encryption algorithm. hexadecimal value 0-9, a-f, A-F • DES, set 16 digits • 3DES, set 48 digits • AES-128, set 32 digits •...
  • Page 605: Encryption Key Auto Exchange Settings Configuration Flow

    Configuring IPsec Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings Confirm IPsec transmission...
  • Page 606 5. Enhanced Network Security Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission. Click [OK]. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. Log out. • To change the transmission partner authentication method for encryption key auto exchange settings to "Certificate", you must first install and assign a certificate.
  • Page 607 Configuring IPsec Double-click [Local Security Policy]. If the "User Account Control" dialog box appears, click [Yes]. Click [IP Security Policies on Local Computer]. In the "Action" menu, click [Create IP Security Policy]. The IP Security Policy Wizard appears. Click [Next]. Enter a security policy name in "Name", and then click [Next].
  • Page 608 5. Enhanced Network Security Click [Finish]. Click [OK]. Select the IP filter that was just created, and then click [Next]. Click [Add]. Filter action wizard appears. Click [Next]. In [Name], enter an IP Filter action name, and then click [Next]. Select "Negotiate security", and then click [Next].
  • Page 609: Encryption Key Manual Settings Configuration Flow

    Configuring IPsec • If you specify the "Authentication and High Level Encryption" security level in "Encryption Key Auto Exchange Settings", also select the "Use session key perfect forward secrecy (PFS)" check box in the filter action properties screen. If using PFS in Windows, the PFS group number used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in step 11).
  • Page 610: Telnet Setting Commands

    5. Enhanced Network Security Set items for encryption key manual settings in [Settings 1]. If you want to make multiple settings, select the settings number and add settings. Click [OK]. Select [Active] for "IPsec" in "IPsec". Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS communication.
  • Page 611 Configuring IPsec ipsec manual mode To display or specify encryption key manual settings, use the "ipsec manual_mode" command. Display current settings msh> ipsec manual_mode • Displays the current encryption key manual settings. Specify encryption key manual settings msh> ipsec manual_mode {on|off} •...
  • Page 612 5. Enhanced Network Security • To specify the local or remote address value, specify masklen by entering [/] and an integer 0-32 if you are specifying an IPv4 address. If you are specifying an IPv6 address, specify masklen by entering [/] and an integer 0-128. •...
  • Page 613 Configuring IPsec • Enter the separate setting number [1-4] or [default] and specify the authentication algorithm, and then set the authentication key. • If you are setting a hexadecimal number, attach 0x at the beginning. • If you are setting an ASCII character string, enter it as is. •...
  • Page 614 5. Enhanced Network Security • Enter the separate setting number [1-4], and the address type to specify local and remote address. • To set the local or remote address values, specify masklen by entering [/] and an integer 0-32 when settings an IPv4 address. When setting an IPv6 address, specify masklen by entering [/] and an integer 0-128.
  • Page 615 Configuring IPsec • Not specifying an encapsulation mode displays the current setting. Tunnel end point setting msh> ipsec ike {1|2|3|4|default} tunneladdr "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address.
  • Page 616 5. Enhanced Network Security • Not specifying a group number displays the current setting. ISAKMP SA (phase 1) validity period setting msh> ipsec ike {1|2|3|4|default} ph1 lifetime "validity period" • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity period.
  • Page 617 Configuring IPsec Reset setting values msh> ipsec ike {1|2|3|4|default|all} clear • Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying [all] resets all of the settings, including default.
  • Page 618: Installing A Site Certificate

    5. Enhanced Network Security Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 619: Selecting The Device Certificate

    Configuring IEEE 802.1X Authentication Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see p.131 "Protecting the Communication Path via a Device Certificate".
  • Page 620 5. Enhanced Network Security • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. • Make the following settings according to the operating system you are using: •...
  • Page 621: Setting Items Of Ieee 802.1X For Wireless Lan

    Configuring IEEE 802.1X Authentication Setting Items of IEEE 802.1X for Wireless LAN Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IEEE 802.1X] under "Security". In "User Name", enter the user name set in the RADIUS server. Enter the domain name in "Domain Name".
  • Page 622 5. Enhanced Network Security • Make the following settings according to the operating system you are using: • Select [On] or [Off] in "Authenticate Server Certificate". • Select [On] or [Off] in "Trust Intermediate Certificate Authority". • Enter the host name of the RADIUS server on "Server ID". •...
  • Page 623: Snmpv3 Encryption

    SNMPv3 Encryption SNMPv3 Encryption When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. The network administrator logs in from the control panel. Press [System Settings].
  • Page 624 5. Enhanced Network Security • If network administrator's [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent. For details about specifying the network administrator's [Encryption Password] setting, see p.18 "Registering and Changing Administrators".
  • Page 625: Encrypting Transmitted Passwords

    Encrypting Transmitted Passwords Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security of passwords against analysis. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together.
  • Page 626: Specifying An Ipp Authentication Password

    5. Enhanced Network Security Press [Extended Security]. For "Driver Encryption Key", press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 627 Encrypting Transmitted Passwords Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password"...
  • Page 628: Kerberos Authentication Encryption Setting

    5. Enhanced Network Security Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 629: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Configuring Access Permissions for Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server.
  • Page 630: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents • The default access permission for the file creator (owner) is "Read-only". You can also specify the access permission. • The document administrator not only configures access permissions, but can also delete stored files. For details on the methods of deleting documents, see "Deleting Stored Documents", Copy/ Document Server.
  • Page 631 Configuring Access Permissions for Stored Files Select the file. Press [Change File Info.]. Press [Change Access Priv.].
  • Page 632 6. Preventing the Leaking of Documents Press [Program/Change/Delete]. Press [New Program]. Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 633: Changing The Owner Of A Document

    Configuring Access Permissions for Stored Files Select the user to whom you want to assign access permission, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit]. Press [OK]. Log out. •...
  • Page 634: Configuring Access Permission For Each User For Stored Files

    6. Preventing the Leaking of Documents Press [OK] twice. Log out. Configuring Access Permission for Each User for Stored Files This can be specified by the user administrator or file creator (owner). Specify the users and their access permission to files stored by a particular user. This makes managing access permission easier than specifying and managing access permissions for each stored file.
  • Page 635 Configuring Access Permissions for Stored Files Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit]. Select the user to whom you want to assign access permission, and then select the permission.
  • Page 636: Specifying Passwords For Stored Files

