Table of Contents

Advertisement

Printed in China
EN
US
D127-7504
Read This First
Manuals Provided with This Machine
Safety Information
Information for This Machine
Appendix
For information not in this manual, refer to
the HTML/PDF files on the supplied
CD-ROM.
Read this manual carefully before you use this machine and keep
it handy for future reference. For safe and correct use, be sure to
read the Safety Information in this manual before using the
machine.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MP 301sp and is the answer not in the manual?

Questions and answers

Summary of Contents for Aficio MP 301sp

  • Page 1 Read This First Manuals Provided with This Machine Safety Information Information for This Machine Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 2: Table Of Contents

    TABLE OF CONTENTS Introduction.................................3 How to Read the Manuals..........................4 Symbols Used in the Manuals........................4 Disclaimer................................4 Notes................................4 Machine Types...............................5 1. Manuals Provided with This Machine Manuals for This Machine..........................7 Manuals List..............................10 On-screen Operating Instructions........................11 Formats of the Operating Instructions......................11 Reading the HTML Manuals on the CD-ROM..................11 Installing and Opening the HTML Manuals....................12 Reading the PDF Manuals on the CD-ROM....................12 2.
  • Page 3 Notes to Canadian Users of Facsimile Unit....................35 Remarques à l'attention des utilisateurs canadiens de l'unité Fax............35 ENERGY STAR Program..........................36 Energy Saving Functions..........................37 Notes to users in the state of California (Notes to Users in USA)..............38 4. Appendix Trademarks...............................39...
  • Page 4: Introduction

    Introduction Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in this manual before using the machine.
  • Page 5: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 6: Machine Types

    Machine Types Check the type of your machine before reading the manuals. • Type 1: MP 301SP/Aficio MP 301SP • Type 2: MP 301SPF/Aficio MP 301SPF Certain types might not be available in some countries. For details, please contact your local dealer.
  • Page 8: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 9 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 10 Manuals for This Machine • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian. • The following software products are referred to using general names: Product name General name ScanRouter EX Professional the ScanRouter delivery software ScanRouterEX Enterprise *1 The ScanRouter EX Professional and ScanRouterEX Enterprise are no longer available for sale.
  • Page 11: Manuals List

    1. Manuals Provided with This Machine Manuals List Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided User Guide Read This First Easy Search Getting Started Paper Specifications and Adding Paper Convenient Functions Maintenance and Specifications Troubleshooting Copy/ Document Server Print Scan Connecting the Machine/ System...
  • Page 12: On-Screen Operating Instructions

    On-screen Operating Instructions On-screen Operating Instructions This chapter describes the on-screen operating instructions of this machine. The on-screen operating instructions are included in the supplied manual CD-ROM. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 13: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 14 On-screen Operating Instructions Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. • To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your computer.
  • Page 15 1. Manuals Provided with This Machine...
  • Page 16: Safety Information

    2. Safety Information This chapter describes the safety precautions. Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury. Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or moderate injury or damage to property.
  • Page 17: Safety Precautions To Be Followed

    2. Safety Information Safety Precautions to Be Followed This section explains safety precautions that should always be followed when using this machine. Environments where the machine can be used This section explains safety precautions about environments where the machine can be used. •...
  • Page 18: Handling Power Cords And Power Cord Plugs

    Safety Precautions to Be Followed • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. Handling power cords and power cord plugs This section explains safety precautions about handling power cords and power cord plugs. •...
  • Page 19 2. Safety Information • It is dangerous to handle the power cord plug with wet hands. Doing so could result in electric shock. • If the power cord is damaged and its inner wires are exposed or broken, contact your service representative for a replacement.
  • Page 20: Handling The Main Machine

    Safety Precautions to Be Followed • When disconnecting the power cord from the wall outlet, always pull the plug, not the cord. Pulling the cord can damage the power cord. Use of damaged power cords could result in fire or electric shock. •...
  • Page 21 2. Safety Information • The following explains the warning messages on the plastic bag used in this product's packaging. • Keep the polythene materials (bags, etc.) supplied with this machine away from babies and small children at all times. Suffocation can result if polythene materials are brought into contact with the mouth or nose.
  • Page 22: Handling The Machine's Interior

    Safety Precautions to Be Followed Handling the machine's interior This section explains safety precautions about handling the machine's interior. • Do not remove any covers or screws other than those explicitly mentioned in this manual. Inside this machine are high voltage components that are an electric shock hazard and laser components that could cause blindness.
  • Page 23: Handling The Machine's Supplies

    2. Safety Information Handling the machine's supplies This section explains safety precautions about handling the machine's supplies. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame. •...
  • Page 24 Safety Precautions to Be Followed • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible. •...
  • Page 25: Safety Labels Of This Machine

    2. Safety Information Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated. Main unit CMV607 CMV603...
  • Page 26 Safety Labels of This Machine CMV608 CMV604 The machine weighs approximately 26 kg (57.4 lb.). When moving the machine, use the inset grips on both sides, and lift slowly in pairs. Paper trays (when one paper tray unit are installed) CMV609...
  • Page 27 2. Safety Information CMV610 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. CMV611 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 28: Power Switch Symbols

    Safety Labels of This Machine CMV610 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. CMV611 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 29 2. Safety Information...
  • Page 30: Information For This Machine

    3. Information for This Machine This chapter describes laws and regulations related to this machine. Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 31: Laser Safety

    3. Information for This Machine Laser Safety CDRH Regulations This equipment complies with requirements of 21 CFR subchapter J for class I laser products. This equipment contains AlGaAs laser diode, 12 milliwatts, 775–790 nanometer wavelength for each emitter. The beam divergence angle is 22 degrees (minimum) and 33 degrees (maximum) in the vertical direction, and 6 degrees (minimum) and 12 degrees (maximum) in the horizontal direction, and laser beams are generated in Continuous Wave (CW) mode.
  • Page 32: Notes To Usa Users Of Fcc Requirements

    Notes to USA Users of FCC Requirements Notes to USA Users of FCC Requirements Part 15 of the FCC Rules Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 33 3. Information for This Machine 3. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant.
  • Page 34 Notes to USA Users of FCC Requirements transmission, the date and time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual.
  • Page 35: Important Safety Instructions For Facsimile Unit

    3. Information for This Machine Important Safety Instructions for Facsimile Unit When using your telephone equipment, basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons, including the following: • Do not use this product near water, for example, near a bath tub, wash bowl, kitchen sink or laundry tub, in a wet basement or near a swimming pool.
  • Page 36: Notes To Canadian Users Of Facsimile Unit

    Notes to Canadian Users of Facsimile Unit Notes to Canadian Users of Facsimile Unit This product meets the applicable Industry Canada technical specifications. The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.
  • Page 37: Energy Star Program

    3. Information for This Machine ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ® ENERGY STAR Program.
  • Page 38: Energy Saving Functions

    Energy Saving Functions Energy Saving Functions To reduce its power consumption, this machine has the following functions: Sleep mode • If this machine remains idle for a specified period or when the [Energy Saver] key is pressed, it enters Sleep mode to reduce its electrical consumption. •...
  • Page 39: Notes To Users In The State Of California (Notes To Users In Usa)

    3. Information for This Machine Notes to users in the state of California (Notes to Users in USA) Perchlorate Material - special handling may apply, See www.dtsc.ca.gov/hazardouswaste/ perchlorate...
  • Page 40: Appendix

    4. Appendix This chapter describes trademarks. Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the U.S.
  • Page 41 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 42 User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 44 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine I Want to Save Paper............................9 I Want to Convert Documents to Electronic Formats Easily................10 I Want to Register Destinations........................11 I Want to Operate the Machine More Effectively..................12 You Can Customize the [Home] Screen as You Like..................13...
  • Page 45 Turning On/Off the Power..........................48 Turning On the Main Power........................48 Turning Off the Main Power........................48 When the Authentication Screen is Displayed....................50 User Code Authentication Using the Control Panel..................50 Logging In Using the Control Panel......................50 Logging Out Using the Control Panel......................51 Placing Originals..............................52 Placing Originals on the Exposure Glass (mainly Europe)..........52 Placing Originals on the Exposure Glass...
  • Page 46 Canceling a Transmission Before the Original Is Scanned..............80 Canceling a Transmission While the Original Is Being Scanned.............80 Canceling a Transmission After the Original Is Scanned (While a Transmission Is in Progress)...81 Canceling a Transmission After the Original Is Scanned (Before a Transmission Is Started)....81 Sending at a Specific Time (Send Later)......................83 Storing a Document............................84 Sending Stored Documents.........................85...
  • Page 47 Basic Procedure for Storing Scan Files......................111 Checking a Stored File Selected from the List..................112 Specifying the File Type..........................113 Specifying Send Settings..........................114 7. Document Server Storing Data..............................115 Printing Stored Documents..........................117 8. Web Image Monitor Displaying Top Page.............................119 Viewing Received Fax Documents Using Web Image Monitor..............121 9.
  • Page 48 When Messages Are Displayed on Your Computer Screen..............197 Messages Displayed When Using the Scanner Function..............197 11. Appendix Trademarks..............................203 INDEX ................................205...
  • Page 49: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 50: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CMR015 The following information is region-specific.
  • Page 51: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder...
  • Page 52: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a description by what you want to do. I Want to Save Paper BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax)) See "Combined Copying", Copy/ Document Server See "Combine Two Originals", Fax...
  • Page 53: I Want To Convert Documents To Electronic Formats Easily

    1. What You Can Do with This Machine I Want to Convert Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan Storing scan files in a shared folder See "Basic Procedure When Using Scan to Folder", Scan...
  • Page 54: I Want To Register Destinations

    I Want to Register Destinations I Want to Register Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax See "Registering a destination in the address book manually", Scan Using Web Image Monitor to register destinations from a computer See "Registering Internet Fax Destination Information Using Web Image Monitor", Fax Downloading destinations registered in the machine to the LAN-Fax driver destination list...
  • Page 55: I Want To Operate The Machine More Effectively

    1. What You Can Do with This Machine I Want to Operate the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Fax/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions Registering frequently-used printing settings to the printer driver...
  • Page 56: You Can Customize The [Home] Screen As You Like

    You Can Customize the [Home] Screen as You Like You Can Customize the [Home] Screen as You Like The icons of each function are displayed on the [Home] screen. CMQ001 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 57: You Can Make Copies Using Various Functions

    1. What You Can Do with This Machine You Can Make Copies Using Various Functions CMQ002 • You can reduce or enlarge the copy image. With the Auto Reduce/Enlarge function, the machine automatically calculates the reproduction ratio based on the sizes of the originals and the paper you have specified.
  • Page 58: You Can Print Data Using Various Functions

    You Can Print Data Using Various Functions You Can Print Data Using Various Functions CMQ004 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 59: You Can Utilize Stored Documents

    1. What You Can Do with This Machine You Can Utilize Stored Documents You can store files scanned in copier, facsimile, printer, or scanner mode on the machine's hard disk. With Web Image Monitor, you can use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 60: You Can Send And Receive Faxes Without Paper

    You Can Send and Receive Faxes without Paper You Can Send and Receive Faxes without Paper Reception You can store and save received fax documents as electronic formats in the machine's hard disk without printing them. CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents).
  • Page 61 1. What You Can Do with This Machine CJQ605 • To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer, and then specify the destination. • You can also check the sent image data. •...
  • Page 62: You Can Send And Receive Faxes Using The Internet

    You Can Send and Receive Faxes Using the Internet You Can Send and Receive Faxes Using the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx CJQ606 E-mail Transmission and Reception This machine converts scanned document images to e-mail format, and transmits and receives this data over the Internet.
  • Page 63 1. What You Can Do with This Machine • For details about how to transmit and receive documents over the Internet, see "Transmission" and "Reception", Fax...
  • Page 64: You Can Use The Facsimile And The Scanner In A Network Environment

    You Can Use the Facsimile and the Scanner in a Network Environment You Can Use the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). •...
  • Page 65: You Can Prevent Information Leakage (Security Functions)

    1. What You Can Do with This Machine You Can Prevent Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 66: You Can Monitor And Set The Machine Using A Computer

    You Can Monitor and Set the Machine Using a Computer You Can Monitor and Set the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 67: You Can Prevent An Unauthorized Copy

    1. What You Can Do with This Machine You Can Prevent an Unauthorized Copy You can print embedded pattern on paper to prevent them from being copied. CJQ613 • Using the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy, preventing confidential information from being copied.
  • Page 68: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components Guide to Components (mainly Europe) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur.
  • Page 69 2. Getting Started 5. Front cover Open to access the inside of the machine. 6. Paper tray Load paper here. 7. Paper tray unit (Tray 2 and Tray 3) Load paper here. 8. Main power switch To operate the machine, the main power switch must be on. If it is off, turn the switch on. 9.
  • Page 70: Guide To Components (Mainly Asia)

    Guide to Names and Functions of Components 6. Lower right cover Open this cover when a paper jam occurs. Rear and left view CMR016 1. Ventilation holes Prevent overheating. Guide to Components (mainly Asia) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur.
  • Page 71 2. Getting Started Front and left view CMR001 1. ADF Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. 2.
  • Page 72 Guide to Names and Functions of Components Front and right view CMR002 1. Exposure glass Place originals face down here. 2. Right cover Open this cover to remove jammed paper fed from the paper tray. 3. Bypass tray Use to copy or print on OHP transparencies and label paper (adhesive labels). 4.
  • Page 73: Guide To Components (Mainly North America)

    2. Getting Started Rear and left view CMR016 1. Ventilation holes Prevent overheating. Guide to Components (mainly North America) • Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If the machine overheats, a fault might occur. Front and left view CMR001...
  • Page 74 Guide to Names and Functions of Components 1. ADF Lower the ADF over originals placed on the exposure glass. If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. 2. Extenders Raise these extenders to support large paper.
  • Page 75 2. Getting Started 1. Exposure glass Place originals face down here. 2. Right cover Open this cover to remove jammed paper fed from the paper tray. 3. Bypass tray Use to copy or print on OHP transparencies and label paper (adhesive labels). 4.
  • Page 76: Guide To Functions Of The Machine's Options

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options (mainly Europe) CMR003 1. Exposure glass cover Lower this cover over originals. 2. ADF Load a stack of originals here. They will feed in automatically. 3.
  • Page 77: Guide To Functions Of The Machine's External Options (Mainly Asia)

    2. Getting Started Guide to Functions of the Machine's External Options (mainly Asia) CMR004 1. Paper tray unit (Tray 2 and Tray 3) Holds up to 500 sheets of paper. Up to two trays can be stacked. Guide to Functions of the Machine's External Options (mainly North America) CMR005...
  • Page 78: Guide To The Names And Functions Of The Machine's Control Panel

    Guide to the Names and Functions of the Machine's Control Panel Guide to the Names and Functions of the Machine's Control Panel This illustration shows the control panel of the machine with options fully installed. CMR606 1. [Home] key Press to display the [Home] screen. For details, see p.38 "How to Use the [Home] Screen". 2.
  • Page 79 2. Getting Started See "Registering Frequently Used Functions", Convenient Functions • Press to program defaults for the initial display when modes are cleared or reset, or immediately after the main power switch is turned on. See "Changing the Default Functions of the Initial Screen", Convenient Functions 6.
  • Page 80 Guide to the Names and Functions of the Machine's Control Panel • Confidential File indicator Lights continuously while personal box data is being received. Blinks while Memory Lock file is being received. See "Personal Boxes" and "Printing a File Received with Memory Lock", Fax 17.
  • Page 81: How To Use The [Home] Screen

    2. Getting Started How to Use the [Home] Screen The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 82: Adding Icons To The [Home] Screen

    How to Use the [Home] Screen 5. Home screen image You can display an image on the [Home] screen, such as a corporate logo. To change the image, see "Displaying the Image on the [Home] Screen", Convenient Functions 6. [Scanner] Press to scan originals and save images as files.
  • Page 83 2. Getting Started • You can change the position of icons. For details, see "Changing the Order of Icons on the [Home] Screen", Convenient Functions Adding icons to the [Home] screen using Web Image Monitor Start Web Image Monitor. For details, see "Using Web Image Monitor", Connecting the Machine/ System Settings Log in to Web Image Monitor as an administrator.
  • Page 84 How to Use the [Home] Screen Press [Edit Home]. Press [Add Icon]. Press [Select Icon to Add]. Press [Program].
  • Page 85 2. Getting Started Press [Copier Program]. Select the program you want to add. Press [Select Destination]. Specify the position where [Blank] is displayed.
  • Page 86 How to Use the [Home] Screen Press [Exit]. Press the [User Tools/Counter] key. • Press [ ] on the upper-right corner of the [Select Destination] screen to check the position on the simple screen.
  • Page 87: Registering Functions In A Program

    2. Getting Started Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Density, paper tray, Orig.
  • Page 88 Registering Functions in a Program Press the [Program] key. CMT001 Press [Program]. Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit] twice. • The number of characters you can enter for a program name varies depending on the functions as follows: •...
  • Page 89: Example Of Programs

    2. Getting Started • Programs are not deleted by turning the power off or by pressing the [Reset] key unless the program is deleted or overwritten. • Program numbers with next to them already have settings made for them. • Programs can be registered to the [Home] screen, and can be recalled easily. For details, see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions and p.39 "Adding Icons to the [Home] Screen".
  • Page 90 Registering Functions in a Program Program name Program description Effect Digital signature In [Send Settings], specify [PDF], You can add a digital signature to an scan [High Compress. PDF], or [PDF/A] in important document such as a [File Type], and also specify [Digital contract, so that any data tampering Signature].
  • Page 91: Turning On/Off The Power

    2. Getting Started Turning On/Off the Power The main power switch is on the left side of the machine. Turning off this switch makes the main power indicator on the right side of the control panel go off. When this is done, machine power is off. When the fax unit is installed, fax files in memory may be lost if you turn this switch off.
  • Page 92 Turning On/Off the Power • Before unplugging the power cord plug, turn off the main power switch and make sure the main power switch indicator turns off. Not doing so may result in damage to the hard disk or memory, leading to malfunctions.
  • Page 93: When The Authentication Screen Is Displayed

    2. Getting Started When the Authentication Screen is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 94: Logging Out Using The Control Panel

    When the Authentication Screen is Displayed Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging Out Using the Control Panel This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 95: Placing Originals

    2. Getting Started Placing Originals Placing Originals on the Exposure Glass (mainly Europe) • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF or the exposure glass cover. Place the original face down on the exposure glass. The original should be aligned to the rear left corner.
  • Page 96: Placing Originals On The Exposure Glass (Mainly North America)

    Placing Originals CMS001 1. Positioning mark Lower the ADF. Placing Originals on the Exposure Glass (mainly North America) • Do not lift the ADF forcefully. Otherwise, the cover of the ADF might open or be damaged. Lift the ADF. Place the original face down on the exposure glass. The original should be aligned to the rear left corner.
  • Page 97: Placing Originals In The Auto Document Feeder

    2. Getting Started Placing Originals in the Auto Document Feeder Be sure not to load the original untidily. Doing so may cause the machine to display a paper misfeed message. Also, be sure not to place originals or other objects on the top cover. Doing so may cause a malfunction.
  • Page 98: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 99 3. Copy Make sure no previous settings remain. When there are previous settings remaining, press the [Reset] key. Select the paper tray containing the paper that is the same size and orientation as the originals. Make sure that [Use Paper Tray Settg] is selected. When [Use Paper Tray Settg] is selected, the paper size and orientation of the tray you have selected will appear in [Orig.].
  • Page 100: Auto Reduce/Enlarge

    Auto Reduce/Enlarge Auto Reduce/Enlarge The machine automatically calculates the reproduction ratio based on the sizes of the originals and the paper you have specified. The machine will rotate, enlarge, or reduce the image of the originals to fit them to the paper. CKN008 •...
  • Page 101 3. Copy Select the original orientation, and then press [OK]. Press [Original's Size]. Specify the original size, and then press [OK] twice. Press [Auto Reduce/Enlarge]. Select the paper tray. Place the originals, and then press the [Start] key.
  • Page 102: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 • You cannot use the bypass tray with this function. There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page.
  • Page 103 3. Copy Orig.'s Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Other Func.]. Press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output. To change the original or copy orientation, press [Orientation].
  • Page 104: Specifying The Original And Copy Orientation

    Duplex Copying Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper. • Top to Top CKN011 • Top to Bottom CKN012 Press [Orientation].
  • Page 105: Combined Copying

    3. Copy Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 106: One-Sided Combine

    Combined Copying CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 • You cannot use the bypass tray with this function. There are four types of One-Sided Combine. 1 Sided 2 Originals Cmb.
  • Page 107: Two-Sided Combine

    3. Copy 2 Sided 4 Pages Cmb. 1 Side Copies two 2-sided originals to one side of a sheet. Press [Orig.]. Press [Original's Size]. Specify the original size, and then press [OK] twice. Press [Other Func.]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original]. If you selected [2 Sided], you can change the orientation by pressing [Orientation].
  • Page 108 Combined Copying CKN074 • You cannot use the bypass tray with this function. There are four types of Two-Sided Combine. 1 Sided 4 Originals Cmb. 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Cmb.
  • Page 109 3. Copy Press [Cmb. 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original] and/or [Copy], and then press [OK]. Select the number of originals to combine. Press [OK] twice. Select the paper tray. Place the originals, and then press the [Start] key.
  • Page 110: Copying Onto Custom Size Paper From The Bypass Tray

    Copying onto Custom Size Paper from the Bypass Tray Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 139.0–600.0 mm (5.48–23.62 inches) and a vertical length of 90.0–216.0 mm (3.55–8.50 inches) can be fed in from the bypass tray. Load the paper face down in the bypass tray.
  • Page 111: Copying Onto Envelopes

    3. Copy Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Envelopes should be fed from the bypass tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see p.135 "Recommended Paper Sizes and Types".
  • Page 112 Copying onto Envelopes Place the original face down on the exposure glass. The original should be aligned to the rear left corner. CMS001 1. Positioning mark Load the envelopes face down in the bypass tray. The bypass tray ( ) is automatically selected. Press the [ ] key.
  • Page 113: Sort

    3. Copy Sort The machine assembles copies as sets in sequential order. CKN018 Depending on which options are installed on your machine, this function might not be available. For details, see "Functions Requiring Optional Configurations", Getting Started Press [Other Func.]. Press [Sort], and then press [OK].
  • Page 114 Sort Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 115: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents from the Document Server screen. For details about the Document Server, see p.115 "Storing Data".
  • Page 116: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 117: Sending Originals Using The Exposure Glass (Memory Transmission)

    4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Configure the scan and transmission settings in "Send Settings". Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 118: Registering A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) Press the [ ] key. The machine dials the destination and starts transmission. Registering a Fax Destination Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Press [New Program]. Press [Names]. Press [Name]. The name entry display appears. Enter the name, and then press [OK].
  • Page 119: Deleting A Fax Destination

    4. Fax Press [Fax Destination]. Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". To specify [SUB Code], [SEP Code], or [Sub-add./UUI], press [Adv. Features]. Press [OK].
  • Page 120 Basic Procedure for Transmissions (Memory Transmission) Press [Clear], and then press [OK]. Press [OK]. Press [Exit]. Press [OK]. Press the [User Tools/Counter] key.
  • Page 121: Transmitting While Checking Connection To Destination (Immediate Transmission)

    4. Fax Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 122: Sending Originals Using The Exposure Glass (Immediate Transmission)

    Transmitting while Checking Connection to Destination (Immediate Transmission) Sending Originals Using the Exposure Glass (Immediate Transmission) Press [Immed. TX]. Place the first page face down on the exposure glass. Specify a destination. Make the scan settings you require. Press the [Start] key. Place the next original on the exposure glass within 10 seconds when you send multiple originals, and then repeat steps 4 and 5.
  • Page 123: Canceling A Transmission

    4. Fax Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Press the [Reset] key. CMK001 Canceling a Transmission While the Original Is Being Scanned Use this procedure to cancel scanning or transmitting of the original while it is being scanned.
  • Page 124: Canceling A Transmission After The Original Is Scanned (While A Transmission Is In Progress)

    Canceling a Transmission Canceling a Transmission After the Original Is Scanned (While a Transmission Is in Progress) Use this procedure to delete a file that is being sent after the original is scanned. All the scanned data is deleted from memory. Press the [Stop] key.
  • Page 125 4. Fax Press [Comm. Status/Print]. Press [Check/Stop Transmission File]. Press [Display File List]. Select the file you want to cancel. If the desired file is not shown, press [ ] or [ ] to find it. Press [Cancel TX]. To cancel another file, repeat steps 4 through 5. Press [OK].
  • Page 126: Sending At A Specific Time (Send Later)

    Sending at a Specific Time (Send Later) Sending at a Specific Time (Send Later) Using this function, you can instruct the machine to delay transmission of your fax document until a specified later time. This allows you to take advantage of off-peak telephone charges without having to be by the machine at the time.
  • Page 127: Storing A Document

    4. Fax Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 128: Sending Stored Documents

    Storing a Document Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 129 4. Fax Press [Send Settings]. Press [ ] four times, and then press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [File Name] to place the documents in alphabetical order. •...
  • Page 130: Printing The Journal Manually

    Printing the Journal Manually Printing the Journal Manually To print the Journal manually, select the printing method: "All", "Print per File No.", or "Print per User". Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 131 4. Fax...
  • Page 132: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 133: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 134: Standard Printing

    Standard Printing Standard Printing • The default setting is duplex printing. If you want to print on only one side, select [Off] for the duplex setting. • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete.
  • Page 135: Locked Print

    5. Print Locked Print Sending a Locked Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 136 Locked Print Press the [Print Jobs] tab. Press [Locked Jobs]. Select the files you want to print. You can select all the Locked Print files at once by pressing [All Jobs] after selecting a file. Press [Print]. Enter the password using the number keys, and then press [OK]. To change the print settings of the document, press [Det.Settings].
  • Page 137: Hold Print

    5. Print Hold Print Sending a Hold Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 138 Hold Print Press the [Print Jobs] tab. Press [Hold Jobs]. Select the files you want to print. You can select all the Hold Print files at once by pressing [All Jobs] after selecting a file. Press [Print]. To change the print settings of the document, press [Det.Settings]. Enter the number of copies using the number keys if necessary, and then press [Resume Prt.].
  • Page 139: Stored Print

    5. Print Stored Print Sending a Stored Print File Click the WordPad menu button in the upper left corner of the window, and then click [Print]. In the "Select Printer" list, select the printer you want to use. Click [Preferences]. In the "Job Type:"...
  • Page 140: Printing A Stored Print File Using The Control Panel

    Stored Print Printing a Stored Print File Using the Control Panel • The stored documents are not deleted even after the printing has been completed. For the procedure to delete the documents, see "Deleting Stored Print files", Print Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 141: Direct Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing Files from an External Memory Device Printing Files from an External Memory Device Direct Printing from a Removable Memory Device • Using the Media Slot • Printable File Formats • Printing from a Removable Memory Device •...
  • Page 142 Printing Files from an External Memory Device Using the Media Slot • USB flash memory devices and SD cards are supported for direct printing. However, certain types of USB flash memory devices and SD cards cannot be used. For details, contact your sales or service representative.
  • Page 143: Printing From A Removable Memory Device

    Printing Files from an External Memory Device Printing from a Removable Memory Device Insert a removable memory device into the media slot. For details about inserting a removable memory device, see "Inserting/Removing a Memory Storage Device", Getting Started. Press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen.
  • Page 144 Printing Files from an External Memory Device • Depending on the security setting, [Prt. From Dev.] may not appear. For details, see Security Guide • You cannot select multiple files of different formats at the same time. • Files or groups of files larger than 1 GB cannot be printed. •...
  • Page 145: Screen For Direct Printing

    Printing Files from an External Memory Device Screen for Direct Printing To display this screen, press the [Home] key on the top left of the control panel, and press the [Printer] icon on the [Home] screen, and then press [Prt. From Dev.]. You can view files either as a list or as thumbnails.
  • Page 146 Printing Files from an External Memory Device Press to display the print image of the 1st page of the selected document. You can change the scale factor and display position of the print image. [Start Printing] Press to print the selected file. List/Thumbnail Press to switch between list view and thumbnail view.
  • Page 147: Using Pictbridge

    Printing Files from an External Memory Device Direct Printing from a Digital Camera (PictBridge) You can connect a PictBridge-compatible digital camera to this machine using a USB cable. This allows you to print photographs taken using the digital camera directly by operating the digital camera.
  • Page 148: Exiting Pictbridge

    Printing Files from an External Memory Device • Some digital cameras require settings for manual PictBridge operation. For details, see your digital camera's manual. Exiting PictBridge • Do not disconnect the USB cable while data is being sent to the machine. If you do, printing will fail.
  • Page 149 5. Print...
  • Page 150: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 151: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan • Press [Original], and then press [2 Sided]. • Press [Send Settings]. Select [Type of Original], and then press [Full Colour]. • Press [Send Settings]. Select [File Type], and then press [PDF]. Specify the destination. You can specify multiple destinations. Press the [Start] key.
  • Page 152 Basic Procedure When Using Scan to Folder • If "Everyone" is left selected in step 6, the created shared folder will be accessible by all users. This is a security risk, so we recommend that you give access rights only to specific users. Use the following procedure to remove "Everyone"...
  • Page 153: Registering An Smb Folder

    6. Scan In the [Select Users or Groups] window, click [OK]. In the [Groups or user names:] list, select a group or user, and then, in the [Allow] column of the permissions list, select either the [Full Control] or [Change] check box. Press [OK] twice.
  • Page 154 Basic Procedure When Using Scan to Folder Press [Auth. Info]. Press [Folder Authentication]. Press [Specify Other Auth. Info]. When [Do not Specify] is selected, the SMB User Name and SMB Password that you have specified in [Default User Name/Password (Send)] of File Transfer settings are applied. Press [Change] under "Login User Name".
  • Page 155 6. Scan Press [OK] three times. Press the [User Tools/Counter] key. Locating the SMB folder manually Press [Enter] under "Path". Enter the path where the folder is located. For example: if the name of the destination computer is "User", and the folder name is "Share", the path will be \\User\Share.
  • Page 156: Deleting An Smb Registered Folder

    Basic Procedure When Using Scan to Folder You can press [Up One Level] to switch between levels. Select the folder you want to register. Press [OK] four times. Deleting an SMB Registered Folder Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Press [Change].
  • Page 157 6. Scan Press [SMB]. Press [Enter] in [Destination]. Press [Enter] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 158: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E- mail Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen. CMR612 Make sure that no previous settings remain. If a previous setting remains, press the [Reset] key.
  • Page 159: Registering An E-Mail Destination

    6. Scan To use the Message Disposition Notification function, select [Send Settings], press [ ] four times, and then press [Reception Notice]. If you select [Reception Notice], the selected e-mail sender will receive e-mail notification when the e-mail recipient has opened the e-mail. Press the [Start] key.
  • Page 160: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail Press [Email Address]. Enter the e-mail address. Press [OK]. Press [Use Email Address for], and then select [Email/Internet Fax Dest.] or [Internet Fax Destination Only]. If [Email/Internet Fax Dest.] is specified, registered e-mail addresses appear in both the internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 161: Entering An E-Mail Address Manually

    6. Scan Press [Email]. Select the name whose e-mail address you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP-Fax destination. Press [Email].
  • Page 162: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 163: Checking A Stored File Selected From The List

    6. Scan Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. • File Name Press [File Name], enter a file name, and then press [OK]. •...
  • Page 164: Specifying The File Type

    Specifying the File Type Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a removable memory device.
  • Page 165: Specifying Send Settings

    6. Scan Specifying Send Settings Press [Send Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 166: Basic Procedure For Saving Scan Files On A Removable Memory Device

    Storing the Scanned Documents to a USB Flash Memory or SC Card Storing the Scanned Documents to a USB Flash Memory or SD Card This section explains how to save data on external media using the scanner function. • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately.
  • Page 167 Storing the Scanned Documents to a USB Flash Memory or SC Card Insert a removable memory device in the media slot. You can connect only one removable memory device at a time. The media slot cannot be used if both an SD card and a USB flash memory are inserted into it at the same time. Make sure that no previous settings remain.
  • Page 168 Storing the Scanned Documents to a USB Flash Memory or SC Card Remove the memory device from the media slot. Remove the media from the media slot only after data has been written completely. Removing the media while data is being written will result in corrupted data. •...
  • Page 169 Storing the Scanned Documents to a USB Flash Memory or SC Card 114D...
  • Page 170: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 171 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. CMR612 Press [To Scanning Scrn.]. Press [User Name]. Specify a user name, and then press [OK]. The user names shown are names that were registered in the Address Book.
  • Page 172: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [2 Sided: Top to Top], [2 Sided: Top to Bottom] •...
  • Page 173 7. Document Server...
  • Page 174: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 175 8. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 176: Viewing Received Fax Documents Using Web Image Monitor

    Viewing Received Fax Documents Using Web Image Monitor Viewing Received Fax Documents Using Web Image Monitor Start Web Image Monitor. Click [Fax Received File] on the [Print Job/Stored File] menu in the left pane. If you have programmed a user code for the stored reception file, enter the code, and then press [OK].
  • Page 177 8. Web Image Monitor...
  • Page 178: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Loading Paper into Paper Trays • If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side fences may slip out of place.
  • Page 179: Loading Paper Into Trays 2 And 3

    9. Adding Paper and Toner Press the metal plate down until it clicks. CMS020 Square the paper and load it print side up. Do not stack paper over the limit mark. CMS021 Carefully slide the paper tray fully in. Loading Paper into Trays 2 and 3 Each paper tray is loaded in the same way.
  • Page 180 Loading Paper into Paper Trays Carefully pull out the paper tray until it stops. CMS041 While pressing down the release lever of the side fence, slide the side fence outward. CMS033 If the paper size that is loaded is 8 ×...
  • Page 181 9. Adding Paper and Toner Press the metal plate down until it clicks. CMS036 Square the paper and load it print side up. Do not stack paper over the limit mark. CMS037 Align the back and side fences gently against the paper you loaded. CMS038 Carefully slide the paper tray fully in.
  • Page 182: Loading Paper Into The Bypass Tray