    6. Preventing the Leaking of Documents Specifying Passwords for Stored Files This can be specified by the file administrator or file creator (owner). The file administrator or the file creator (owner) logs in from the control panel. Press the [User Tools/Counter] key to switch to the normal screen. Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen.
  • Page 637: Unlocking Stored Files

    Specifying Passwords for Stored Files Press [Change Password]. Enter the password using the number keys. You can use 4 to 8 numbers as the password for the stored file. Press [OK]. Confirm the password by re-entering it using the number keys. Press [OK].
  • Page 638 6. Preventing the Leaking of Documents Press [Change File Info.]. Press [Unlock Files]. Press [Yes]. icon changes to the icon. Press [OK]. Log out.
  • Page 639: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying In Printer Features, using the printer driver, you can embed a pattern in the printed copy to discourage or prevent unauthorized copying. The unauthorized copy prevention function prevents unauthorized copies of documents by embedding a text pattern (for instance, a warning such as "No Copying") that you can set on the print driver (which will appear on printed copies).
  • Page 640 6. Preventing the Leaking of Documents Press [Unauthorized Copy Preventn.]. If it is not displayed, press [ ] at the top right of the display. Press [Unauthorized Copy Prevention Setting]. Press [On], and then press [OK]. Press [Setting Priority (Drvr/Cmnd/Mach)]. Select the range within which the user can specify the pattern to be printed using the printer driver.
  • Page 641: Enabling Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying • [Machine Setting(s)] The pattern cannot be specified using the printer driver. The pattern specified using the machine is printed. Press [OK]. Log out. • For details of the settings when specifying the pattern using the machine, see "Printer Features", Print.
  • Page 642: Printing User Information On Paper

    6. Preventing the Leaking of Documents Printing User Information on Paper Information such as the start time of a job, information on the person who outputs it (name or login user name), machine number or IP address of the machine can be forced to be printed on paper. This function is called Compulsory Security Stamp.
  • Page 643 Printing User Information on Paper • Date/Time The time a job starts is printed. • Printout User Name If "Stamp User Name" is selected, the "Name" in the "Names" in the Address Book is printed. If "Stamp Login User Name" is selected, the "Login User Name" in the "Auth. Info" in the Address Book is printed.
  • Page 644 6. Preventing the Leaking of Documents Set the stamp position. Press [OK] twice. Log out.
  • Page 645: Managing Locked Print Files

    Managing Locked Print Files Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function. Locked Print •...
  • Page 646 6. Preventing the Leaking of Documents Press [Locked Print Job]. Select the file. Press [Delete]. Enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 647: Changing The Password Of A Locked Print File

    Managing Locked Print Files • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. Changing the Password of a Locked Print File This can be specified by the file administrator or file creator (owner). If the password has been forgotten, the file administrator changes the password to restore access.
  • Page 648: Unlocking A Locked Print File

    6. Preventing the Leaking of Documents Enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 649 Managing Locked Print Files Press [Unlock File]. Press [Yes]. icon disappears. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 650: Enforced Storage Of Documents To Be Printed On A Printer

    6. Preventing the Leaking of Documents Enforced Storage of Documents to be Printed on a Printer Enforced storage of documents to be printed on a printer prevents information leakage due to users failing to collect prints or leaving prints unattended. With respect to printer output, the following print jobs are subject to compulsory storage.
  • Page 651: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 652: Managing Logs From The Log Collection Server

    7. Managing the Machine Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer from the machine to the log collection server. Note that you can change the log transfer setting to [Off] only if it is already set to [On]. For details about the log collection server, contact your sales representative.
  • Page 653: Using Web Image Monitor To Manage Log Files

    Managing Log Files Using Web Image Monitor to Manage Log Files You can specify the types of log to store in the machine and the log collection level. You can also encrypt, bulk delete, or download log files. Specifying log collect settings Enable the collection settings for each kind of log and configure the collection level.
  • Page 654 7. Managing the Machine Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer to the log collection server. Note that you can change the log transfer setting to [Inactive] only if it is already set to [Active]. Log in as the machine administrator from Web Image Monitor.
  • Page 655: Downloading Logs

    Managing Log Files Click [Delete] under "Delete All Logs". Click [OK]. Click Logout. • When reading the log settings screen, "Delete All Logs" does not appear if the job log, access log, or eco-friendly log is not set to [Active]. Downloading logs Use the following procedure to convert the logs stored in the machine into a CSV file for simultaneous batch download.
  • Page 656 7. Managing the Machine Number of Logs that Can be Kept on the Machine When the maximum number of job logs, access logs or eco-friendly logs that can be kept on the machine is exceeded and new logs are generated, the old logs are overwritten by the new ones. If the logs are not downloaded periodically, it may not be possible to record the old logs onto files.
  • Page 657 Managing Log Files The job log and access log are downloaded as one file. "If logs are downloaded without overwriting" below indicates that the job log and access log are mixed after download. "If logs are downloaded during overwriting" below indicates that part of the access log is overwritten. In this example, part of the access log was overwritten by a downloaded log and deleted.
  • Page 658 7. Managing the Machine If logs are downloaded during overwriting CJD007 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs.
  • Page 659 Managing Log Files Details of series of jobs (including reception, processing, and output of the jobs' data) are combined into single entries. When the machine receives a print job, it creates an ID for the job and records this in the job log. The machine then creates a login ID for the print job and records this in the access log.
  • Page 660: Logs That Can Be Managed Using Web Image Monitor

    7. Managing the Machine Logs That Can Be Managed Using Web Image Monitor Logs that can be collected The following tables explain the items in the job log and access log that the machine creates when you enable log collection using Web Image Monitor. If you require log collection, use Web Image Monitor to configure it.
  • Page 661 Managing Log Files Job Log Item Log Type Attribute Content Scanner: Stored File Scanner: Stored File Details of stored scan files whose URLs were URL Link Sending URL Link Sending sent by e-mail. Printer: Printing Printer: Printing Details of normal print jobs. Printer: Locked Print Printer: Locked Print Log showing Locked Print documents...
  • Page 662 7. Managing the Machine Job Log Item Log Type Attribute Content Result Report Result Report Details of job results printed from the control Printing/E-mailing Printing/E-mailing panel or notified by e-mail. Scanner: TWAIN Scanner: TWAIN Details of stored scan files that were sent using Driver Scanning Driver Scanning Network TWAIN Scanner.
  • Page 663 Managing Log Files Access Log Item Log Type Attribute Content All Stored Files All Stored Files Details of deletions of all Document Server Deletion Deletion files. HDD Format HDD Format Details of hard disk formatting. Unauthorized Unauthorized Details of documents scanned with "Data Copying Copying security for copying".
  • Page 664 7. Managing the Machine Access Log Item Log Type Attribute Content Date/Time Change Date/Time Change Details of changes made to date and time settings. File Access Privilege File Access Privilege Log for changing the access privilege to the Change Change stored files.
  • Page 665: Attributes Of Logs You Can Download

    Managing Log Files "Access Violation" indicates the system has experienced frequent remote DoS attacks involving logon attempts through user authentication. Eco-friendly log information items Eco-friendly Log Item Log Type Attribute Content Main Power On Main Power On Log of when the main power switch is turned Main Power Off Main Power Off Log of when the main power switch is turned...
  • Page 666 7. Managing the Machine • Output Format: CSV (Comma-Separated Values) • File Names of Job Logs and Access Logs: "machine name +_log.csv" • File names for Eco-friendly Logs: "machine name+_ecolog.csv" Order of log entries Log entries are printed in ascending order according to Log ID. File structure The data title is printed in the first line (header line) of the file.
  • Page 667 Managing Log Files Item Content End Date/Time For a job log entry, indicates the end date and time of the operation. If the operation is still in progress, this will be blank. For an access log entry, indicates the same date and time as shown by "Result".
  • Page 668 7. Managing the Machine Item Content Status Indicates the status of an operation or event: • If "Completed" is displayed for a job log entry, the operation completed successfully; "Failed" indicates the operation was unsuccessful; "Processing" indicates the operation is still in progress. •...
  • Page 669 Managing Log Files Item Content Status The status of an operation or event is recorded. (For importing and exporting If importing or exporting is executed by another user, device information) "Importing/Exporting by Other User" is recorded. If a connection to an output destination fails, "Connection Failed with Remote Machine"...
  • Page 670 7. Managing the Machine Item Content Status Supplement If the status of a log is abnormal termination (Failed), the status is recorded. If it does not terminate abnormally, nothing is recorded. If a user cancels an operation, "Cancelled by User" is recorded.
  • Page 671 Managing Log Files Item Content Status Supplement If the number of pages that can be captured is exceeded, "Exceed Max. Stored Page (Image Area)" is recorded. (If the Source is a Stored File) If the hard disk capacity for capture is exceeded, "Hard Disk Full (Image Area)"...
  • Page 672 7. Managing the Machine Item Content Status Supplement If the number of jobs that can be received is exceeded, "Over Job Limit" is recorded. (If the Source is a Printer) If an illegal address or an address with 41 or more digits is specified, "Specifying Destination Error"...
  • Page 673 Managing Log Files Item Content Status Supplement If the accounting device is unplugged during operation, "External Charge Unit Disconnected" is recorded. (If the Target is Store) If the logged in user exceeds their paper usage limit, "Exceeded Print Volume Use Limitation" is recorded. If a time-out occurs, "Timeout"...
  • Page 674 7. Managing the Machine Item Content Status Supplement If a time-out occurs, "Timeout" is recorded. (If the Target is Send) If a document is deleted or an undelivered document exceeds its wait time and is deleted, "Transmission Failed (Data Deleted)" is recorded. If the user does not have permission to use a document or function, "No Privilege"...
  • Page 675 Managing Log Files Item Content User Entry ID Indicates the user's entry ID. This is a hexadecimal ID that identifies users who performed job or access log-related operations: For supervisors, only 0xffffff86 is available; for administrators, 0xffffff87, 0xffffff88, 0xffffff89, and 0xffffff8a are available. For general users, any value between 0x00000001 and 0xfffffeff is available.
  • Page 676 7. Managing the Machine Stored File Sending", "Printer: Stored File Printing", and "Fax: Stored File Downloading" (Job logs) and "File Storing" and "Stored File Deletion" (Access logs). Access log information items Item Content Access Log Type Indicates the type of access: "Authentication"...
  • Page 677 Managing Log Files Item Content Login User Type Indicates the type of login user: "User" indicates the logged in user was a registered general user. "Guest" indicates the logged in user was a guest user. "File Administrator" indicates the logged in user was a registered file administrator.
  • Page 678 7. Managing the Machine Item Content Lockout/Release The mode of operation access. "Lockout" indicates activation of password lockout; "Release" indicates deactivation of password lockout. Lockout Release Method "Manual" is recorded if the machine is unlocked manually. "Auto" is recorded if the machine is unlocked by the lockout release timer.
  • Page 679 Managing Log Files Item Content Collect Access Logs Indicates the status of the access log collection setting: "Active" indicates access log collection is enabled. "Inactive" indicates access log collection is disabled. "Not Changed" indicates no changes have been made to the access log collection setting.
  • Page 680 7. Managing the Machine Item Content Log Collect Level Indicates the level of log collection: "Level 1", "Level 2", or "User Settings". Encryption/Cleartext Indicates whether communication encryption is enabled or disabled: "Encryption Communication" indicates encryption is enabled; "Cleartext Communication" indicates encryption is not disabled.
  • Page 681 Managing Log Files Item Content Network Attack Status Indicates the attack status of the network: "Violation Detected" indicates an attack on the network was detected. "Recovered from Violation" indicates the network recovered from an attack. "Max. Host Capacity Reached" indicates the machine became inoperable due to the volume of incoming data reaching the maximum host capacity.
  • Page 682 7. Managing the Machine Item Content Parts Number Firmware module part number. Version Firmware version. Machine Data Encryption Key Indicates the type of encryption key operation performed: Operation "Back Up Machine Data Encryption Key" indicates an encryption key backup was performed. "Restore Machine Data Encryption Key"...
  • Page 683 Managing Log Files Item Content Access Result Indicates the results of logged operations: "Completed" indicates an operation completed successfully; "Failed" indicates an operation completed unsuccessfully. Job log information items Input information Item Content Source Indicates the source of the job file: "Scan File"...
  • Page 684 7. Managing the Machine Item Content Stored File ID Indicates the ID of data that is output as a store file. This is a decimal ID that identifies the stored file. Stored File Name If the Target Type is "Store", the file name of the stored file is recorded.
  • Page 685 Managing Log Files Item Content Power Mode (After) The power status of the machine (after state transition) is logged. When in standby, "Standby" is recorded. When in a low power state, "Low" is recorded. When in a silent state, "Night" is recorded. When the hard disk is running, "HDD On"...
  • Page 686 7. Managing the Machine Category/Attribute List Category Attribute Description User Lockout 1. Lockout 1. Whether the lockout is active Policy (Active) or inactive (Inactive) is 2. Number of Attempts before recorded. Lockout 2. The number of times a user may 3.
  • Page 687 Managing Log Files Category Attribute Description Device Certificate 1. Operation Mode 1. The type of operation is recorded. 2. Certificate No. "Create" is recorded when a 3. Certificate No. (XXX) certificate is created. (XXX) is replaced by one of the "Delete"...
  • Page 688 7. Managing the Machine Category Attribute Description IPsec 1. IPsec 1. Whether IPsec is active (Active) or inactive (Inactive) is 2. Encryption Key Auto recorded. Exchange / Encryption Key Manual Exchange: Setting1-4: 2. The remote address is Remote Address recorded. 3.
  • Page 689 Managing Log Files Category Attribute Description S/MIME 1. Operation Mode 1. The mode of operation is recorded. 2. When Sending E-mail by Scanner 2. The signature is recorded when the scanner is used for sending 3. When Transferring by Fax e-mail.
  • Page 690: Customizing The Control Panel