    Loading Paper into the Bypass Tray Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Do not load paper over the limit mark.
  • Page 183 9. Adding Paper and Toner CMS024 Push down the release lever. A beeping sound will occur after the paper is inserted and the release lever is pushed down. CMS025 • When you use the bypass tray, it is recommended to load the paper in orientation.
  • Page 184: Settings To Use The Bypass Tray Under The Printer Function

    Loading Paper into the Bypass Tray Settings to Use the Bypass Tray under the Printer Function • If you select [Machine Setting(s)] in [Bypass Tray] under [Tray Setting Priority] in [System] of the Printer Features menu, the settings made using the control panel have priority over the printer driver settings.
  • Page 185 9. Adding Paper and Toner • When loading thick paper or OHP transparencies, specify the paper size and the paper type. Setting custom size paper using the control panel Press the [User Tools/Counter] key. CMR633 Press [Tray Paper Settings]. Press [ ]. Press [Printer Bypass Paper Size].
  • Page 186 Loading Paper into the Bypass Tray • When printing onto OHP transparencies, remove printed sheets one by one. Press the [User Tools/Counter] key. CMR633 Press [Tray Paper Settings]. Press [ ]. Press [Printer Bypass Paper Size], and then specify the paper size. Press [OK].
  • Page 187: Loading Orientation-Fixed Paper Or Two-Sided Paper

    9. Adding Paper and Toner Loading Orientation-Fixed Paper or Two-Sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not print correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 188 Loading Orientation-Fixed Paper or Two-Sided Paper Original orientation Exposure glass Landscape ( ) • Copy • Scanner • Paper orientation • Copier mode Copy side Tray 1 Trays 2 and 3 Bypass tray One-sided Two-sided Unavailable • Printer mode Print side Tray 1 Trays 2 and 3 Bypass tray...
  • Page 189 9. Adding Paper and Toner • If a print job is changed partway through printing from one-sided to two-sided printing, one- sided output after the first copy may be printed facing a different direction. To ensure all paper is output facing the same direction, specify different input trays for one-sided and two- sided printing.
  • Page 190: Recommended Paper Sizes And Types

    Recommended Paper Sizes and Types Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use damp or curled paper, a paper jam may occur. • Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed.
  • Page 191 9. Adding Paper and Toner Bypass tray Paper type and Paper size Paper capacity weight 60–157 g/m (16– Select the paper size • Plain Paper 1–Plain 40 lb. Bond) Paper 2: 100 sheets A4 , A5 , A6 , B5 JIS , B6 JIS , Plain Paper 1–Thick ×...
  • Page 192 Recommended Paper Sizes and Types Paper Thickness Paper weight Plain Paper 2 81–90 g/m (20–24 lb. Bond) Middle Thick 91–105 g/m (24–28 lb. Bond) Thick Paper 106–157 g/m (28–40 lb. Bond) *1 Print quality will decrease if the paper you are using is close to the minimum or maximum weight. Change the paper weight setting to thinner or thicker.
  • Page 193: Thick Paper

    9. Adding Paper and Toner • When copying onto OHP transparencies, see "Copying onto OHP Transparencies", Copy/ Document Server • When printing on OHP transparencies from the computer, see p.130 "Setting thick paper or OHP transparencies using the control panel". •...
  • Page 194: Envelopes

    Recommended Paper Sizes and Types • Even if thick paper is loaded as described above, normal operations and print quality might still not be possible, depending on the paper type. • Prints might have prominent vertical creases. • Prints might be noticeably curled. Flatten out prints if they are creased or curled. Envelopes This section gives you various details about and recommendations concerning envelopes.
  • Page 195 9. Adding Paper and Toner When loading envelopes, specify the envelope type and thickness. For details, see p.68 "Copying onto Envelopes". In printer mode When printing onto envelopes, load them according to the applicable orientation shown below: How to load envelopes Types of envelopes Bypass tray Side-opening envelopes...
  • Page 196 Recommended Paper Sizes and Types • Depending on the environment, copying or printing on envelopes may wrinkle them even if they are recommended. • Certain types of envelopes might come out creased, dirtied, or misprinted. If you are printing a solid color on an envelope, lines may appear where the overlapped edges of the envelope make it thicker.
  • Page 197: Adding Toner

    9. Adding Paper and Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 198: Sending Faxes Or Scanned Documents When Toner Has Run Out

    Adding Toner • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible. •...
  • Page 199: Disposing Of Used Toner

    9. Adding Paper and Toner • If number of communications executed after the toner has run out and not listed in the automatically output Journal exceeds 200, communication is not possible. Make sure the machine is in facsimile or scanner mode. Perform transmission operation.
  • Page 200: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. Indicators This section describes the indicators displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Indicator Status : Paper Misfeed indicator Appears when a paper misfeed occurs. For details about removing jammed paper, see "Removing Jammed Paper", Troubleshooting : Original Misfeed indicator...
  • Page 201: When An Indicator For The [Check Status] Key Is Lit

    10. Troubleshooting When an Indicator for the [Check Status] Key Is Lit If an indicator for the [Check Status] key lights up, press the [Check Status] key to display the [Check Status] screen. Check the status of each function in the [Check Status] screen. [Check Status] screen CNY002 1.
  • Page 202 When an Indicator for the [Check Status] Key Is Lit Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper.
  • Page 203: Panel Tone

    10. Troubleshooting Panel Tone The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep Panel/screen input A control panel or screen key was accepted.
  • Page 204: When You Have Problems Operating The Machine

    When You Have Problems Operating the Machine When You Have Problems Operating the Machine This section describes common problems and messages. If other messages appear, follow the instructions displayed. Problem Causes Solutions The [Facsimile] or [Scanner] Functions other than the Functions appear on the [Home] icon does not appear on the copier function are not yet...
  • Page 205 10. Troubleshooting Problem Causes Solutions "Please wait." appears. This message appears when • Wait until the message the machine is warming up. disappears. Do not turn off the main power switch while the message is displayed. • If the machine does not get ready in five minutes, contact your service representative.
  • Page 206 When You Have Problems Operating the Machine Problem Causes Solutions "You do not have the The logged in user name For details about how to set privileges to use this does not have permission for permissions, see Security Guide function." continues to be the selected function.
  • Page 207 10. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. Copy paper size setting is • Remove misfed paper. For details not correct. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting • Set the proper paper size. For details about specifying paper size with the control panel, see "Changing Paper Size Settings", Paper Specifications and Adding...
  • Page 208 When You Have Problems Operating the Machine Problem Causes Solutions An error has occurred when The Address Book cannot be Wait a while, and then retry the the Address Book is changed while deleting the operation. changed from the display multiple stored documents.
  • Page 209: When Messages Are Displayed On The Control Panel

    10. Troubleshooting When Messages Are Displayed on the Control Panel Messages Displayed When Using the Copy/Document Server Function This section describes the machine's main messages. If other messages appear, follow their instructions. • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper.
  • Page 210 When Messages Are Displayed on the Control Panel Message Causes Solutions "Maximum number of sets is The number of copies You can change the maximum copy n." exceeds the maximum copy quantity from [Max. Copy Quantity] in quantity. [General Features] under [Copier/ (A figure is placed at n.) Doc.
  • Page 211: Messages Displayed When Using The Facsimile Function

    10. Troubleshooting When the memory becomes full while using the copy/document server function Message Causes Solutions "Memory is full. nn originals The scanned originals • Press [Print] to copy scanned have been scanned. Press exceed the number of pages originals and cancel the scanning [Print] to copy scanned that can be stored in data.
  • Page 212 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are The alias telephone number • Check that the correct alias phone any network problems." you entered is already number is listed in [H.323 registered on the gatekeeper Settings] of [Facsimile Features].
  • Page 213 10. Troubleshooting Message Causes Solutions "Check whether there are In [Effective Protocol], the IP • Check that "IPv4" in [Effective any network problems." address is not enabled, or an Protocol] is set to "Active" in incorrect IP address has been [System Settings].
  • Page 214 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are The DNS server, SMTP • Check that the following settings any network problems." server, or folder specified for in [System Settings] are listed transfer to was not found, or correctly.
  • Page 215 10. Troubleshooting Message Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or login listed correctly.
  • Page 216 When Messages Are Displayed on the Control Panel Message Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3/IMAP4 Settings] of [15-01] [System Settings].
  • Page 217 10. Troubleshooting Message Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 218 When Messages Are Displayed on the Control Panel Message Causes Solutions "Connection with LDAP A network error has occurred Try the operation again. If the message server has failed. Check the and connection has failed. is still shown, the network may be busy. server status."...
  • Page 219 10. Troubleshooting Message Causes Solutions "Functional problem The main power switch was Even if you turn the main power switch occurred. Stopped turned off while the machine back on immediately, depending on processing." was receiving a document by the mail server, the machine might not Internet Fax.
  • Page 220 When Messages Are Displayed on the Control Panel Message Causes Solutions "Some page(s) are almost The first page of the The original's blank side might have blank. To cancel press the document is almost blank. been scanned. Be sure to place your Stop key."...
  • Page 221 10. Troubleshooting Message Causes Solutions "The program contains a The user certificate A new user certificate must be installed. destination(s) with a (destination certificate) has For details about the user certificate certificate that is not expired. (destination certificate), see Security currently valid.
  • Page 222 When Messages Are Displayed on the Control Panel Message Causes Solutions "The program contains a There is no user certificate For details about the user certificate destination(s) that does not (destination certificate). (destination certificate), see Security have a certificate." Guide "The specified destination There is no user certificate For details about the user certificate...
  • Page 223 10. Troubleshooting Message Causes Solutions "XXX cannot be recalled There is no device certificate For details about the device certificate because there is a problem (S/MIME), or the certificate (S/MIME), see Security Guide with the device certificate is invalid. used for the S/MIME signature."...
  • Page 224: Messages Displayed When Using The Printer Function

    When Messages Are Displayed on the Control Panel • If "Check whether there are any network problems." appears, the machine is not correctly connected to the network or the settings of the machine are not correct. If you do not need to connect to a network, you can specify the setting so this message is not displayed, and then the [Check Status] key no longer lights.
  • Page 225 10. Troubleshooting Message Status "Offline" The machine is offline. "Please wait." This message might appear for a second or two while the machine is preparing, performing initial adjustments, or adding toner. Wait a while. "Printing..." The machine is printing. Wait a while. "Ready"...
  • Page 226 When Messages Are Displayed on the Control Panel Message Causes Solutions "Cannot connect with the • The Bluetooth interface Turn off the main power switch, and Bluetooth interface. Check unit was installed while then confirm that the Bluetooth the Bluetooth interface." the machine was turned interface unit was installed correctly.
  • Page 227 10. Troubleshooting Message Causes Solutions "Hardware Problem: • The Bluetooth interface Turn off the main power switch, and Wireless Card" unit was connected then confirm the Bluetooth interface unit while the machine was is inserted correctly. And then, turn on (A "wireless LAN board"...
  • Page 228 When Messages Are Displayed on the Control Panel Message Causes Solutions "Problems with the wireless The machine has detected a Check that the Bluetooth unit is installed board. Please call service." Bluetooth failure, or it could properly, or contact your service not detect a Bluetooth unit.
  • Page 229: Other Messages

    10. Troubleshooting Message Causes Solutions "Exceeded the limit value for • The size of the selected Files or groups of files larger than 1 GB total data size of the file exceeds 1 GB. cannot be printed. selected files. Cannot select •...
  • Page 230 When Messages Are Displayed on the Control Panel Message Causes Solutions "Address Book is currently in The machine currently Wait a while, and then retry the use by another function. cannot perform operation. Authentication has failed." authentication because the Address Book is being used by another function.
  • Page 231 10. Troubleshooting Message Causes Solutions "Classification Code is The classification code is not Select Optional for classification code. incorrect." supported with the printer For details about how to specify driver. classification code settings, see "Configuring Classification Codes", Print "Collate has been Collate was canceled.
  • Page 232 When Messages Are Displayed on the Control Panel Message Causes Solutions "Document Server is not You cannot use the • For details about using Document available to use. Cannot Document Server function. Server function, contact your store." administrator. • For details about how to set permissions, see Security Guide "Duplex has been Duplex printing was...
  • Page 233 10. Troubleshooting Message Causes Solutions "Exceeded max. number of While using the error job Delete Hold Print files (automatic) or files. (Auto)" store function to store unneeded files stored in the machine. Normal Print jobs as Hold Print files, the maximum file capacity for file storage or Hold Print file management (automatic) was exceeded.
  • Page 234 When Messages Are Displayed on the Control Panel Message Causes Solutions "HDD is full." The hard disk became full • Delete unneeded files stored in while printing a Sample the machine. Print, Locked Print, Hold • Reduce the data size of the Print, or Stored Print file.
  • Page 235 10. Troubleshooting Message Causes Solutions "Insufficient Memory" A memory allocation error PCL 5e occurred. Select a lower resolution on the printer driver. For details about how to change the resolution setting, see the printer driver Help. PCL 6 On the printer driver's [Detailed Settings] tab, click [Print Quality] in "Menu:", and then select [Raster] in the "Vector/Raster:"...
  • Page 236 When Messages Are Displayed on the Control Panel Message Causes Solutions "The selected paper size is Job Reset is automatically Specify the correct paper size, and not supported. This job has performed if the specified then print the file again. been cancelled."...
  • Page 237: Messages Displayed When Using The Scanner Function

    10. Troubleshooting Messages during Direct print from a removable memory device Message Causes Solutions "99: Error" This data cannot be printed. Check that the data is valid. For details The specified data is either about the kinds of data supported by corrupt or not supported by the Direct printing function from the Direct printing function...
  • Page 238 When Messages Are Displayed on the Control Panel Message Causes Solutions "Connection with the The destination computer Check whether the computer name and destination has failed. Check name or folder name is the folder name for the destination are the settings. Entered path invalid.
  • Page 239 10. Troubleshooting Message Causes Solutions "Cannot write on the The memory device is faulty, • Check to see if the memory device memory storage device. or the file name contains a is defective. Check the memory storage character that cannot be •...
  • Page 240 When Messages Are Displayed on the Control Panel Message Causes Solutions "The data could not be sent A time out occurred when • Reduce the number of originals, because the PC timed out using WSD Scanner. Time and then scan again. before it was sent."...
  • Page 241 10. Troubleshooting Message Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity. Check the maximum data capacity. again. Note that it may not be possible scanning resolution, then to scan very large originals at a high press the Start key again."...
  • Page 242 When Messages Are Displayed on the Control Panel Message Causes Solutions "Exceeded max. number of The file being stored has Specify whether to store the data or pages per file. Do you want exceeded the maximum not. Scan the pages that were not to store the scanned pages number of pages for one file.
  • Page 243 10. Troubleshooting Message Causes Solutions "Exceeded time limit for A network error has • Try the operation again. If the LDAP server search. Check occurred and connection message is still shown, the the server status." has failed. network may be busy. •...
  • Page 244 When Messages Are Displayed on the Control Panel Message Causes Solutions "Memory is full. Press [Write] The scan could not be Select whether or not to save the to write the current scanned completed because there scanned document to the memory data to the memory storage was insufficient hard disk device.
  • Page 245 10. Troubleshooting Message Causes Solutions "Scanner journal full. Cannot "Print & Delete Scanner Print or delete Scanner Journal. For send data. Delete Journal" in [Scanner details about printing or deleting scan.journals in Features] is set to [Do not Scanner Journal, see "General Scan.Features."...
  • Page 246 When Messages Are Displayed on the Control Panel Message Causes Solutions "Some invalid destination(s) The specified group contains In the message that appears at each contained. Do you want to e-mail destinations and Scan transmission, press [Select]. select only valid to Folder destinations, either destination(s)?"...
  • Page 247 10. Troubleshooting Message Causes Solutions "The number of destinations The e-mail has too many Split the destinations into two or more that can be specified at the destinations. groups. same time is as shown above." "The selected file(s) You have tried to delete files To check your access permission for contained file(s) without without the authority to do...
  • Page 248 When Messages Are Displayed on the Control Panel Message Causes Solutions "Updating the destination list A network error has • Check whether the server is has failed. Try again?" occurred. connected. • Antivirus programs and firewalls can prevent client computers from establishing connection with this machine.
  • Page 249 10. Troubleshooting Message Causes Solutions "You do not have the The logged in user name For details about how to set privileges to use this does not have permission for permissions, see Security Guide function." the selected function. "Exceeded max. data The data being scanned is Reduce the resolution or [Specify Size] capacity.
  • Page 250 When Messages Are Displayed on the Control Panel Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the Digital with digital signature) has digital signature) must be installed. For Signature's device certificate expired.
  • Page 251 10. Troubleshooting Message Causes Solutions "Transmission cannot be The device certificate (S/ A new device certificate (S/MIME) performed because the MIME) has expired. must be installed. For details about certificate used for the S/ how to install a device certificate (S/ MIME signature is not MIME), see Security Guide currently valid."...
  • Page 252: When Messages Are Displayed On Your Computer Screen

    When Messages Are Displayed on Your Computer Screen When Messages Are Displayed on Your Computer Screen Messages Displayed When Using the Scanner Function This section describes likely causes of and possible solutions for the main error messages displayed on the client computer when using the TWAIN driver. If a message not described here appears, act according to the message.
  • Page 253 10. Troubleshooting Message Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly. network correctly. ("XXX"...
  • Page 254 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Error has occurred in the An error has occurred in the • Check whether the network cable scanner driver." driver. is connected correctly to the client computer. • Check whether the Ethernet board of the client computer is recognized correctly by Windows.
  • Page 255 10. Troubleshooting Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help. The problem may also be due to the following causes: •...
  • Page 256 When Messages Are Displayed on Your Computer Screen Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such •...
  • Page 257 10. Troubleshooting Message Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool. For the WIA not be obtained from the driver, check the [Network host name.
  • Page 258: 11. Appendix

    11. Appendix This chapter describes the trademarks. Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. ® The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd.
  • Page 259 11. Appendix ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ® ® Microsoft Windows Server 2008 Standard ® ® Microsoft Windows Server 2008 Enterprise...
  • Page 260: Index

    INDEX Envelope............68, 139 Error message. 154, 156, 169, 170, 174, 182, 197 2 Sided Print............. Exposure glass......26, 29, 32, 52, 53 Exposure glass cover........25, 33 Extender......... 25, 26, 28, 29, 31, 32 Address book 11, 75, 76, 102, 104, 105, 108, 109 External options..........
  • Page 261 Login/Logout key..........Logout key.............. Quick install............Lower right cover........27, 29, 32 Region A..............Main power indicator........... Region B..............Main power switch......26, 28, 31, 48 Registering destinations......... Media access lamp..........Reset key..............Media slots............Right cover..........26, 29, 32 Memory............
  • Page 262 Turning on the power..........Two-Sided Combine..........Two-sided paper..........Unauthorized copy prevention......Used toner............User code authentication........User Tools key............User Tools/Counter key........Ventilation holes....26, 27, 28, 30, 31, 32 Web Image Monitor......23, 119, 121...
  • Page 263 MEMO D127...
  • Page 264 © 2011...
  • Page 265 D127-7500...
  • Page 266: Operating Instructions

    Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 268 TABLE OF CONTENTS 1. Introduction Start Installer................................3 Software and Utilities Included on the CD-ROM.....................5 Printer Drivers..............................5 TWAIN Driver..............................7 LAN-Fax Driver...............................8 Font Manager..............................9 For Mac OS X Users............................10 2. Installing the Printer Driver Confirming the Connection Method.......................11 Network Connection...........................11 Local Connection............................12 Quick Install..............................13 Installing the Printer Driver for a Network Connection..................14 Installing the Printer Driver for the Selected Port..................14...
  • Page 269 Installing the LAN-FAX driver in "Add Printer"...................45 Setting LAN-Fax Driver Properties........................47 Setting Print Properties..........................47 Configuring Option Settings for the Facsimile...................48 5. Troubleshooting Messages Displayed When Installing the Printer Driver................49 If USB Connection Fails...........................51 6. Installing the Printer Driver Under Mac OS X Installing the PPD Files............................53 Registering the Printer............................54 USB Connection............................54...
  • Page 270: Introduction

    1. Introduction This chapter explains the software included on the supplied CD-ROM. Start Installer To connect this machine to a client computer and use its printer, scanner, and fax functions, the software included on the provided CD-ROM must be installed on the client computer. The installer starts automatically when you insert the provided CD-ROM into the CD-ROM drive of a client computer running under Windows or Windows Server.
  • Page 271 1. Introduction Select Language Change the interface language. Browse This CD-ROM Browse the contents of this CD-ROM. Exit Quit Installer. • Manage Printers permission is required to install the driver. Log on as an Administrators group member. • Auto Run might not work automatically with certain OS settings. If this is the case, double-click "SETUP.EXE", located on the CD-ROM root directory, or click [Run SETUP.EXE] in the [AutoPlay] dialog box.
  • Page 272: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD-ROM This section explains the software and utilities CD-ROM provided with this machine. • For the latest information on the corresponding operating system, see "Readme.txt" file in the DRIVERS folder.
  • Page 273 1. Introduction *7 Mac OS X 10.2 or later (native mode). Any versions higher than Mac OS X 10.6 are not supported. PCL printer drivers Two kinds of PCL printer driver (PCL 5e and PCL 6) are included. These drivers allow your computer to communicate with this machine via a printer language.
  • Page 274: Twain Driver

    Software and Utilities Included on the CD-ROM Printer Language Supported languages PCL 5e PCL 6 PostScript 3 PPD (Mac OS X) Czech Polish Portuguese Russian Catalan Turkish Brazilian Portuguese Greek : Supported : Supported, but the printer language is displayed in English *1 The PCL 5e printer driver does not support Brazilian Portuguese and Greek.
  • Page 275: Lan-Fax Driver

    1. Introduction *1 Operates in 32-bit compatibility mode on 64-bit operating systems • Display resolution 800 × 600 pixels, 256 colors or higher Supported languages The TWAIN driver uses the same interface language as the one specified by your operating system.
  • Page 276: Font Manager

    Software and Utilities Included on the CD-ROM Font Manager For installing new screen fonts, or organizing and managing fonts already in the system. For details about Font Manager, see the manual on the CD-ROM. File path The software is included in the following folder on the CD-ROM: \FONTMAN\DISK1 •...
  • Page 277: For Mac Os X Users

    1. Introduction For Mac OS X Users If you are using Mac OS X, the following limitations apply to each function: • When using the scanner function, the TWAIN driver cannot be used. • When using the fax function, the LAN-Fax driver cannot be used. •...
  • Page 278: Installing The Printer Driver

    2. Installing the Printer Driver This chapter explains how to install and configure the printer drivers for use on the Windows operating system. Confirming the Connection Method This machine supports network and local connection. Before installing the printer driver, check how the machine is connected. Follow the driver installation procedure that is appropriate to the connection method.
  • Page 279: Local Connection

    2. Installing the Printer Driver • For details about how to install the printer driver for each type of port, see p.14 "Installing the Printer Driver for the Selected Port". Using as a network printer This machine can be used as a remote printer using the Windows or NetWare print server function. Client OS Using Server •...
  • Page 280: Quick Install

    Quick Install Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set. When the machine is connected to a client computer via parallel connection, the printer port is set to [LPT1].
  • Page 281: Installing The Printer Driver For A Network Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Network Connection This section describes the installation procedure of the printer drivers for network connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 282 Installing the Printer Driver for a Network Connection Using the Standard TCP/IP port Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Run AUTORUN.EXE]. Select an interface language, and then click [OK]. For details about the languages supported in the printer drivers, see p.6 "Supported languages".
  • Page 283 2. Installing the Printer Driver • Installation of the certificate is especially necessary for users who want to print via IPP-SSL from Windows Vista/7 or Windows Server 2008/2008 R2. For details, consult your administrator. • If a certificate authority issues a certificate that must be authenticated by an intermediate certificate authority, and the certificate is installed on this machine, an intermediate certificate must be installed on the client computer.
  • Page 284 Installing the Printer Driver for a Network Connection Select the manufacturer and model name of the machine you want to use, and then click [Next]. The installation starts. Follow the instructions that appear. Modify settings such as printer name and default printer configuration, as necessary.
  • Page 285 2. Installing the Printer Driver Using the WSD port • The WSD port can be used under Windows Vista/7, or Windows Server 2008/2008 R2. • You can connect to the printer only if both the printer and computer are on the same network segment, or "Network discovery"...
  • Page 286 Installing the Printer Driver for a Network Connection • To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the printer's icon in the [Network] window, and then click [Uninstall]. Windows 7, Windows Server 2008 R2 Quit all applications.
  • Page 287 2. Installing the Printer Driver Click [Finish]. If installation is successful, the icon of the printer connected to the WSD port will appear in the window for configuring printers. • To stop installation of the selected driver, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the machine's icon in the [Network] window, and then click [Uninstall].
  • Page 288 Installing the Printer Driver for a Network Connection In the [Printer URL] box, enter "http://machine's IP address/printer" as the machine's address. If the server authentication is issued, enter "https://machine's IP address/printer" to enable SSL (a protocol for encrypted communication). Example IP address: 192.168.15.16 http://192.168.15.16/printer https://192.168.15.16/printer You can enter "http://machine's IP address/ipp"...
  • Page 289: Using As A Network Printer

    2. Installing the Printer Driver Click the [Ports] tab, and then click [Configure Port]. The [Port Configuration:] window appears. Windows 7, Windows Server 2008 R2: On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to use, and then click [Printer Properties]. Click the [Ports] tab, and then click [Configure Port].
  • Page 290 Installing the Printer Driver for a Network Connection The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. If installing the PostScript 3 printer driver, proceed to step 7. Select a printer driver you want to use, and then click [Next].
  • Page 291 2. Installing the Printer Driver Select a printer driver you want to use, and then click [Next]. Select the check box of the machine model you want to use. Double-click the machine name to display the printer settings. Click [Port :], and then click [Add] in the [Change settings for 'Port'] box. Click [Network Printer], and then click [OK].
  • Page 292 Installing the Printer Driver for a Network Connection • The protocol is set to inactive as default. Enable the protocol on the control panel, using Web Image Monitor, SmartDeviceMonitor or telnet. Notes when using NetWare Form Feed Do not use NetWare to configure form feed. Form feed is controlled by the printer driver on Windows.
  • Page 293 2. Installing the Printer Driver 5. Click [OK]. Printing after Resetting the Printer Printer to print server connection requires 30 - 40 seconds to resume after the printer is reset. During this period, jobs may be accepted (depending on NetWare specifications) but not printed. To print after resetting the printer as the remote printer, check on the print server that the remote printer is disconnected, or wait for two minutes before trying to print.
  • Page 294: Installing The Printer Driver For A Local Connection

    Installing the Printer Driver for a Local Connection Installing the Printer Driver for a Local Connection This section describes the installation procedure of the printer drivers for USB, parallel, or Bluetooth connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 295 2. Installing the Printer Driver Connect the machine and computer using the USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Select [No, not this time], and then click [Next]. Click [Install from a list or specific location [Advanced]], and then click [Next].
  • Page 296 Installing the Printer Driver for a Local Connection Check that the power of the machine is off. Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. In the [Found New Hardware] window, click [Locate and install driver software (recommended)].
  • Page 297 2. Installing the Printer Driver Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Click [Devices and Printers] from the [Start] menu. Double-Click the icon of machine you want to use in the [Unspecified] category.
  • Page 298: Parallel Connection

    Installing the Printer Driver for a Local Connection Parallel Connection To use a printer connected using a parallel interface, click [LPT1] when installing the printer driver. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Run AUTORUN.EXE].
  • Page 299 2. Installing the Printer Driver Restrictions on SPP, HCRP • A maximum of two Bluetooth adaptor or Bluetooth-equipped computers can be connected at the same time using the Bluetooth interface: one by SPP, one by HCRP. • When connecting more than one Bluetooth adaptor or Bluetooth-equipped computer at the same time, the first device that establishes connection is selected.
  • Page 300 Installing the Printer Driver for a Local Connection Click [Bluetooth Printer], and then click [Next]. The computer begins searching for available Bluetooth printers. If a new printer is discovered, the [Found New Hardware Wizard] window appears. To ignore a discovered device and continue searching, click [Cancel]. The computer resumes searching for other available Bluetooth printers.
  • Page 301 2. Installing the Printer Driver In the [Found New Hardware] window, select the printer driver you want to use, and then click [Next]. The installation starts. If the [Windows Security] window appears, click [Install this driver software anyway]. Click [Close]. If you want to change the printer name, enter the new name in the [Printer Name Settings] window.
  • Page 302: Configuring Option Settings For The Printer

    Configuring Option Settings for the Printer Configuring Option Settings for the Printer When bidirectional communication works correctly, your computer obtains information about option, paper size and paper feed direction settings from the machine automatically. Bidirectional communication also allows you to monitor machine status. When bidirectional communication is disabled, you have to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 303: If Bidirectional Communication Is Disabled

    2. Installing the Printer Driver If Bidirectional Communication is Disabled This section describes how to set up option, paper size and paper feed direction settings on your computer manually. • Manage Printers permission is required to change the printer properties. Log on as an Administrators group member.
  • Page 304: Installing Font Manager

    Installing Font Manager Installing Font Manager • Manage Printers permission is required to install Font Manager. Log on as an Administrators group member. • The operating systems compatible with Font Manager are Windows XP/Vista. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 305 2. Installing the Printer Driver...
  • Page 306: Installing The Scanner Driver

    3. Installing the Scanner Driver This chapter explains how to install the TWAIN driver on a client computer. Installing the TWAIN Driver To use the network TWAIN scanner, you must install the TWAIN driver on a client computer. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 307 3. Installing the Scanner Driver...
  • Page 308: Installing The Facsimile Driver

    4. Installing the Facsimile Driver This chapter explains how to install and configure the LAN-Fax driver on a client computer. Installing the LAN-Fax Driver Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps you edit LAN-Fax transmission destinations. LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover sheets.
  • Page 309: Specifying The Port When Installing The Lan-Fax Driver

    4. Installing the Facsimile Driver Click [LAN-Fax Driver]. The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. Click [Next]. Double-click [Printer Name : <LAN-Fax M(number)>]. Click [Port:].
  • Page 310 Installing the LAN-Fax Driver Procedure/description in the Procedure/description in the Items to be replaced printer driver LAN-Fax driver • Select the check box of the machine model you want to use. The procedures in the [Install Double-click [Printer Name : Printer Driver] dialog box <LAN-Fax M(number)>].
  • Page 311: Enabling The Function To Prevent Transmission To The Wrong Destination

    4. Installing the Facsimile Driver Enabling the Function to Prevent Transmission to the Wrong Destination To enable the function to prevent transmission to the wrong destination, edit the configuration file before you install the driver. This section explains how to edit the configuration file and install the LAN-Fax driver using the edited configuration file.
  • Page 312: Installing The Lan-Fax Driver In "Add Printer

    Enabling the Function to Prevent Transmission to the Wrong Destination Save the configuration file that has been edited. Installing the LAN-FAX driver in "Add Printer" Install the LAN-FAX driver after the configuration file has been edited. Open the printer window. •...
  • Page 313 4. Installing the Facsimile Driver Click [Finish]. When you are prompted to restart your computer, restart it by following the instructions that appear.
  • Page 314: Setting Lan-Fax Driver Properties

    Setting LAN-Fax Driver Properties Setting LAN-Fax Driver Properties • Manage Printers permission is required to set the properties for the LAN-Fax driver. Log on as an Administrators group member. • The method for selecting the LAN-Fax driver will vary according to your operating system. For details, see Windows Help.
  • Page 315: Configuring Option Settings For The Facsimile

    4. Installing the Facsimile Driver Configuring Option Settings for the Facsimile Open the printer windows. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Printers and Faxes]. • Windows Vista, Windows Server 2008: On the [Start] menu, select [Control Panel], and then click [Printers] in [Hardware and Sound] category.
  • Page 316: Troubleshooting

    5. Troubleshooting This chapter provides solutions for driver installation and USB connection problems. Messages Displayed When Installing the Printer Driver This section describes what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using Add Printer Wizard.
  • Page 317 5. Troubleshooting • Available ports vary according to your Windows operating system or the type of interface. For details, see p.11 "Confirming the Connection Method".
  • Page 318: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section describes how to troubleshoot a problem related to USB connections. Problem Causes Solutions The machine is not The USB cable is not Disconnect the USB cable, and then automatically recognized. connected properly.
  • Page 319 5. Troubleshooting...
  • Page 320: Installing The Printer Driver Under Mac Os

    6. Installing the Printer Driver Under Mac OS X This chapter explains how to install and configure the printer drivers for use on the Mac OS X operating system. Installing the PPD Files To print using the printer specific features under Mac OS X, install the PPD files. •...
  • Page 321: Registering The Printer

    6. Installing the Printer Driver Under Mac OS X Registering the Printer To use the machine, the printer must be registered in the printer list. Make sure the machine and computer are connected and turned on, and perform the following procedure.
  • Page 322: Network Connection

    Registering the Printer Click [Choose]. Click [Add]. If the option settings need to be configured, see p.57 "Configuring Option Settings for the Printer Under Mac OS X". Quit Print Center or Printer Setup Utility. Mac OS X 10.4 - 10.6 Start System Preferences.
  • Page 323 6. Installing the Printer Driver Under Mac OS X Select the machine you are using from the [Printer Model:] pop-up menu. If the machine you are using is not selected in [Printer Model:], select its manufacturer or [Other...] in the pop-up menu, and then select the PPD file of the machine. For the location of the PPD files, see p.53 "Installing the PPD Files".
  • Page 324: Configuring Option Settings For The Printer Under Mac Os X

    Configuring Option Settings for the Printer Under Mac OS X Configuring Option Settings for the Printer Under Mac OS X This section explains how to configure the printer driver. Mac OS X 10.2 - 10.3 Start Print Center or Printer Setup Utility in Applications\Utilities. Click [Set Up Printers...].
  • Page 325 6. Installing the Printer Driver Under Mac OS X...
  • Page 326: Appendix