    7. Managing the Machine Customizing the Control Panel Configurations of settings such as arrangement of icons on the home screen or allocation of function keys to functions can be made to suit the user. Configuring the Home Screen for Individual Users This allows each user to use their own home screen.
  • Page 691 Customizing the Control Panel • The home information for each user is maintained even when Users Own Home Screen is set to [Prohibit]. When the setting is changed back to [Allow], the information can be used again. Warnings about Using User's Own Home Screens Consider these warnings before using this function.
  • Page 692: Configuring The Browser Functions

    7. Managing the Machine Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 693 Configuring the Browser Functions Press [Browser Default Setting]. Press the setting you want to change, and change the setting. Press [OK]. Log out. Browser default settings Home Screen by User Specify the URL of your home screen. Cache File Specify whether or not to enable cache files. When using cache files, specify a size within a range between 1024 and 10240 KB.
  • Page 694: Restricting User Browser Functions

    7. Managing the Machine When using a proxy server, specify "Proxy Server Name", "Proxy Port", "Proxy User Name", "Proxy Password", and "Exception Addresses". Default: [Off] User Agent Specify the user agent. Enter the user agent's name using the keyboard. Default HTTP Request Method Specify the type of HTTP request method.
  • Page 695: Checking The Usage Status Of The Browser Functions

    Configuring the Browser Functions Bookmarks by User Specify whether or not to enable the use of bookmarks. Default: [Allow] Use Proxy Server Specify whether or not to enable a proxy server. Default: [Allow] Keep the History by User Specify whether or not to enable the history to be kept. Default: [Allow] Screen Settings by User Specify whether or not to enable the size of the window displayed on the control panel.
  • Page 696 7. Managing the Machine • "This site has a security problem. Verification of the server to connect to cannot be performed." • "This site has a security problem. The http subcontents are included in the https site." *1 The connected Web site contains non-encrypted data.
  • Page 697: Managing Device Information

    Managing Device Information Managing Device Information This can be set by an administrator with privileges to manage everything — devices, users, networks and files. The device information of a machine can be exported to an outside device as a device setting information file.
  • Page 698: Exporting Device Information

    7. Managing the Machine Exporting Device Information When exporting device information from the control panel, the data is saved on an SD card. Insert an SD card into the media slot on the side of the control panel. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 699: Importing Device Information

    Managing Device Information • Information can also be exported from Web Image Monitor. When exporting from Web Image Monitor, device information can be stored on the hard disk of the computer you are using. For details, see Web Image Monitor Help. •...
  • Page 700: Periodically Importing Device Information

    7. Managing the Machine • Select whether to [Include] or [Exclude] the "Device Unique Information". "Device Unique Information" includes the IP address, host name, fax number, etc. • Specify the encryption key if the settings file was encrypted during export. Press [Run Import].
  • Page 701: Manually Importing The Device Setting Information File Of A Server

    Managing Device Information Configure the import conditions. • Select the source for importing files. Configure settings such as the URL, user name, password, etc., using the detail settings of the server. • Select the frequency for importing device setting information files and set the time used for a periodic import at the specified time.
  • Page 702: Printing Log Files

    7. Managing the Machine Press [Device Setting Information: Run Import (Server)]. Press [OK]. Press [Exit]. The machine restarts. • If importing failed or if some of the device information was not imported, the content of the logs can be printed. Printing Log Files The logs can be printed when either exporting or importing fails.
  • Page 703: Managing Eco-Friendly Counter

    Managing Eco-friendly Counter Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter is the ratio of use of color, two-sided and multi-page printing to the total number of output pages. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 704: Clearing A Machine's Eco-Friendly Counter

    7. Managing the Machine If you select "User Message", the machine administrator can enter a free message to be displayed. Default: [Fixed Message 1] Display Information Screen Set up whether or not to display the eco-friendly index with information at login. Default: [Off] Display Time Set up the timing for displaying information.
  • Page 705 Managing Eco-friendly Counter • The eco-friendly counter for all users is cleared. The eco-friendly counter for individual users cannot be cleared.
  • Page 706: Specifying The Extended Security Functions

    7. Managing the Machine Specifying the Extended Security Functions In addition to providing basic security through user authentication and administrator specified access limits on the machine, security can also be increased by encrypting transmitted data and data in the Address Book. Log in from the control panel as an administrator with privileges.
  • Page 707 Specifying the Extended Security Functions Specify the encryption strength for sending jobs from the driver to the machine. The machine confirms the encryption strength of the password appended to a job and processes it. If [Simple Encryption] is specified, all jobs that support user authentication are accepted. If [DES] is specified, jobs encrypted with DES or AES are accepted.
  • Page 708 7. Managing the Machine Default: [Off] Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) This can be specified by the user administrator. The available fax and scanner destinations are limited to the destinations registered in the Address Book. A user cannot directly enter the destinations for transmission.
  • Page 709 Specifying the Extended Security Functions • Routing Received Documents For details, see "Reception Functions", Fax. Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions.
  • Page 710 7. Managing the Machine If you select [Prohibit], the machine stops during startup when a firmware structure change is detected and a message requesting administrator login is displayed. After the machine administrator logs in, the machine finishes startup with the updated firmware. The administrator can confirm if the updated structure change is permissible or not by checking the firmware version displayed on the control panel screen.
  • Page 711 Specifying the Extended Security Functions In "Simultns. Access Host Limit", you can specify the limit number of hosts accessing the machine at one time. If the number of access exceeds the setting, monitoring becomes unavailable and the detected unavailability is recorded in the Log. •...
  • Page 712 7. Managing the Machine • Measurement Time Specify the interval to count the number of repeated failed authentication attempts. When the measurement time is over, the logged counts of failed authentication attempts are cleared. Use the number keys to enter the time between "1" and "10", and then press [ ]. Default: [5] •...
  • Page 713 Specifying the Extended Security Functions Specify the monitoring interval of "Managed User Host Limit" and "Password Entry Host Limit". Use the number keys to enter the time between "1" and "10", and then press [ ]. Default: [3] • Off Default: [Off]...
  • Page 714: Other Security Functions