    7. Appendix Updating or Deleting the Driver • Administrator permission is required to update or delete the driver in use. Log on as an Administrators group member. • If the [User Account Control] dialog box appears, click [Yes] or [Continue]. •...
  • Page 327: Deleting The Driver

    7. Appendix Click [OK]. Select the machine model, and then click [Next]. The driver update starts. Click [Finish]. Click [OK] to close the printer properties window. Restart the computer. TWAIN driver You can download the most recent version of the TWAIN driver from the manufacturer's Web site. Delete the old version of the TWAIN driver first, and then install the new TWAIN driver.
  • Page 328 Updating or Deleting the Driver Click [Delete]. Click [OK]. Click [Close] to close the print server properties window. Windows 7, Windows Server 2008 R2 On the [Start] menu, click [Devices and Printers]. Right-click the icon of the machine you want to delete, and then click [Remove Device]. Click [Yes].
  • Page 329 7. Appendix Quit uninstaller.
  • Page 330: Trademarks

    Trademarks Trademarks Adobe, PageMaker, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or countries. Macintosh, and Mac OS are registered trademarks of Apple Inc, registered in the U.S. and other countries. IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States or other countries.
  • Page 331 7. Appendix ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition •...
  • Page 332: Index

    INDEX Network printer..........12, 22 Bidirectional communication........ BIP................Option settings.......... 35, 48, 57 Bluetooth..............Bluetooth printer............ Parallel connection......... 13, 31 PCL............5, 13, 14, 22 CD-ROM..............PostScript 3..........5, 14, 22 Confirming the connection method...... PPD................Connection fails............. Prevent Transmission to the Wrong Destination. . Printer driver..........
  • Page 333 MEMO...
  • Page 334 MEMO...
  • Page 335 MEMO D127-7518...
  • Page 337 D127-7518 © 2011...
  • Page 338 Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 340 TABLE OF CONTENTS Functions That Require Options.........................8 Main Software Products.............................9 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators..............................14 Configuring Administrator Authentication......................15 Specifying Administrator Privileges......................16 Registering and Changing Administrators....................18 Using Web Image Monitor to Configure Administrator Authentication..........21 Administrator Login Method..........................22 Logging in Using the Control Panel......................22 Logging in Using Web Image Monitor......................23...
  • Page 341 Creating the Server Certificate........................49 If the Fax Number Cannot be Obtained....................50 LDAP Authentication............................51 Specifying LDAP Authentication.........................52 Integration Server Authentication........................57 Specifying Integration Server Authentication....................57 Printer Job Authentication..........................63 Printer Job Authentication Levels.........................63 Printer Job Types............................63 "authfree" Command...........................66 Auto Registration to the Address Book......................67 Data Carry-over Setting for Address Book Auto-program...............67 User Lockout Function............................69 Specifying the User Lockout Function......................70...
  • Page 342 Clearing Print Volume Use Counters......................90 Configuring the Auto-Reset Function......................91 4. Preventing Leakage of Information from Machines Protecting the Address Book...........................93 Specifying Address Book Access Permissions...................93 Encrypting Data in the Address Book......................95 Encrypting Data on the Hard Disk........................98 Enabling the Encryption Settings......................100 Backing Up the Encryption Key........................102 Updating the Encryption Key........................103 Canceling Data Encryption........................104...
  • Page 343 User Setting for SSL/TLS...........................134 Setting the SSL/TLS Encryption Mode.....................135 Enabling SSL for SMTP Connections.......................136 Configuring S/MIME............................138 E-mail Encryption............................138 Attaching an Electronic Signature......................140 Specifying Checking of the Certificate Valid Period................142 Configuring PDFs with Electronic Signatures....................144 Selecting the Device Certificate.......................144 Configuring IPsec............................145 Encryption and Authentication by IPsec....................145 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings........146 IPsec Settings.............................147...
  • Page 344 Unauthorized Copy Prevention / Data Security for Copying..............191 Enabling Pattern Printing...........................191 Enabling Data Security for Copying......................193 Printing User Information on Paper.......................194 Managing Locked Print Files.........................197 Deleting Locked Print Files........................197 Changing the Password of a Locked Print File..................199 Unlocking a Locked Print File........................200 Enforced Storage of Documents to be Printed on a Printer................202 7.
  • Page 345 Extended Security Function Settings......................260 Other Security Functions..........................267 Fax Function...............................267 Scanner Function............................268 System Status.............................268 Confirming Firmware Validity........................268 Limiting Machine Operations to Customers Only..................269 Settings...............................269 Additional Information for Enhanced Security....................270 Settings You Can Configure Using the Control Panel................270 Settings You Can Configure Using Web Image Monitor...............272 Settings You Can Configure When IPsec Is Available/Unavailable............273 8.
  • Page 346 Web Image Monitor: Fax..........................344 Web Image Monitor: Scanner........................346 Web Image Monitor: Interface........................349 Web Image Monitor: Network........................351 Web Image Monitor: Security........................355 Web Image Monitor: @Remote........................356 Web Image Monitor: Webpage........................357 Web Image Monitor: Extended Feature Settings..................358 Web Image Monitor: Address Book......................359 Web Image Monitor: Reset Printer Job......................360 Web Image Monitor: Reset the Machine....................361 Web Image Monitor: Device Home Management..................362 Web Image Monitor: Customize Screen per User..................363...
  • Page 347: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Data security for copying function Copy Data Security Unit...
  • Page 348: Main Software Products

    Main Software Products Product name Names in the text DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise Remote Communication Gate S Pro for @Remote Enterprise and Remote Communication Gate S Remote Communication Gate S *1 This product is no longer sold.
  • Page 350: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. 1.
  • Page 351: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. Press the [User Tools/Counter] key.
  • Page 352 Before Using This Machine Enable SSL/TLS. For details about enabling SSL/TLS, see p.132 "Configuring SSL/TLS". Change the administrator's user name and password. For details about specifying administrators' user names and passwords, see p.21 "Using Web Image Monitor to Configure Administrator Authentication". Log out and then close Web Image Monitor.
  • Page 353: Administrators

    1. Getting Started Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 354: Configuring Administrator Authentication

    Configuring Administrator Authentication Configuring Administrator Authentication Administrator authentication is a mechanism by which an administrator ID is confirmed via a login user name and password when an administrator starts to make the various settings of this machine or when accessing the machine from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book.
  • Page 355: Specifying Administrator Privileges

    1. Getting Started A user administrator can register/delete users in the Address Book or change users' personal information. Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again.
  • Page 356 Configuring Administrator Authentication • Be sure not to forget the supervisor login user name and login password. If you do forget them, a service representative will have to return the machine to its default state. This will result in all data in the machine being lost.
  • Page 357: Registering And Changing Administrators

    1. Getting Started Select the settings to manage. The selected settings will be unavailable to users. The available settings (settings that can be made) differ for each administrator. To specify administrator authentication for more than one category, repeat steps 6 to 8. Press [OK].
  • Page 358 Configuring Administrator Authentication Select a category so that administrator settings can be specified from User Administrator, Machine Administrator, Network Administrator and File Administrator. Select the number of the administrator and press [OK]. When assigning privileges to each administrator individually, specify administrator numbers in each category separately.
  • Page 359 1. Getting Started Press [Change] for "Login User Name". Enter the login user name, and then press [OK]. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy and how to specify it, see p.259 "Specifying the Extended Security Functions".
  • Page 360: Using Web Image Monitor To Configure Administrator Authentication

    Configuring Administrator Authentication Usable characters for user names and passwords The following characters can be used for login user names and passwords. Names and passwords are case sensitive. • Upper case letters: A to Z (26 characters) • Lower case letters: a to z (26 characters) •...
  • Page 361: Administrator Login Method

    1. Getting Started Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Press the [User Tools/Counter] key. Press the [Login/Logout] key. CMR636 The login screen appears.
  • Page 362: Logging In Using Web Image Monitor

    Administrator Login Method • If you log in using administrator privilege, the name of the administrator logging in appears. When you log in with a user name that has multiple administrator privileges, one of the administrator privileges associated with that name is displayed. •...
  • Page 363: Administrator Logout Method

    1. Getting Started Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the [Login/Logout] key. Press [Yes]. • You can log out using the following procedures also. •...
  • Page 364: Supervisor

    Supervisor Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If logged in using the supervisor's user name and password, you cannot use normal functions or specify defaults.
  • Page 365 1. Getting Started Press [Program/Change Administrator]. Select the administrator number you want to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [Change] for "Encryption Password". Re-enter the encryption password for confirmation, and then press [OK].
  • Page 366: Changing The Supervisor

    Supervisor Changing the Supervisor This section describes how to change the supervisor's login name and password. To do this, you must enable the user administrator's privileges through the settings under "Administrator Authentication Management". For details, see p.16 "Specifying Administrator Privileges". The supervisor logs in from the control panel.
  • Page 367 1. Getting Started...
  • Page 368: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the personal information in the machine's Address Book, and can use only the functions they are permitted to access by administrators.
  • Page 369: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a process by which the user's ID is confirmed via a login user name and password when the user starts to use this machine or when accessing the machine from a network. CJC010 1.
  • Page 370: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication To control users' access to the machine, perform user authentication using login user names and passwords. There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 371 2. Configuring User Authentication authentication, or Integration Server authentication. In this case, since the User Code authentication does not have a password, the login password is set as blank. • When authentication switches to an external authentication method (Windows authentication, LDAP authentication, or Integration Server authentication), authentication will not occur, unless the external authentication device has the carried over user code account previously registered.
  • Page 372: User Code Authentication

    User Code Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Authentication Information", Connecting the Machine/ System Settings.
  • Page 373 2. Configuring User Authentication Press [Restrict Other Functions]. Select which of the machine's functions you want to limit. If the function you want to select is not displayed, press [ ]. The selected functions are subject to User Code authentication. User Code authentication is not applied to the functions not selected.
  • Page 374 User Code Authentication If you select [Simple (Limitation)], proceed to step 13. Press [Change Limitation Range]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". Pressing [ ] allows you to display all items. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces.
  • Page 375: Basic Authentication

    2. Configuring User Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the personal data in the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 376 Basic Authentication Press [Available Other Functions]. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book.
  • Page 377: Authentication Information Stored In The Address Book

    2. Configuring User Authentication Press [Change Limitation Range]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". Pressing [ ] allows you to display all items. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces.
  • Page 378: Specifying Login User Names And Passwords

    Basic Authentication Specifying Login User Names and Passwords In "Address Book Management", specify the login user name and login password to be used for "User Authentication Management". For the characters that can be used for login user names and passwords, see p.21 "Usable characters for user names and passwords".
  • Page 379: Specifying Login Details

    2. Configuring User Authentication Press [Change] for "Login User Name". Enter a login user name, and then press [OK]. Press [Change] for "Login Password". Enter a login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK].
  • Page 380 Basic Authentication Select the conditions for displaying the address book. Select the user. Press [Auth. Info]. Press [SMTP Authentication]. For folder authentication, press [Folder Authentication]. For LDAP authentication, press [LDAP Authentication]. Select [Use Auth. Info at Login]. Press [OK]. Press [Exit]. Press [OK].
  • Page 381: Windows Authentication

    2. Configuring User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 382 Windows Authentication • During Windows Authentication, data registered in the directory server, such as the user's e-mail address, is automatically registered in the machine. If user information on the server is changed, information registered in the machine may be overwritten when authentication is performed. •...
  • Page 383: Specifying Windows Authentication

    2. Configuring User Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ ] three times.
  • Page 384 Windows Authentication Select [On], and then press [Realm Name]. If you want to use NTLM authentication, proceed to step 11. Select Kerberos authentication realm. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters. For details about registering a realm, see "Programming the Realm", Connecting the Machine/ System Settings.
  • Page 385 2. Configuring User Authentication Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 18. If you select [Simple (Limitation)], proceed to step 15. Press [Change Limitation Range].
  • Page 386 Windows Authentication Press [On], and then press [OK]. If you are not using secure sockets layer (SSL) for authentication, press [Off]. If you have not registered a global group, proceed to step 29. If you have registered a global group, proceed to step 21. If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 387: Installing Internet Information Services (Iis) And Certificate Services

    2. Configuring User Authentication Press [Group Name], and then enter the group name. Press [OK]. Press [Available Other Functions]. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. Windows Authentication will be applied to the selected functions.
  • Page 388: Creating The Server Certificate

    Windows Authentication If they are not installed, install them as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrator Tools], and then click [Server Manager]. Click [Roles] in the left column, click [Add Roles] from the [Action] menu. Click [Next>].
  • Page 389: If The Fax Number Cannot Be Obtained

    2. Configuring User Authentication Enter all the information, and then click [Next]. In "Cryptographic service provider:", select a provider, and then click [Next]. Click [...], and then specify a file name for the certificate request. Specify a location in which to store the file, and then click [Open]. Close [Internet Information Services (IIS) Manager] by clicking [Finish].
  • Page 390: Ldap Authentication

    LDAP Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 391: Specifying Ldap Authentication

    2. Configuring User Authentication Select either Kerberos, DIGEST, or Cleartext authentication. • User Name You do not have to enter the user name if the LDAP server supports "Anonymous Authentication". • Password You do not have to enter the password if the LDAP server supports "Anonymous Authentication".
  • Page 392 LDAP Authentication The machine administrator logs in from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ ] three times. Press [User Authentication Management]. Press [ ]. Select [LDAP Authentication], and then press [Authentication Info] next to it. If you do not want to use user authentication management, select [Off].
  • Page 393 2. Configuring User Authentication Select the LDAP server to be used for LDAP authentication, and then press [OK]. Press [Printer Job Authentication]. Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 15.
  • Page 394 LDAP Authentication Pressing [ ] allows you to display all items. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit]. Press [OK].
  • Page 395 2. Configuring User Authentication Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. LDAP authentication will be applied to the selected functions. Users can use the selected functions only. For details about specifying available functions for individuals or groups, see p.80 "Limiting Available Functions".
  • Page 396: Integration Server Authentication

    Integration Server Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server authentication, single sign-on is possible using DeskTopBinder.
  • Page 397 2. Configuring User Authentication Press [ ]. Select [Integration Server Authentication], and then press [Authentication Info] next to it. If you do not want to use user authentication management, select [Off]. Press [Server Name]. Specify the name of the server for external authentication. Enter the server name, and then press [OK].
  • Page 398 Integration Server Authentication Press [Domain Name]. Enter the domain name, and then press [OK]. You cannot specify a domain name under an authentication system that does not support domain login. Press [Obtain URL]. The machine obtains the URL of the server specified in "Server Name". If "Server Name"...
  • Page 399 2. Configuring User Authentication Press [Program/Change Group], and then press [* Not Programmed]. Press [Group Name]. Enter the group name, and then press [OK]. Press [Available Other Functions]. Select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ ]. Authentication will be applied to the selected functions.
  • Page 400 Integration Server Authentication Press [Printer Job Authentication]. Select the printer job authentication level. For a description of the printer job authentication levels, see p.63 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 30. If you select [Simple (Limitation)], proceed to step 27. Press [Change Limitation Range].
  • Page 401 2. Configuring User Authentication You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit]. Press [OK]. Press [Use Secure Connection (SSL)]. Press [On], and then press [OK].
  • Page 402: Printer Job Authentication

    Printer Job Authentication Printer Job Authentication Printer job authentication refers to the function of authenticating the user for printer jobs. The drivers that handle user authentication are PCL or PostScript3. PostScript3 only handles User Code authentication. Printer Job Authentication Levels •...
  • Page 403 2. Configuring User Authentication Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver. 2. The [User Authentication] and [With Encryption] check boxes are selected in the PCL mini- driver * The authentication function cannot be used with IA-64 OS.
  • Page 404 Printer Job Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 405: Authfree" Command

    2. Configuring User Authentication "authfree" Command When [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command makes it possible to specify objects to be excluded from printer job authentication. The default user name for logging in to telnet is "admin". No password is configured. For details on how to login to and use telnet, see "Using telnet", Connecting the Machine/ System Settings.
  • Page 406: Auto Registration To The Address Book

    Auto Registration to the Address Book Auto Registration to the Address Book If a user logs in via Windows, LDAP or Integration Server authentication, their personal information is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 407 2. Configuring User Authentication Press [Carry-over Data]. Press [Change]. Use the number keys to enter the registration number of the Address Book that will use the setting content and press [ ]. Press [OK]. Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 408: User Lockout Function

    User Lockout Function User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 409: Specifying The User Lockout Function

    2. Configuring User Authentication Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 410: Auto Logout

    Auto Logout Auto Logout When using Basic authentication, Windows authentication, LDAP authentication or Integration Server authentication, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 411 2. Configuring User Authentication • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function.
  • Page 412: Authentication Using An External Device

    Authentication Using an External Device Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 413 2. Configuring User Authentication...
  • Page 414: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The destination of faxes and scanned documents can be restricted to addresses that are registered in the Address Book.
  • Page 415 3. Restricting Machine Usage Press [ ]. Press [Restrict Use of Destinations (Fax)] or [Restrict Use of Destinations (Scanner)]. Press [On]. Press [OK]. Press [Exit]. Log out. • If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear.
  • Page 416: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 417: Menu Protect