    7. Managing the Machine Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 715: Scanner Function

    Other Security Functions Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 716: Limiting Machine Operations To Customers Only

    7. Managing the Machine Limiting Machine Operations to Customers Only The machine can be set so that operation is impossible without administrator authentication. The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the Address Book by a service representative. We maintain strict security when handling customers' data.
  • Page 717 Limiting Machine Operations to Customers Only Press [Yes]. Log out.
  • Page 718: Additional Information For Enhanced Security

    7. Managing the Machine Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 719 Additional Information for Enhanced Security Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See p.262 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See p.262 "Specifying the Extended Security Strength Functions". Administrator Extended Security Access Privilege Tools Authenticate Current Job...
  • Page 720: Settings You Can Configure Using Web Image Monitor

    7. Managing the Machine Scanner Features Item Setting Initial Settings Menu Protect Level 2 See p.78 "Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 721 Additional Information for Enhanced Security Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see p.70 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 722: Settings You Can Configure When Ipsec Is Available/Unavailable

    7. Managing the Machine Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network. Control panel settings System Settings Item Setting Interface Settings IPsec...
  • Page 723 Additional Information for Enhanced Security Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. • Sending and receiving faxes without using IP-Fax When sending faxes, specify destinations by fax number, Internet Fax destination, e-mail address, or folder destination.
  • Page 724 7. Managing the Machine...
  • Page 725: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If Authentication Fails This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 726 8. Troubleshooting Messages Cause Solutions "Authentication has failed." The entered login user name or Ask the user administrator for login password is incorrect. the correct login user name and login password. See the error codes below for possible solutions: B, W, L, I 0104-000 B, W, L, I 0206-003 W, L, I 0406-003 "Authentication has failed."...
  • Page 727: If An Error Code Is Displayed

    If Authentication Fails Messages Cause Solutions "Failed to obtain URL." The machine is connected to the Make sure the UA service is server, but the UA service is not specified correctly. responding properly. "Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication the server.
  • Page 728 8. Troubleshooting Basic authentication Error Code Cause Solution B0103-000 A TWAIN operation occurred Make sure no other user is logged during authentication. on to the machine, and then try again. B0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly.
  • Page 729 If Authentication Fails Error Code Cause Solution B0207-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. B0208-000 The account is locked because you Ask the user administrator to unlock have reached the maximum number the account.
  • Page 730 8. Troubleshooting Error Code Cause Solution W0206-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log in again.
  • Page 731 If Authentication Fails Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Specify the IP address in the domain name and confirm that authentication is successful. If authentication was successful: 1. If the top-level domain name is specified in the domain name (such as domainname.xxx.com), make sure that DNS is specified in "Interface Settings".
  • Page 732 8. Troubleshooting Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Under Windows 7, if the Windows firewall is activated, create a firewall rule in the "Advanced settings" on the "System and security" control panel, and then authorize ports 137 and 139. Under Windows XP, if the Windows firewall is activated, open the properties for "Network...
  • Page 733 If Authentication Fails Error Code Cause Solution W0406-104 5. Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name and corresponding domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 734 8. Troubleshooting Error Code Cause Solution W0400-105 2. Current settings do not allow Make sure the user group's group group retrieval. scope is set to "Global Group" and the group type is set to "Security" in group properties. Make sure the account has been added to user group.
  • Page 735 If Authentication Fails Error Code Cause Solution W0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log on again.
  • Page 736 8. Troubleshooting Error Code Cause Solution L0104-000 Failed to encrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key: Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 737 If Authentication Fails Error Code Cause Solution L0307-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. L0406-200 Authentication cannot be completed Wait a few minutes and then try because of the high number of again.
  • Page 738 8. Troubleshooting Error Code Cause Solution L0406-202 2. A login user name or password 1. Make sure the login user name error occurred. and password are entered correctly. L0406-203 2. Make sure a usable login name is registered on the machine. Authentication will fail in the following cases: If the login user name contains a...
  • Page 739 If Authentication Fails Error Code Cause Solution L0406-204 Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name, and supporting domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 740 8. Troubleshooting Error Code Cause Solution L0511-000 The authentication server login name 1. Delete the old, duplicated name is the same as a user name already or change the login name. registered on the machine. (Names 2. If the authentication server has just are distinguished by the unique been changed, delete the old name attribute specified in the LDAP...
  • Page 741 If Authentication Fails Error Code Cause Solution I0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key: Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 742 8. Troubleshooting Error Code Cause Solution I0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If account name was entered incorrectly, enter it correctly and log in again.
  • Page 743: If The Machine Cannot Be Operated

    If Authentication Fails Error Code Cause Solution I0606-004 Authentication failed because the Do not use "other", "admin", user name contains language that "supervisor" or "HIDE*" in general cannot be used by general users. user accounts. I0612-005 Authentication failed because no Ask the user administrator to delete more users can be registered.
  • Page 744 8. Troubleshooting Condition Cause Solution Cannot connect with the The SNMPv3 account, Specify the account, password TWAIN driver. password, and encryption and the encryption algorithm of algorithm do not match settings SNMPv3 registered in the specified on this machine. machine using network connection tools.
  • Page 745 If Authentication Fails Condition Cause Solution Cannot access the machine "Driver Encryption Set "Driver Encryption using ScanRouter EX Key:Encryption Strength" is not Key:Encryption Strength" to Professional V3 / ScanRouter set correctly. Alternatively, [Simple Encryption]. EX Enterprise V2. "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", although the required certificate install the server certificate in the...
  • Page 746 8. Troubleshooting Condition Cause Solution Cannot send e-mail from the The following are possible • Install a user certificate scanner. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 747 If Authentication Fails Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination • Cannot select an address. certificate) has expired.
  • Page 748 8. Troubleshooting Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet stored files do not appear. been disabled without "All and select [All Users] as the Users" being selected for user access permission setting of the access to stored files.
  • Page 749: Checking Operation Privileges