    3. Restricting Machine Usage Menu Protect In addition to the System Settings, Menu Protect limits user permission to access the initial settings menu for each function. This function is also effective when management is not based on user authentication. To change the menu protect setting, first enable administrator authentication. For details on how to set administrator authentication, see p.15 "Configuring Administrator Authentication".
  • Page 418 Menu Protect Printer Function The machine administrator logs in from the control panel. Press [Printer Features]. Press [Maintenance]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function The machine administrator logs in from the control panel. Press [Scanner Features].
  • Page 419: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Available functions Specify the available functions from the copier, Document Server, fax, scanner, printer, and browser functions. Specifying Which Functions are Available Specify the functions available to registered users.
  • Page 420 Limiting Available Functions Press [Auth. Info]. Press [ ]. Press [Available Other Functions]. Select the functions you want to specify. Press [OK]. Log out.
  • Page 421: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 422: Managing Print Volume Per User

    Managing Print Volume per User Managing Print Volume per User This function limits how much each user can print. When a user reaches their printing limit, their print job is canceled and/or a message indicating so is displayed. Either the user administrator or the machine administrator can specify the print volume available to a user.
  • Page 423: Specifying Limitations For Print Volume

    3. Restricting Machine Usage • Under Windows or LDAP authentication, a user logs in to the same user account by using multiple login user names, and these multiple login names are registered in the Address Book as separate users. The following operations are exempt from print volume limitation: •...
  • Page 424 Managing Print Volume per User Press [Print Volume Use Limitation: Unit Count Setting]. For each print condition, use the number keys to enter a per-page unit count between "0" and "200", and then press [ ]. If you specify "0" for a print condition, no volume restriction is applied to jobs matching that condition.
  • Page 425: Specifying The Default Maximum Use Count

    3. Restricting Machine Usage • Depending on the settings configured for User Code authentication, users might be able to make prints before logging in, regardless of the print volume limitation set by the administrator. Restrict all functions in [User Code Authentication] in [User Authentication Management]. Specifying the Default Maximum Use Count The machine administrator logs in from the control panel.
  • Page 426 Managing Print Volume per User Press [Change]. Select the conditions for displaying the address book. Select the user whose maximum available print volume you want to specify. Press [Auth. Info]. Press [Print Volum. Use Limit.]. Press [Limit]. "Print Volum. Use Limit." does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached".
  • Page 427: Checking Print Volume Per User

    3. Restricting Machine Usage Press [Change], and then use the number keys to enter a value between "0" and "999,999" as the maximum available print volume, and then press [ ]. A user whose maximum print volume is set to "0" can only print jobs whose print conditions match those with a unit value of "0".
  • Page 428: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User Press [Display/Clear/Print Counter per User]. Press [Print Volume Use Cntr.]. Each user's print volume limit and print volume used to date are displayed. After confirming the settings, log out. • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters.
  • Page 429: Clearing Print Volume Use Counters

    3. Restricting Machine Usage To print a list of the volume use counters of every user, press [Print List] under "All Users". To print a list of the volume use counters of selected users only, select the users whose counters you want to print, and then press [Print List] under "Per User". Select the counter you want to print in the list, and then press [Print].
  • Page 430: Configuring The Auto-Reset Function

    Managing Print Volume per User To clear the print volume use counters of every user, press [Clear] under "All Users". To clear the print volume use counters of selected users only, select the users whose counters you want to clear, and then press [Clear] under "Per User". Select [Prt Volum Use], and then press [OK].
  • Page 431 3. Restricting Machine Usage Press [Administrator Tools]. Press [ ] three times. Press [Volm Use Cntr:Scheduld/Specfid Rst Stng]. Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions. Press [OK]. Log out. • If the machine is off at the specified time, the volume is reset when the power is turned on. •...
  • Page 432: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 433 4. Preventing Leakage of Information from Machines Press [Protection]. Press [Protect Destination]. Press [Permissions for Users/Groups: Program/Change/Delete]. Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK].
  • Page 434: Encrypting Data In The Address Book

    Protecting the Address Book Select the user to whom you want to assign access permission, and then select the permission. Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control]. Press [OK]. Press [Exit] twice. Log out. • The "Edit", "Edit/Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 435 4. Preventing Leakage of Information from Machines Press [On], and then press [Change Encryption Key]. Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt/Decrypt]. Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the Address Book may take a long time.
  • Page 436 Protecting the Address Book • The backup copy of the address book data stored in the SD card is encrypted. For details about backing up and then restoring the address book using an SD card, see "Administrator Tools", Connecting the Machine/ System Settings.
  • Page 437: Encrypting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Encrypting Data on the Hard Disk • Keep SD cards out of reach of children. If a child accidentally swallows an SD card, consult a doctor immediately. Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written.
  • Page 438 Encrypting Data on the Hard Disk Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approximately 2 Only Architecture (stored documents in hours applications' Document Server, program/log Locked Print files / Sample Print files / •...
  • Page 439: Enabling The Encryption Settings

    4. Preventing Leakage of Information from Machines Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 440 Encrypting Data on the Hard Disk Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 441: Backing Up The Encryption Key

    4. Preventing Leakage of Information from Machines If you have selected [Print on Ppr], press the [Start] key and print out the machine's data encryption key. Press [OK]. Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine.
  • Page 442: Updating The Encryption Key

    Encrypting Data on the Hard Disk Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally. • The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption key safely for retrieving backup data.
  • Page 443: Canceling Data Encryption

    4. Preventing Leakage of Information from Machines Canceling Data Encryption Use the following procedure to cancel the encryption settings when encryption is no longer necessary. • After completing this procedure on the machine's control panel, turn off the power and restart the machine to enable the new settings.
  • Page 444: Deleting Data On The Hard Disk

    Deleting Data on the Hard Disk Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 445 4. Preventing Leakage of Information from Machines Overwriting starts automatically once the job is completed. The copier, fax and printer functions take priority over the Auto Erase Memory function. If a copy, fax or print job is in progress, overwriting will only be done after the job is completed. Checking the Auto Erase Memory status If Auto Erase Memory is enabled, you can use the "Check Status"...
  • Page 446 Deleting Data on the Hard Disk Icon Icon name Explanation This icon is lit when there is temporary data to be overwritten, Dirty and blinks during overwriting. Clear This icon is lit when there is no temporary data to be overwritten. •...
  • Page 447 4. Preventing Leakage of Information from Machines Using Auto Erase Memory • When Auto Erase Memory is set to [On], temporary data that remained on the hard disk when Auto Erase Memory was set to [Off] might not be overwritten. •...
  • Page 448 Deleting Data on the Hard Disk Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ]. Press [OK]. Auto Erase Memory is set. Log out. • If you specify to both overwrite and encrypt the data, the data will all be encrypted. Canceling Auto Erase Memory Follow steps 1 to 5 in "Using Auto Erase Memory".
  • Page 449: Erase All Memory

    4. Preventing Leakage of Information from Machines • Scanned files sent by e-mail • Files sent by Scan to Folder • Documents sent using DeskTopBinder, the ScanRouter delivery software or Web Image Monitor • Network TWAIN scanner Data scanned with network TWAIN scanner will not be overwritten by Auto Erase Memory. However, If the "ADF(Read-ahead)"...
  • Page 450 Deleting Data on the Hard Disk • The "Erase All Memory" function also clears the machine's security settings, with the result that afterward, neither machine nor user administration will be effective. Ensure that users do not save any data on the machine after "Erase All Memory" has completed. Using Erase All Memory Disconnect communication cables connected to the machine.
  • Page 451 4. Preventing Leakage of Information from Machines Press [Yes]. When overwriting is completed, press [Exit], and then turn off the main power. Before turning the power off, see "Turning On/Off the Power", Getting Started. • Should the main power switch be turned off before "Erase All Memory" is completed, overwriting will continue once the main power switch is turned back on.
  • Page 452: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 453: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel, or using Web Image Monitor, telnet, SmartDeviceMonitor for Admin or Remote Communication Gate S.
  • Page 454 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require FTP cannot be used. • Web Image Monitor You can restrict • telnet personal information • SmartDeviceMonitor TCP:21 from being displayed for Admin by making settings on •...
  • Page 455 5. Enhanced Network Security Protocol Port Setting method When disabled Functions that require HTTPS cannot be used. @Remote cannot be • Web Image Monitor used. • telnet HTTPS TCP:443 You can also make • SmartDeviceMonitor settings to require SSL for Admin transmission using the control panel or Web Image Monitor.
  • Page 456 Enabling and Disabling Protocols Protocol Port Setting method When disabled Functions that require SNMPv3 cannot be used. • Web Image Monitor You can also make • telnet settings to require • SmartDeviceMonitor SNMPv3 encrypted SNMPv3 UDP:161 for Admin transmission and restrict the use of other •...
  • Page 457 5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet IPP functions cannot be • SmartDeviceMonitor TCP:631 used. for Admin • Remote Communication Gate S TCP:1720 (H.323) UDP:1719 (Gatekeeper) • Control panel TCP/UDP:5060 • Web Image Monitor IP-Fax connecting (SIP) functions using H.323,...
  • Page 458 Enabling and Disabling Protocols Protocol Port Setting method When disabled • Web Image Monitor • telnet DIPRINT functions • SmartDeviceMonitor DIPRINT TCP:9100 cannot be used. for Admin • Remote Communication Gate S You can attempt to • Control panel TCP:10021 update firmware via •...
  • Page 459: Enabling And Disabling Protocols Using The Control Panel

    5. Enhanced Network Security Protocol Port Setting method When disabled • Web Image Monitor • telnet WSD (Scanner) TCP-53002 • SmartDeviceMonitor WSD (Scanner) functions cannot be (variable) for Admin used. • Remote Communication Gate S WSD (Device, Printer, • telnet Scanner) search WS-Discovery UDP/TCP:3702...
  • Page 460: Enabling And Disabling Protocols Using Web Image Monitor

    Enabling and Disabling Protocols Press [Effective Protocol]. Set the desired protocols to active/inactive. If the protocol you want to select is not displayed, press [ ]. Press [OK]. Press [Exit]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor.
  • Page 461: Specifying Network Security Level

    5. Enhanced Network Security Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 462: Specifying Network Security Level Using Web Image Monitor

    Specifying Network Security Level Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 463: Status Of Functions Under Each Network Security Level

    5. Enhanced Network Security Status of Functions under Each Network Security Level TCP/IP Function Level 0 Level 1 FIPS 140 Level 2 TCP/IP Active Active Active Active HTTP > Port 80 Open Open Open Open IPP > Port 80 Open Open Open Open...
  • Page 464 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 SSDP Active Active Inactive Inactive Active Active Inactive Inactive NetBIOS over TCP/IPv4 Active Active Inactive Inactive WSD (Device) Active Active Active Active WSD (Printer) Active Active Active Active WSD (Scanner) Active...
  • Page 465 5. Enhanced Network Security TCP/IP Encryption Strength Setting Function Level 0 Level 1 FIPS 140 Level 2 ssh > Encryption Algorithm DES/ 3DES/ 3DES/ 3DES/ 3DES/ AES-128/ AES-128/ AES-128/ AES-128/ AES-192/ AES-192/ AES-192/ AES-192/ AES-256/ AES-256 AES-256 AES-256/ Arcfour Blowfish/ Arcfour S/MIME >...
  • Page 466: Protecting The Communication Path Via A Device Certificate

    Protecting the Communication Path via a Device Certificate Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. To use these protocols, it is necessary to create and install a device certificate for the machine in advance.
  • Page 467: Creating And Installing A Device Certificate From Web Image Monitor (Self-Signed Certificate)

    5. Enhanced Network Security Press [Program]. Select [Delete] to delete the device certificate from the machine. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. Press [ ] to flip through pages. To use S/MIME, specify the e-mail address of the administrator of the machine in the mail address setting.
  • Page 468: Creating The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Make the necessary settings. To use S/MIME, set up the e-mail address of the administrator of the machine in the mail address setting. Click [OK]. The setting is changed. Click [OK]. If a security warning dialog box appears, check the details, and then click [OK]. "Installed"...
  • Page 469: Installing The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security For the application, click Web Image Monitor Details icon and use the information that appears in "Certificate Details". • The issuing location may not be displayed if you request two certificates at the same time. When you install a certificate, be sure to check the certificate destination and installation procedure.
  • Page 470: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority. If you do not have the intermediate certificate issued by the certificate authority, a warning message will appear during communication.
  • Page 471: Configuring Ssl/Tls

    5. Enhanced Network Security Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so makes it possible to prevent data from being intercepted during transmission, and its content from being analyzed or tampered with. Flow of SSL/TLS encrypted communications 1.
  • Page 472: Enabling Ssl/Tls

    Configuring SSL/TLS Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 473: User Setting For Ssl/Tls

    5. Enhanced Network Security Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 474: Setting The Ssl/Tls Encryption Mode

    Configuring SSL/TLS • Select [Trusted Root Certification Authorities] for the certificate store location when accessing the machine by IPP. • If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store location with the certificate authority. •...
  • Page 475: Enabling Ssl For Smtp Connections

    5. Enhanced Network Security Press [Permit SSL/TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 476 Configuring SSL/TLS In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out. •...
  • Page 477: Configuring S/Mime

    5. Enhanced Network Security Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 478 Configuring S/MIME 2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the certificate is specified in the Address Book.) 3. Specify the encryption algorithm using Web Image Monitor. 4. Using the shared key, encrypt the e-mail message. 5.
  • Page 479: Attaching An Electronic Signature

    5. Enhanced Network Security Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 480 Configuring S/MIME 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 481: Specifying Checking Of The Certificate Valid Period

    5. Enhanced Network Security Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending Email by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax"...
  • Page 482 Configuring S/MIME Operation mode Description Performance Priority Performing (c) and (d) are omitted. If it takes a long time to verify the validity period when the address is selected or when the [Start] key is pressed, operation can be completed quicker by selecting "Performance Priority".
  • Page 483: Configuring Pdfs With Electronic Signatures

    5. Enhanced Network Security Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 484: Configuring Ipsec

    Configuring IPsec Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine has two methods that you can use to specify the shared encryption key for both parties: encryption key auto exchange and encryption key manual settings.
  • Page 485: Encryption Key Auto Exchange Settings And Encryption Key Manual Settings

    5. Enhanced Network Security • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 486: Ipsec Settings

    Configuring IPsec Settings 1-4 and default setting Using either the manual or auto exchange method, you can configure four separate sets of SA details (such as different shared keys and IPsec algorithms). In the default settings of these sets, you can include settings that the fields of sets 1 to 4 cannot contain.
  • Page 487 5. Enhanced Network Security Security level Security level features Select this level if you want to authenticate the transmission partner and prevent unauthorized data tampering, but not perform data packet encryption. Authentication Only Since the data is sent in cleartext, data packets are vulnerable to eavesdropping attacks.
  • Page 488 Configuring IPsec Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption Phase 1 Diffie- Hellman Group Phase 2 Security Protocol HMAC- HMAC- SHA512-256/ SHA512-256/ Phase 2 HMAC- HMAC- HMAC-SHA512-256/ Authentication SHA384-192/ SHA384-192/ HMAC-SHA384-192/ Algorithm HMAC- HMAC- HMAC-SHA256-128 SHA256-128/ SHA256-128/...
  • Page 489 5. Enhanced Network Security Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 490 Configuring IPsec Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners. a PSK password using up to (auto setting) 32 ASCII characters.
  • Page 491 5. Enhanced Network Security Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 492 Configuring IPsec Encryption key manual settings items Setting Description Setting value • Inactive Specify the address • IPv4 Address Type type for which IPsec • IPv6 transmission is used. • IPv4/IPv6 (Default Settings only) Specify the machine's The machine's IPv4 or IPv6 address. address.
  • Page 493 5. Enhanced Network Security Setting Description Setting value To apply both encryption and authentication to sent • ESP data, specify "ESP" or Security Protocol • AH "ESP+AH". • ESP+AH To apply authentication data only, specify "AH". • HMAC-MD5-96 • HMAC-SHA1-96 Specify the Authentication authentication...
  • Page 494 Configuring IPsec Setting Description Setting value • Cleartext (NULL encryption) • DES • 3DES Specify the Encryption Algorithm encryption algorithm. • AES-128 • AES-192 • AES-256 Specify a value within the ranges shown below, according to the encryption algorithm. hexadecimal value 0-9, a-f, A-F •...
  • Page 495: Encryption Key Auto Exchange Settings Configuration Flow

    5. Enhanced Network Security Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings...
  • Page 496 Configuring IPsec Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission. Click [OK]. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], click the web browser's [Reload] button.
  • Page 497 5. Enhanced Network Security On the [Start] menu, click [Control Panel], click [System and Security], and then click [Administrative Tools]. If you are using Windows XP, on the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then click [Administrative Tools]. Double-click [Local Security Policy].
  • Page 498 Configuring IPsec Select "A specific IP Address or Subnet" in "Destination address", enter the machine's IP address, and then click [Next]. Select the protocol type for IPsec, and then click [Next]. If you are using IPsec with IPv6, select "58" as the protocol number for the "Other" target protocol type.
  • Page 499: Encryption Key Manual Settings Configuration Flow

    5. Enhanced Network Security Select the security policy that was just created, right click, and then click [Assign]. IPsec settings on the computer are enabled. • To disable the computer's IPsec settings, select the security policy, right click, and then click [Un- assign].
  • Page 500: Telnet Setting Commands

    Configuring IPsec Specifying Encryption Key Manual Settings Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPsec] under "Security". Select [Active] for "Encryption Key Manual Settings". Click [Edit] under "Encryption Key Manual Settings". Set items for encryption key manual settings in [Settings 1].
  • Page 501 5. Enhanced Network Security • Encryption key manual settings, SA setting 1-4 values • Encryption key manual settings, default setting values • Encryption key auto exchange settings, IKE setting 1-4 values • Encryption key auto exchange settings, IKE default setting values Display current settings portions msh>...
  • Page 502 Configuring IPsec • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the setting number [1-4]. • To disable the default settings, specify [default]. Specify the local/remote address for settings 1-4 msh>...
  • Page 503 5. Enhanced Network Security Tunnel end point setting msh> ipsec manual {1|2|3|4|default} tunneladdar "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address. • Not specifying either the beginning or ending address displays the current settings. Authentication algorithm and authentication key settings msh>...
  • Page 504 Configuring IPsec • To display the settings 1-4, specify the number [1-4]. • To display the default setting, specify [default]. • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the number [1-4]. •...
  • Page 505 5. Enhanced Network Security • If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify [use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec transmission is performed. •...
  • Page 506 Configuring IPsec ISAKMP SA (phase 1) encryption algorithm setting msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des|aes128|aes192|aes256} • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) encryption algorithm. • Not specifying an encryption algorithm displays the current setting. ISAKMP SA (phase 1) Diffie-Hellman group setting msh>...
  • Page 507 5. Enhanced Network Security • Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) Diffie- Hellman group number. • Specify the group number to be used. • Not specifying a group number displays the current setting. IPsec SA (phase 2) validity period setting msh>...
  • Page 508: Installing A Site Certificate

    Configuring IEEE 802.1X Authentication Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 509: Selecting The Device Certificate

    5. Enhanced Network Security Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see p.127 "Protecting the Communication Path via a Device Certificate".
  • Page 510 Configuring IEEE 802.1X Authentication • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 511: Setting Items Of Ieee 802.1X For Wireless Lan

    5. Enhanced Network Security • If there is a problem with settings, you might not be able to communicate with the machine. To identify the problem, print a network summary. • If you cannot identify the problem, reset the machine interface to normal, and then repeat the procedure from the beginning.
  • Page 512 Configuring IEEE 802.1X Authentication • Click [Change] in "Password", and then enter the password set in the RADIUS server. If [TLS] is selected for "Phase 2 Method", you do not need to specify a password. • Click [Change] on "Phase 2 User Name", and then enter the user name set in the RADIUS server.
  • Page 513: Snmpv3 Encryption

    5. Enhanced Network Security SNMPv3 Encryption When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. The network administrator logs in from the control panel. Press [System Settings].
  • Page 514 SNMPv3 Encryption • If network administrator's [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent. For details about specifying the network administrator's [Encryption Password] setting, see p.18 "Registering and Changing Administrators".
  • Page 515: Encrypting Transmitted Passwords

    5. Enhanced Network Security Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security of passwords against analysis. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together.
  • Page 516: Specifying An Ipp Authentication Password

    Encrypting Transmitted Passwords Press [Extended Security]. Press [Driver Encryption Key]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 517 5. Enhanced Network Security Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password" box. Click [OK]. IPP authentication is specified. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], click the web browser's [Reload] button.
  • Page 518: Kerberos Authentication Encryption Setting

    Kerberos Authentication Encryption Setting Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 519 5. Enhanced Network Security...
  • Page 520: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Configuring Access Permissions for Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server.
  • Page 521: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents • The default access permission for the file creator (owner) is "Read-only". You can also specify the access permission. • The document administrator not only configures access permissions, but can also delete stored files. For details on the methods of deleting documents, see "Deleting Stored Documents", Copy/ Document Server.
  • Page 522 Configuring Access Permissions for Stored Files Select the file. Press [Confirm/Change]. Press [Change File Info.]. Press [Change Access Privilege].
  • Page 523 6. Preventing the Leaking of Documents Press [Program/Change/Delete] for "Permissions for Users/Groups". Press [New Program]. Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK].
  • Page 524: Changing The Owner Of A Document

    Configuring Access Permissions for Stored Files Press [Exit]. Press [OK]. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. • The "Edit", "Edit/Delete", and "Full Control" access permissions allow a user to perform high level operations that could result in loss of or changes to sensitive information.
  • Page 525 6. Preventing the Leaking of Documents • If files become inaccessible, be sure to enable the user administrator, so that the user administrator can reset the access permission for the files in question. The user administrator or the file creator (owner) logs in from the control panel. Press [Address Book Mangmnt].
  • Page 526 Configuring Access Permissions for Stored Files Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [OK]. Select the user to whom you want to assign access permission, and then select the permission.
  • Page 527: Specifying Passwords For Stored Files

    6. Preventing the Leaking of Documents Specifying Passwords for Stored Files This can be specified by the file administrator or file creator (owner). The file administrator or the file creator (owner) logs in from the control panel. Press the [User Tools/Counter] key to switch to the normal screen. If the message "You do not have the privileges to use this function."...
  • Page 528: Unlocking Stored Files

    Specifying Passwords for Stored Files Press [Change File Info.]. Press [Change Password]. Enter the password using the number keys. You can use 4 to 8 numbers as the password for the stored file. Press [OK]. Confirm the password by re-entering it using the number keys. Press [OK] twice.
  • Page 529 6. Preventing the Leaking of Documents Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. If the message ""You do not have the privileges to use this function."" appears, press [Exit]. Select the file.
  • Page 530: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying In Printer Features, using the printer driver, you can embed a pattern in the printed copy to discourage or prevent unauthorized copying. The unauthorized copy prevention function prevents unauthorized copies of documents by embedding a text pattern (for instance, a warning such as "No Copying") that you can set on the print driver (which will appear on printed copies).
  • Page 531 6. Preventing the Leaking of Documents Press [Unauthd. Copy Prevention]. Press [Unauthorized Copy Prevention Stg.]. Press [On], and then press [OK]. Press [Setting Priority (Drvr/Cmnd/Mach)]. Select the range within which the user can specify the pattern to be printed using the printer driver.
  • Page 532: Enabling Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying • For details of the settings when specifying the pattern using the machine, see "Printer Features", Print. Enabling Data Security for Copying To use this function, the Copy Data Security Unit must be installed. If a document printed is copied, faxed, scanned, or stored in the Document Server, the copy is grayed out.
  • Page 533: Printing User Information On Paper

    6. Preventing the Leaking of Documents Printing User Information on Paper Information such as the start time of a job, information on the person who outputs it (name or login user name), machine number or IP address of the machine can be forced to be printed on paper. This function is called Compulsory Security Stamp.
  • Page 534 Printing User Information on Paper • Date/Time The time a job starts is printed. • Printout User Name If "Stamp User Name" is selected, the "Name" in the "Names" in the Address Book is printed. If "Stamp Login User Name" is selected, the "Login User Name" in the "Auth. Info" in the Address Book is printed.
  • Page 535 6. Preventing the Leaking of Documents Set the stamp position. Press [OK] twice. Log out.
  • Page 536: Managing Locked Print Files

    Managing Locked Print Files Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function. Locked Print •...
  • Page 537 6. Preventing the Leaking of Documents Press [Print Jobs]. Press [Locked Jobs]. Select the file. Press [Delete]. If a password entry screen appears, enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 538: Changing The Password Of A Locked Print File

    Managing Locked Print Files • You can configure this machine to delete stored files automatically by setting the "Auto Delete Temporary Print Jobs" option to [On]. For details about "Auto Delete Temporary Print Jobs", see "Maintenance", Print. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. Changing the Password of a Locked Print File This can be specified by the file administrator or file creator (owner).
  • Page 539: Unlocking A Locked Print File

    6. Preventing the Leaking of Documents Press [Change Passwd]. If a password entry screen appears, enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK].
  • Page 540 Managing Locked Print Files Select the file. icon appears next to a file locked by the Enhance File Protection function. Press [Unlock File]. Press [Yes]. icon disappears. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 541: Enforced Storage Of Documents To Be Printed On A Printer

    6. Preventing the Leaking of Documents Enforced Storage of Documents to be Printed on a Printer Enforced storage of documents to be printed on a printer prevents information leakage due to users failing to collect prints or leaving prints unattended. With respect to printer output, the following print jobs are subject to compulsory storage.
  • Page 542: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 543 7. Managing the Machine Disabling log transfer to the log collection server Use the following procedure to disable log transfer from the machine to the log collection server. Note that you can change the log transfer setting to [Off] only if it is already set to [On]. For details about the log collection server, contact your sales representative.
  • Page 544: Managing Logs From The Log Collection Server

    Managing Log Files Press [Yes]. Press [Exit]. Log out. • Deleting all logs from the machine as a batch can be achieved by either using the log collection server or via Web Image Monitor if the collection setting of one of the logs — job log, access log or eco-friendly log is enabled.
  • Page 545 7. Managing the Machine Select [Active] for each function: "Collect Job Logs", "Collect Access Logs" and "Collect Eco-friendly Logs". Specify the collection level for each function, "Job Log Collect Level", "Access Log Collect Level", and "Eco-friendly Log Collect Level". When a level is changed, the selection status of log details changes according to the level. To change individual items of the log details, configure the setting for each item.
  • Page 546: Downloading Logs

    Managing Log Files Click [OK]. A confirmation message appears. Click [OK]. Log out. • To encrypt the logs, it is necessary to make the collection setting active for each of the job logs, access logs, and/or eco-friendly log. • If the data stored in the machine has been encrypted, the log files will still be encrypted, regardless of this setting.
  • Page 547 7. Managing the Machine Log out. • Downloaded logs contain data recorded up till the time you click the [Download] button. Any logs recorded after the [Download] button is clicked will not be downloaded. The "Result" field of the log entry for uncompleted jobs will be blank. •...
  • Page 548 Managing Log Files Estimated number of logs created per day Job logs Access logs Eco-friendly logs 100 (per day) 100 (per day) This figure is based on 100 operations such as initialization and access operations over the Web and 200 access log entries (two entries per job: one login and one logout).
  • Page 549 7. Managing the Machine If logs are downloaded without overwriting CJD006 1. Access log 2. Job log 3. Download 4. Downloaded logs If logs are downloaded during overwriting CJD007...
  • Page 550 Managing Log Files 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs. •...
  • Page 551: Logs That Can Be Managed Using Web Image Monitor

    7. Managing the Machine Print job flowchart ID: 0x00000000000022c5 ID: 0x00000000000022c6 ID: 0x00000000000022c5 ID: 0x00000000000022c5 ID: 0x00000000000022c7 CJD008 1. Print job data is received. 2. Authentication (login) data is received. 3. Print job is processed. 4. Print job is output. 5.
  • Page 552 Managing Log Files Job log information items Job Log Item Log Type Attribute Content Copier: Copying Copier: Copying Details of normal and Sample Copy jobs. Copier: Copying and Copier: Copying and Details of files stored in Document Server that Storing Storing were also copied at the time of storage.
  • Page 553 7. Managing the Machine Job Log Item Log Type Attribute Content Printer: Locked Print Printer: Locked Print Log showing Locked Print documents temporarily stored on the machine and then printed from the control panel or through Web Image Monitor. Printer: Sample Print Printer: Sample Print Log showing Sample Print documents (Incomplete)
  • Page 554 Managing Log Files Job Log Item Log Type Attribute Content Printer: Hold Print File Printer: Hold Print File When a document is held for printing and Printing Printing stored temporarily on the machine, this logs the time a user specifies it be printed via the control panel or Web Image Monitor.
  • Page 555 7. Managing the Machine Access Log Item Log Type Attribute Content Unauthorized Unauthorized Details of documents scanned with "Data Copying Copying Security for Copying". All Logs Deletion All Logs Deletion Details of deletions of all logs. Log Setting Change Log Setting Change Details of changes made to log settings.
  • Page 556 Managing Log Files Access Log Item Log Type Attribute Content Password Change Password Change Details of changes made to the login password. Administrator Change Administrator Change Details of changes of administrator. Address Book Change Address Book Change Details of changes made to address book entries.
  • Page 557: Attributes Of Logs You Can Download

    7. Managing the Machine Eco-friendly log information items Eco-friendly Log Item Log Type Attribute Content Main Power On Main Power On Log of when the main power switch is turned Main Power Off Main Power Off Log of when the main power switch is turned off.
  • Page 558 Managing Log Files • Output Format: CSV (Comma-Separated Values) • File Names of Job Logs and Access Logs: "machine name +_log.csv" • File names for Eco-friendly Logs: "machine name+_ecolog.csv" Order of log entries Log entries are printed in ascending order according to Log ID. File structure The data title is printed in the first line (header line) of the file.
  • Page 559 7. Managing the Machine Job and access log information items Item Content Start Date/Time For a job log entry, indicates the start date and time of the operation. If the job has not been completed, this is blank. For an access log entry, indicates the same date and time as shown by "End Date/Time".
  • Page 560 Managing Log Files Item Content Status Indicates the status of an operation or event: • If "Completed" is displayed for a job log entry, the operation completed successfully; "Failed" indicates the operation was unsuccessful; "Processing" indicates the operation is still in progress. •...
  • Page 561 7. Managing the Machine Item Content Status The status of an operation or event is recorded. (For importing and exporting If importing or exporting is executed by another user, device information) "Importing/Exporting by Other User" is recorded. If a connection to an output destination fails, "Connection Failed with Remote Machine"...
  • Page 562 Managing Log Files Item Content Status Supplement If the status of a log is abnormal termination (Failed), the status is recorded. If it does not terminate abnormally, nothing is recorded. If a user cancels an operation, "Cancelled by User" is recorded.
  • Page 563 7. Managing the Machine Item Content Status Supplement If the number of pages that can be captured is exceeded, "Exceed Max. Stored Page (Image Area)" is recorded. (If the Source is a Stored File) If the hard disk capacity for capture is exceeded, "Hard Disk Full (Image Area)"...
  • Page 564 Managing Log Files Item Content Status Supplement If the number of jobs that can be received is exceeded, "Over Job Limit" is recorded. (If the Source is a Printer) If an illegal address or an address with 41 or more digits is specified, "Specifying Destination Error"...
  • Page 565 7. Managing the Machine Item Content Status Supplement If the accounting device is unplugged during operation, "External Charge Unit Disconnected" is recorded. (If the Target is Store) If the logged in user exceeds their paper usage limit, "Exceeded Print Volume Use Limitation" is recorded. If a time-out occurs, "Timeout"...
  • Page 566 Managing Log Files Item Content Status Supplement If a time-out occurs, "Timeout" is recorded. (If the Target is Send 1) If a document is deleted or an undelivered document exceeds its wait time and is deleted, "Transmission Failed (Data Deleted)" is recorded. If the user does not have permission to use a document or function, "No Privilege"...
  • Page 567 7. Managing the Machine Item Content User Entry ID Indicates the user's entry ID. This is a hexadecimal ID that identifies users who performed job or access log-related operations: For supervisors, only 0xffffff86 is available; for administrators, 0xffffff87, 0xffffff88, 0xffffff89, and 0xffffff8a are available. For general users, any value between 0x00000001 and 0xfffffeff is available.
  • Page 568 Managing Log Files Stored File Sending", "Printer: Stored File Printing", and "Fax: Stored File Downloading" (Job logs) and "File Storing" and "Stored File Deletion" (Access logs). Access log information items Item Content Access Log Type Indicates the type of access: "Authentication"...
  • Page 569 7. Managing the Machine Item Content Login User Type Indicates the type of login user: "User" indicates the logged in user was a registered general user. "Guest" indicates the logged in user was a guest user. "File Administrator" indicates the logged in user was a registered file administrator.
  • Page 570 Managing Log Files Item Content Lockout/Release The mode of operation access. "Lockout" indicates activation of password lockout; "Release" indicates deactivation of password lockout. Lockout Release Method "Manual" is recorded if the machine is unlocked manually. "Auto" is recorded if the machine is unlocked by the lockout release timer.
  • Page 571 7. Managing the Machine Item Content Collect Access Logs Indicates the status of the access log collection setting: "Active" indicates access log collection is enabled. "Inactive" indicates access log collection is disabled. "Not Changed" indicates no changes have been made to the access log collection setting.
  • Page 572 Managing Log Files Item Content Log Collect Level Indicates the level of log collection: "Level 1", "Level 2", or "User Settings". Encryption/Cleartext Indicates whether communication encryption is enabled or disabled: "Encryption Communication" indicates encryption is enabled; "Cleartext Communication" indicates encryption is not disabled.
  • Page 573 7. Managing the Machine Item Content Network Attack Status Indicates the attack status of the network: "Violation Detected" indicates an attack on the network was detected. "Recovered from Violation" indicates the network recovered from an attack. "Max. Host Capacity Reached" indicates the machine became inoperable due to the volume of incoming data reaching the maximum host capacity.
  • Page 574 Managing Log Files Item Content Parts Number Firmware module part number. Version Firmware version. Machine Data Encryption Key Indicates the type of encryption key operation performed: Operation "Back Up Machine Data Encryption Key" indicates an encryption key backup was performed. "Restore Machine Data Encryption Key"...
  • Page 575 7. Managing the Machine Item Content Access Result Indicates the results of logged operations: "Completed" indicates an operation completed successfully; "Failed" indicates an operation completed unsuccessfully. Job log information items Input information Item Content Source Indicates the source of the job file: "Scan File"...
  • Page 576 Managing Log Files Item Content Stored File ID Indicates the ID of data that is output as a store file. This is a decimal ID that identifies the stored file. Stored File Name If the Target Type is "Store", the file name of the stored file is recorded.
  • Page 577 7. Managing the Machine Item Content Power Mode (After) The power status of the machine (after state transition) is logged. When in standby, "Standby" is recorded. When in a silent state, "Silent" is recorded. When the hard disk is running, "HDD On" is recorded. When the engine is stopped, "Engine Off"...
  • Page 578 Managing Log Files Item Content Detected Power The power consumption status of the machine is measured and registered in the log while the machine is being used. "Controller Standby" indicates controller standby mode. "STR" indicates Suspend to RAM (STR) mode. "Main Power Off"...
  • Page 579 7. Managing the Machine Category Attribute Description Device Certificate 1. Operation Mode 1. The type of operation is recorded. 2. Certificate No. "Create" is recorded when a 3. Certificate No. (XXX) certificate is created. (XXX) is replaced by one of the "Delete"...
  • Page 580 Managing Log Files Category Attribute Description IPsec 1. IPsec 1. Whether IPsec is active (Active) or inactive (Inactive) is 2. Encryption Key Auto recorded. Exchange / Encryption Key Manual Exchange: Setting1-4: 2. The remote address is Remote Address recorded. 3. Encryption Key Auto Exchange: 3.
  • Page 581 7. Managing the Machine Category Attribute Description S/MIME 1. Operation Mode 1. The mode of operation is recorded. 2. When Sending E-mail by Scanner 2. The signature is recorded when the scanner is used for sending 3. When Transferring by Fax e-mail.
  • Page 582: Customizing The Control Panel