    9. Checking Operation Privileges This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. List of Operation Privileges for Settings Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 750 9. Checking Operation Privileges • When [Menu Protect] is set to [Off], users can execute, change and read all of the settings of each function.
  • Page 751: System Settings

    System Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". General Features Settings User Mach N/W File Unset Program / Change / Delete User Text Panel Key Sound Warm-up Beeper Copy Count Display Function Priority...
  • Page 752 9. Checking Operation Privileges Tray Paper Settings Settings User Mach N/W File Unset Paper Tray Priority: Copier Paper Tray Priority: Facsimile Paper Tray Priority: Printer Tray Paper Size: Tray 2-4 Printer Bypass Paper Size Paper Type: Bypass Tray Paper Type: Tray 1-4 Paper Type: LCT Tray Paper Size: LCT Custom Size...
  • Page 753 System Settings Settings User Mach N/W File Unset Set Time Auto Logout Timer Weekly Timer Code Weekly Timer: Monday-Sunday Interface Settings Network Settings User Mach N/W File Unset Machine IPv4 Address IPv4 Gateway Address Machine IPv6 Address IPv6 Gateway Address IPv6 Stateless Address Autoconfiguration DHCPv6 Configuration DNS Configuration...
  • Page 754 9. Checking Operation Privileges Settings User Mach N/W File Unset LAN Type Ping Command – – – Permit SNMPv3 Communication Permit SSL / TLS Communication Host Name Machine Name IEEE 802.1X Authentication for Ethernet Restore IEEE 802.1X Authentication to – –...
  • Page 755 System Settings Settings User Mach N/W File Unset Wireless LAN Signal Restore Factory Defaults – – – – File Transfer Settings User Mach N/W File Unset Delivery Option Capture Server IPv4 Address Fax RX File Transmission SMTP Server SMTP Authentication POP before SMTP Reception Protocol POP3 / IMAP4 Settings...
  • Page 756 9. Checking Operation Privileges *4 Passwords cannot be read. Administrator Tools Settings User Mach N/W File Unset Address Book Management Address Book: Program / Change / Delete Group Address Book: Change Order – – – – Print Address Book: Destination List –...
  • Page 757 System Settings Settings User Mach N/W File Unset Key Counter Management External Charge Unit Management Enhanced External Charge Unit Management Driver Encryption Key – – – – Driver Encryption Key:Encryption Strength Restrict Display of User Information Encrypt User Custom Settings & Address Book Enhance File Protection Restrict Use of Destinations (Fax)
  • Page 758 9. Checking Operation Privileges Settings User Mach N/W File Unset Auto Delete File in Document Server Delete All Files in Document Server – – – – Capture Priority – – – Capture: Delete All Unsent Files – – – – Capture: Ownership –...
  • Page 759 System Settings Settings User Mach N/W File Unset Program / Delete Device Certificate – – Device Setting Information: Import Setting – – – – – – (Server) Device Setting Information: Run Import – – – – – – (Server) Device Setting Information: Export (Memry –...
  • Page 760 9. Checking Operation Privileges *5 Only changing headings and user searches are possible. *6 The items that can be executed, changed and read differ according is set to access privilege. *7 Can only be cleared. *8 Can only be printed. *9 Cannot be changed when using the individual authentication function.
  • Page 761: Edit Home

    Edit Home Edit Home When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Edit Home Settings User Mach N/W File Unset Edit Icons: Move Icon – – – – Edit Icons: Delete Icon –...
  • Page 762: Maintenance

    9. Checking Operation Privileges Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Maintenance Settings User Mach N/W File Unset Auto Colour Calibration – – – – Colour Registration – –...
  • Page 763: Copier / Document Server Features

    Copier / Document Server Features Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Features Settings User Mach N/W File Lv.1 Lv.2 Auto Image Density Priority Original Type Priority Original Photo Type Priority Original Type Display...
  • Page 764 9. Checking Operation Privileges Edit Settings User Mach N/W File Lv.1 Lv.2 Front Margin: Left / Right Back Margin: Left / Right Front Margin: Top / Bottom Back Margin: Top / Bottom 1 Sided 2 Sided Auto Margin:TtoT 1 Sided 2 Sided Auto Margin:TtoB Erase Border Width Erase Original Shadow in Combine...
  • Page 765 Copier / Document Server Features Preset Stamp Settings User Mach N/W File Lv.1 Lv.2 Stamp Language Stamp Priority Stamp Format: COPY Stamp Format: URGENT Stamp Format: PRIORITY Stamp Format: For Your Info. Stamp Format: PRELIMINARY Stamp Format: For Internal Use Only Stamp Format: CONFIDENTIAL Stamp Format: DRAFT Stamp Colour: COPY...
  • Page 766 9. Checking Operation Privileges User Stamp Settings User Mach N/W File Lv.1 Lv.2 Program / Delete Stamp Stamp Format: 1-4 Stamp Colour: 1-4 Date Stamp Settings User Mach N/W File Lv.1 Lv.2 Format Font Size Superimpose Stamp Colour Stamp Setting *2 Only adjustments to print position can be set.
  • Page 767 Copier / Document Server Features Settings User Mach N/W File Lv.1 Lv.2 Stamp Position:-1-,-2-... Stamp Position:P.1,P.2... Stamp Position:1,2... Stamp Position:1-1,1-2... Superimpose Stamp Colour Page Numbering Initial Letter *3 Only adjustments to print position can be set. The print position itself cannot be configured. Stamp Text Settings User...
  • Page 768 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Memory Full Auto Scan Restart Letterhead Setting Staple Position Punch Type Simplified Screen: Finishing Types Adjust Colour Image Settings User Mach N/W File Lv.1 Lv.2 Background Density of ADS (Full Colour) Colour Sensitivity A.C.S.
  • Page 769: Facsimile Features

    Facsimile Features Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Quick Operation Key 1-3 Switch Title Search Destination Communication Page Count Adjust Sound Volume Box Setting –...
  • Page 770 9. Checking Operation Privileges Reception Settings Settings User Mach N/W File Lv.1 Lv.2 Reception File Settings Switch Reception Mode Program Special Sender – – – – – Program Special Sender: Print List – – – – – Stored Reception File User Setting SMTP RX File Delivery Settings 2 Sided Print Checkered Mark...
  • Page 771 Facsimile Features Settings User Mach N/W File Lv.1 Lv.2 Program Fax Information Enable H.323 Enable SIP H.323 Settings SIP Settings Program / Change / Delete Gateway Menu Protect E-mail Setting Folder Setting File Type to Transfer Security for E-mail TX Results...
  • Page 772: Printer Functions

    9. Checking Operation Privileges Printer Functions When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Printer Functions Settings User Mach N/W File Lv.1 Lv.2 Print from Memory Storage Device – – – –...
  • Page 773: Printer Features

    Printer Features Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. List / Test Print Settings User Mach N/W File Lv.1 Lv.2 Multiple Lists – – – Configuration Page – –...
  • Page 774 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Store and Skip Errored Job Memory Overflow Job Separation Rotate by 180 Degrees Print Compressed Data Duplex Copies Blank Page Print Reserved Job Waiting Time Printer Language Sub Paper Size Page Size Letterhead Setting Tray Setting Priority...
  • Page 775 Printer Features Settings User Mach N/W File Lv.1 Lv.2 I/O Timeout PCL Menu Settings User Mach N/W File Lv.1 Lv.2 Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution PS Menu Settings...
  • Page 776 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Process Colour Model Orientation Auto Detect PDF Menu Settings User Mach N/W File Lv.1 Lv.2 Change PDF Password PDF Group Password Reverse Order Printing Resolution Toner Saving Colour Setting Colour Profile Process Colour Model Orientation Auto Detect...
  • Page 777: Scanner Features

    Scanner Features Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title Update Delivery Server Destination List – – – –...
  • Page 778 9. Checking Operation Privileges Send Settings Settings User Mach N/W File Lv.1 Lv.2 Compression (Black & White) Compression Method (Black & White) Compression (Grey Scale / Full Colour) Compression Method for High Compression High Compression PDF Level Max. E-mail Size Divide &...
  • Page 779: Browser Features

    Browser Features Browser Features Settings User Mach File Unset Browser Default Settings – – – Settings par Users – – – View Logs – – –...
  • Page 780: Extended Feature Settings

    9. Checking Operation Privileges Extended Feature Settings Extended Feature Settings Settings User Mach N/W File Unset Startup Setting Install Uninstall Extended Feature Info Administrator Tools – – – – – Add. Program Startup Setting Install Add. Program Uninstall Add. Program Add.
  • Page 781: Web Image Monitor: Job

    Web Image Monitor: Job Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. Job List Settings User Mach N/W File Unset Current/Waiting Jobs: Change Order – – – – – Current/Waiting Jobs: Suspend Printing/ –...
  • Page 782 9. Checking Operation Privileges Settings User Mach N/W File Unset Fax Remote Send History – – – Scanner Remote Send History – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 783: Web Image Monitor: Device Settings

    Web Image Monitor: Device Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". System Settings User Mach N/W File Unset Device Name...
  • Page 784 9. Checking Operation Privileges Function Key Allocation/Function Priority Settings User Mach N/W File Unset Function Key Allocation Function Priority Paper Settings User Mach N/W File Unset Tray 1-4 Large Capacity Tray Bypass Tray Date/Time Settings User Mach N/W File Unset Set Date Set Time SNTP Server Name...
  • Page 785 Web Image Monitor: Device Settings Settings User Mach N/W File Unset Printer Auto Reset Timer Auto Logout Timer Weekly Timer Code Weekly Timer: Monday-Sunday Logs Settings User Mach N/W File Unset Job Log Access Log Eco-friendly Logs Transfer Logs Encrypt Logs Classification Code Delete All Logs –...
  • Page 786 9. Checking Operation Privileges Settings User Mach N/W File Unset E-mail Reception Interval – – – Max. Reception E-mail Size – – – E-mail Storage in Server – – – SMTP Server Name – – – SMTP Port No. – –...
  • Page 787 Web Image Monitor: Device Settings Settings User Mach N/W File Unset E-mail Notification User Name – – – – E-mail Notification Password – – – – *2 Passwords cannot be read. Auto E-mail Notification Settings User Mach N/W File Unset Notification Message Groups to Notify Select Groups/Items to Notify...
  • Page 788 9. Checking Operation Privileges *2 Passwords cannot be read. User Authentication Management Settings User Mach N/W File Unset User Authentication Management Printer Job Authentication Settings User Code Authentication Settings Basic Authentication Settings Windows Authentication Settings Group Settings for Windows Authentication LDAP Authentication Settings Integration Server Authentication Settings Group Settings for Integration Server...
  • Page 789 Web Image Monitor: Device Settings Program/Change Administrator Settings User Mach N/W File Unset User Administrator – – Machine Administrator – – Network Administrator – – File Administrator – – Login User Name – – Login Password – – Encryption Password –...
  • Page 790 9. Checking Operation Privileges Firmware Update Settings User Mach N/W File Unset Update – – – – – Firmware Version – – – – – Kerberos Authentication Settings User Mach N/W File Unset Encryption Algorithm – – – – – Realm 1-5 –...
  • Page 791 Web Image Monitor: Device Settings Import Test Settings User Mach N/W File Unset Start – – – – – – *1 R/W is the administrator with all privileges that include user administrator, machine administrator, network administrator, and file administrator privileges. Import/Export Device Setting Information Settings User...
  • Page 792: Web Image Monitor: Printer

    9. Checking Operation Privileges Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Basic Settings Settings User Mach N/W File Lv.1 Lv.2 Print Error Report...
  • Page 793 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 Edge to Edge Print Default Printer Language Tray Switching List/Test Print Lock Extended Auto Tray Switching Virtual Printer Restrict Direct Print Jobs Initial screen switch setting Host Interface PCL Menu PS Menu PDF Menu Unauthorized Copy Prevention...
  • Page 794 9. Checking Operation Privileges Tray Parameters (PS) Settings User Mach N/W File Lv.1 Lv.2 Tray Parameters (PS) – – – – – Virtual Printer Settings Settings User Mach N/W File Lv.1 Lv.2 Virtual Printer Name Protocol Print Error Report Job Separation Rotate by 180 Degrees Memory Usage Duplex...
  • Page 795 Web Image Monitor: Printer PDF Temporary Password Settings User Mach N/W File Lv.1 Lv.2 PDF Temporary Password – – – – PDF Group Password Settings User Mach N/W File Lv.1 Lv.2 PDF Group Password – – – – – PDF Fixed Password Settings User Mach N/W...
  • Page 796: Web Image Monitor: Fax

    9. Checking Operation Privileges Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Initial Settings Settings User Mach N/W File Lv.1 Lv.2 Closed Network Code...
  • Page 797 Web Image Monitor: Fax Reception File Settings Settings User Mach N/W File Lv.1 Lv.2 Output Mode Switch Timer – – – – – Prohibit Auto Print – – – – – Print Standby to Print Files – – – – –...
  • Page 798: Web Image Monitor: Scanner

    9. Checking Operation Privileges Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title...
  • Page 799 Web Image Monitor: Scanner Settings User Mach N/W File Lv.1 Lv.2 Compression Method for High Compression Max. E-mail Size Divide & Send E-mail Insert Additional E-mail Info No. of Digits for Single Page Files Stored File E-mail Method Default E-mail Subject *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user privilege becomes R/W.
  • Page 800 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Send File Type – – –...
  • Page 801: Web Image Monitor: Interface

    Web Image Monitor: Interface Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Interface Settings Settings User Mach N/W File Unset LAN Type...
  • Page 802 9. Checking Operation Privileges Settings User Mach N/W File Unset Security Method WEP Authentication – – – – WEP Key Number WEP Key WPA Authentication Method WPA-PSK/WPA2-PSK...
  • Page 803: Web Image Monitor: Network

    Web Image Monitor: Network Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". IPv4 Settings User Mach N/W File Unset IPv4 Host Name...
  • Page 804 9. Checking Operation Privileges Settings User Mach N/W File Unset Stateless Address Manual Configuration Address DHCPv6 DHCPv6 Address DDNS LLMNR Details NetWare Settings User Mach N/W File Unset NetWare Netware Print Settings NCP Delivery Settings User Mach N/W File Unset Protocol Workgroup Name Computer Name...
  • Page 805 Web Image Monitor: Network SNMP Settings User Mach N/W File Unset SNMP – – – – – Protocol – – – – – SNMPv1,v2 Setting – – – – – Community – – – – – SNMPv3 Settings User Mach N/W File Unset SNMP...
  • Page 806 9. Checking Operation Privileges Settings User Mach N/W File Unset Local Hostname Details Print Order Priority System Log Settings User Mach N/W File Unset System Log –...
  • Page 807: Web Image Monitor: Security

    Web Image Monitor: Security Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Network Security – – – – – Access Control – – – – – IPP Authentication – – – –...
  • Page 808: Web Image Monitor: @Remote

    9. Checking Operation Privileges Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Setup RC Gate – – – – – Update RC Gate Firmware – – – – – RC Gate Proxy Server –...
  • Page 809: Web Image Monitor: Webpage

    Web Image Monitor: Webpage Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset Webpage Language Set URL Target of Link Page Set Help URL Target WSD/UPnP Setting...
  • Page 810: Web Image Monitor: Extended Feature Settings

    9. Checking Operation Privileges Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Startup Setting – – – – – Extended Feature Info Install – – – – – Uninstall –...
  • Page 811: Web Image Monitor: Address Book

    Web Image Monitor: Address Book Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset Add User – – – Change – – – Delete – – – Add Group – – – Data Carry-over Setting for Address Book Auto- –...
  • Page 812: Web Image Monitor: Reset Printer Job

    9. Checking Operation Privileges Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset Reset Current Job – – – – – Reset All Jobs – – – – –...
  • Page 813: Web Image Monitor: Reset The Machine

    Web Image Monitor: Reset the Machine Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset Reset the Machine –...
  • Page 814: Web Image Monitor: Device Home Management

    9. Checking Operation Privileges Web Image Monitor: Device Home Management These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset Edit Icons Restore Default Icon Display –...
  • Page 815: Web Image Monitor: Customize Screen Per User

    Web Image Monitor: Customize Screen per User Web Image Monitor: Customize Screen per User Users can change only their own settings. Settings User Mach File Unset Function Priority per User – – – –...
  • Page 816: Web Image Monitor: Document Server

    9. Checking Operation Privileges Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see p.375 "List of Operation Privileges for Stored Files". Settings User Mach File...
  • Page 817: Web Image Monitor: Fax Received File

    Web Image Monitor: Fax Received File Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset Print – – – – Delete – – – – Download – – – – Edit detailed information –...
  • Page 818: Web Image Monitor: Printer: Print Jobs

    9. Checking Operation Privileges Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 819: List Of Operation Privileges For Stored Files

    List of Operation Privileges for Stored Files List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 820 9. Checking Operation Privileges Settings Read Edit Full Owner File Insert File – – – Delete Pages – – – Print Specified Page – Duplicate File – Delete File – – *1 The owner can change operation privileges.
  • Page 821: List Of Operation Privileges For Address Books

    List of Operation Privileges for Address Books List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 822 9. Checking Operation Privileges Settings Read Edit Full Entry User Login Password – – – – SMTP Authentication – – – – Folder Authentication – LDAP Authentication – – – – Available Functions – – – – Print Volum. Use Limit. –...
  • Page 823 List of Operation Privileges for Address Books Settings Read Edit Full Entry User Fax Header Label Insertion E-mail Settings Read Edit Full Entry User E-mail Address Use E-mail Address for Send via SMTP Server Folder Settings Read Edit Full Entry User SMB/FTP/NCP SMB: Path...
  • Page 824 9. Checking Operation Privileges • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 825: Trademarks

    Trademarks Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. ®...
  • Page 826 9. Checking Operation Privileges ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ®...
  • Page 827: Index

    INDEX Erase All Memory..........Error code............Access Control............. Error message............Access permission for stored files...... ESP Protocol............Address Book access permission......Extended security functions........ Administrator............Administrator privileges........Administrator registration........Firmware validity..........AH Protocol..........149, 150 AH Protocol + ESP Protocol....... 149, 150 IEEE 802.1X............
  • Page 828 Operational issues..........Windows authentication........Password for stored files........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax).. 75, 264 Restrict Adding of User Destinations (Scanner). Restrict Display of User Information....
  • Page 830 D143-7040 © 2011...

Table of Contents