    Customizing the Control Panel Customizing the Control Panel Configurations of settings such as arrangement of icons on the home screen or allocation of function keys to functions can be made to suit the user. Configuring the Home Screen for Individual Users This allows each user to use their own home screen.
  • Page 583 7. Managing the Machine Warnings about using user's own home screens Consider these warnings before using this function. • When a user is registered in the Address Book, a home screen is created for that user. At that time, their user's own home screen is configured with the default settings (arrangement of icons). •...
  • Page 584: Configuring The Browser Functions

    Configuring the Browser Functions Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 585 7. Managing the Machine Press [Browser Default Setting]. Press the setting you want to change, and change the setting. Press [OK]. Press [Exit] twice. Log out. Browser default settings Home Screen Specify the URL of your home screen. Cache File Specify whether or not to enable cache files.
  • Page 586: Restricting User Browser Functions

    Configuring the Browser Functions When using a proxy server, specify "Proxy Server Name", "Proxy Port", "Proxy User Name", "Proxy Password", and "Exceptional Addresses". Default: [Off] User Agent Specify the user agent. Enter the user agent's name using the keyboard. Default HTTP Request Method Specify the type of HTTP request method.
  • Page 587: Checking The Usage Status Of The Browser Functions

    7. Managing the Machine Bookmark Specify whether or not to enable the use of bookmarks. Default: [Allow] Use Proxy Server Specify whether or not to enable a proxy server. Default: [Allow] Keep the History Specify whether or not to enable the history to be kept. Default: [Allow] Screen Settings Specify whether or not to enable the size of the window displayed on the control panel.
  • Page 588 Configuring the Browser Functions • "This site has a security problem. Verification of the server to connect to cannot be performed." • "This site has a security problem. The http subcontents are included in the https site." *1 The connected Web site contains non-encrypted data.
  • Page 589: Managing Device Information

    7. Managing the Machine Managing Device Information • Keep SD cards out of reach of children. If a child accidentally swallows an SD card, consult a doctor immediately. This can be set by an administrator with privileges to manage everything — devices, users, networks and files.
  • Page 590: Exporting Device Information

    Managing Device Information • The device configurations of the device setting information file to be imported from the control panel must be the same as those of the device setting information file that is exported. If not, the device setting information file cannot be imported. •...
  • Page 591: Importing Device Information

    7. Managing the Machine • If data export fails, the details of the error can be viewed in the log. Importing Device Information Import device information saved on an SD card. Insert an SD card into the media slot on the side of the control panel. Log in from the control panel as an administrator with all privileges.
  • Page 592: Periodically Importing Device Information

    Managing Device Information • If data import fails, the details of the error can be viewed in the log. Periodically Importing Device Information This setting enables automatic importing of device information stored on a server. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 593: Manually Importing The Device Setting Information File Of A Server

    7. Managing the Machine Log out. • If data import fails, the details of the error can be viewed in the log. Manually Importing the Device Setting Information File of a Server Manually import the device setting information file specified with [Device Setting Information: Import Setting (Server)].
  • Page 594: Managing Eco-Friendly Counter

    Managing Eco-friendly Counter Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter is the ratio of use of two-sided and multi-page printing to the total number of output pages. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 595: Clearing A Machine's Eco-Friendly Counter

    7. Managing the Machine Change the settings. Press [OK]. Press [Exit]. Log out. Eco-friendly counter settings Count Period Set up the period for collecting data for the eco-friendly counter. When [Specify Days] is selected, data for the eco-friendly counter is collected for the number of days specified.
  • Page 596: Clearing The Eco-Friendly Counter By User

    Managing Eco-friendly Counter Press [Display/Clear Eco-friendly Counter]. Press [Clear Current Value] or [Clear Crnt. & Prev. Val.]. Press [OK]. Press [Exit]. Log out. Clearing the Eco-friendly Counter by User The eco-friendly counter can be cleared according to the user. The machine administrator logs in from the control panel. Press [System Settings].
  • Page 597 7. Managing the Machine Press the counter item to clear. Press [Clear Current Value] or [Clear Crnt. & Prev. Val.]. Press [OK]. Press [Exit]. Log out. • The eco-friendly counter for all users is cleared. The eco-friendly counter for individual users cannot be cleared.
  • Page 598: Specifying The Extended Security Functions

    Specifying the Extended Security Functions Specifying the Extended Security Functions In addition to providing basic security through user authentication and administrator specified access limits on the machine, security can also be increased by encrypting transmitted data and data in the Address Book.
  • Page 599: Extended Security Function Settings

    7. Managing the Machine Extended Security Function Settings Driver Encryption Key This can be specified by the network administrator. When user authentication is ON, specify the string of text for the key used for encrypting the login passwords or document passwords that are sent from each kind of driver. To specify the driver encryption key, register the encryption key specified using the machine in the driver.
  • Page 600 Specifying the Extended Security Functions Enhance File Protection This can be specified by the file administrator. By specifying a password, you can limit operations such as printing, deleting, and sending files, and can prevent unauthorized people from accessing the files. However, it is still possible for the password to be cracked.
  • Page 601 7. Managing the Machine If you use [Forwarding] or [Transfer Box] under the fax function, files stored in the machine can be transferred or delivered. To prevent stored files being transferred by mistake, select [Prohibit] for this setting. Default: [Do not Prohibit] If you select [Prohibit] for this setting, the following functions are disabled: •...
  • Page 602 Specifying the Extended Security Functions Specify whether to allow firmware updates on the machine. Firmware update means having the service representative update the firmware or updating the firmware via the network. If you select [Prohibit], firmware on the machine cannot be updated. If you select [Do not Prohibit], there are no restrictions on firmware updates.
  • Page 603 7. Managing the Machine Default: [Do not Prohibit] Security Setting for Access Violation This can be specified by the machine administrator. When logging in to the machine via a network application, a user may be locked out erroneously because the number of authentication attempts of the user does not match the number of attempts logged internally.
  • Page 604 Specifying the Extended Security Functions If the number of authentication requests exceeds the setting, the system classifies the access session as a password attack. The access session is recorded in the Access Log and the log data is sent to the machine administrator by e-mail.
  • Page 605 7. Managing the Machine Use the number keys to enter the number between "10" and "30", and then press [ ]. Default: [10] • Authentication Delay Time Specify the authentication delay time when an access violation is detected. Use the number keys to enter the number between "0" and "9", and then press [ ]. Default: [3] •...
  • Page 606: Other Security Functions

    Other Security Functions Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 607: Scanner Function

    7. Managing the Machine Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 608: Limiting Machine Operations To Customers Only

    Limiting Machine Operations to Customers Only Limiting Machine Operations to Customers Only The machine can be set so that operation is impossible without administrator authentication. The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the Address Book by a service representative. We maintain strict security when handling customers' data.
  • Page 609: Additional Information For Enhanced Security

    7. Managing the Machine Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 610 Additional Information for Enhanced Security Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See p.259 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See p.259 "Specifying the Extended Security Strength Functions". Administrator Extended Security Access Privilege Tools Authenticate Current Job...
  • Page 611: Settings You Can Configure Using Web Image Monitor

    7. Managing the Machine Scanner Features Item Setting Initial Settings Menu Protect Level 2 See p.78 "Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 612: Settings You Can Configure When Ipsec Is Available/Unavailable

    Additional Information for Enhanced Security Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see p.69 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 613 7. Managing the Machine Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network. Control panel settings System Settings Item Setting Interface Settings IPsec...
  • Page 614 Additional Information for Enhanced Security Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. • Sending and receiving faxes without using IP-Fax When sending faxes, specify destinations by fax number, Internet Fax destination, e-mail address, or folder destination.
  • Page 615 7. Managing the Machine...
  • Page 616: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If Authentication Fails This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 617 8. Troubleshooting Messages Cause Solutions "Authentication has failed." The entered login user name or Ask the user administrator for login password is incorrect. the correct login user name and login password. See the error codes below for possible solutions: B, W, L, I 0104-000 B, W, L, I 0206-003 W, L, I 0406-003 "Authentication has failed."...
  • Page 618: If Authentication Fails

    If Authentication Fails Messages Cause Solutions "Failed to obtain URL." The machine is connected to the Make sure the UA service is server, but the UA service is not specified correctly. responding properly. "Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication the server.
  • Page 619 8. Troubleshooting Basic authentication Error Code Cause Solution B0103-000 A TWAIN operation occurred Make sure no other user is logged during authentication. on to the machine, and then try again. B0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly.
  • Page 620 If Authentication Fails Error Code Cause Solution B0207-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. B0208-000 The account is locked because you Ask the user administrator to unlock have reached the maximum number the account.
  • Page 621 8. Troubleshooting Error Code Cause Solution W0206-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log in again.
  • Page 622 If Authentication Fails Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Specify the IP address in the domain name and confirm that authentication is successful. If authentication was successful: 1. If the top-level domain name is specified in the domain name (such as domainname.xxx.com), make sure that DNS is specified in "Interface Settings".
  • Page 623 8. Troubleshooting Error Code Cause Solution W0406-104 4. Cannot resolve the domain name. Under Windows 7, if the Windows firewall is activated, create a firewall rule in the "Advanced settings" on the "System and security" control panel, and then authorize ports 137 and 139. Under Windows XP, if the Windows firewall is activated, open the properties for "Network...
  • Page 624 If Authentication Fails Error Code Cause Solution W0406-104 5. Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name and corresponding domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 625 8. Troubleshooting Error Code Cause Solution W0400-105 2. Current settings do not allow Make sure the user group's group group retrieval. scope is set to "Global Group" and the group type is set to "Security" in group properties. Make sure the account has been added to user group.
  • Page 626 If Authentication Fails Error Code Cause Solution W0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If the account name was entered incorrectly, enter it correctly and log on again.
  • Page 627 8. Troubleshooting Error Code Cause Solution L0104-000 Failed to encrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key:Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 628 If Authentication Fails Error Code Cause Solution L0307-001 An authentication error occurred Wait a few minutes and then try because the Address Book is being again. used at another location. L0406-200 Authentication cannot be completed Wait a few minutes and then try because of the high number of again.
  • Page 629 8. Troubleshooting Error Code Cause Solution L0406-202 2. A login user name or password 1. Make sure the login user name error occurred. and password are entered correctly. L0406-203 2. Make sure a usable login name is registered on the machine. Authentication will fail in the following cases: If the login user name contains a...
  • Page 630 If Authentication Fails Error Code Cause Solution L0406-204 Kerberos authentication failed. 1. Kerberos authentication settings are not correctly configured. Make sure the realm name, KDC (Key Distribution Center) name, and supporting domain name are specified correctly. 2. The KDC and machine timing do not match.
  • Page 631 8. Troubleshooting Error Code Cause Solution L0511-000 The authentication server login name 1. Delete the old, duplicated name is the same as a user name already or change the login name. registered on the machine. (Names 2. If the authentication server has just are distinguished by the unique been changed, delete the old name attribute specified in the LDAP...
  • Page 632 If Authentication Fails Error Code Cause Solution I0104-000 Failed to decrypt password. 1. A password error occurred. Make sure the password is entered correctly. 2. Either [DES] or [AES] is selected for "Driver Encryption Key:Encryption Strength". The administrator has restricted use of simple encryption.
  • Page 633 8. Troubleshooting Error Code Cause Solution I0406-003 An authentication error occurred Recreate the account if the account because the user name contains a name contains any of these space, colon (:), or quotation mark prohibited characters. ("). If account name was entered incorrectly, enter it correctly and log in again.
  • Page 634: If The Machine Cannot Be Operated

    If Authentication Fails Error Code Cause Solution I0606-004 Authentication failed because the Do not use "other", "admin", user name contains language that "supervisor" or "HIDE*" in general cannot be used by general users. user accounts. I0612-005 Authentication failed because no Ask the user administrator to delete more users can be registered.
  • Page 635 8. Troubleshooting Condition Cause Solution Cannot connect with the The SNMPv3 account, Specify the account, password TWAIN driver. password, and encryption and the encryption algorithm of algorithm do not match settings SNMPv3 registered in the specified on this machine. machine using network connection tools.
  • Page 636 If Authentication Fails Condition Cause Solution Cannot access the machine "Driver Encryption Set "Driver Encryption using ScanRouter EX Key:Encryption Strength" is not Key:Encryption Strength" to Professional V3 / ScanRouter set correctly. Alternatively, [Simple Encryption]. EX Enterprise V2. "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", although the required certificate install the server certificate in the...
  • Page 637 8. Troubleshooting Condition Cause Solution Cannot send e-mail from the The following are possible • Install a user certificate scanner. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 638 If Authentication Fails Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination • Cannot select an address. certificate) has expired.
  • Page 639 8. Troubleshooting Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet destinations specified using been disabled without "All and select [All Users] as the the machine do not appear. Users" being selected for access permission setting of the "Protect Destination".
  • Page 640: Checking Operation Privileges

    9. Checking Operation Privileges This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. List of Operation Privileges for Settings Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 641 9. Checking Operation Privileges • When [Menu Protect] is set to [Off], users can execute, change and read all of the settings of each function.
  • Page 642: System Settings

    System Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. General Features Settings User Mach N/W File Unset Program/Change/Delete User Text Panel Key Sound Warm-up Beeper Copy Count Display Function Priority...
  • Page 643 9. Checking Operation Privileges Settings User Mach N/W File Unset Printer Bypass Paper Size Paper Type: Bypass Tray Paper Type: Tray 1-3 Timer Settings Settings User Mach N/W File Unset Sleep Mode Timer System Auto Reset Timer Copier/Document Server Auto Reset Timer Facsimile Auto Reset Timer Printer Auto Reset Timer Scanner Auto Reset Timer...
  • Page 644 System Settings Settings User Mach N/W File Unset DHCPv6 Configuration DNS Configuration DDNS Configuration IPsec Domain Name WINS Configuration Effective Protocol NCP Delivery Protocol NW Frame Type SMB Computer Name SMB Work Group Ethernet Speed LAN Type Ping Command – –...
  • Page 645: Pop Before Smtp R/W R/W

    9. Checking Operation Privileges Parallel Interface Settings User Mach N/W File Unset Parallel Timing Parallel Communication Speed Selection Signal Status Input Prime Bidirectional Communication Signal Control Wireless LAN Settings User Mach N/W File Unset Communication Mode SSID Setting Ad-hoc Channel Security Method Wireless LAN Signal Restore Factory Defaults...
  • Page 646 System Settings Settings User Mach N/W File Unset POP3/IMAP4 Settings Administrator's Email Address Email Communication Port Email Reception Interval Max. Reception Email Size Email Storage in Server Default User Name/Password (Send) Program/Change/Delete Email Message Auto Specify Sender Name Fax Email Account Scanner Resend Interval Time Number of Scanner Resends *3 The primary and secondary distribution server addresses are read-only.
  • Page 647 9. Checking Operation Privileges Settings User Mach N/W File Unset Data Carry-over Setting for Address Book Auto-program Display/Print Counter Display/Clear/Print Counter per User – Display/Clear Eco-friendly Counter – – – – – Display/Clear Eco-friendly Counter per User – – – –...
  • Page 648 System Settings Settings User Mach N/W File Unset Encrypt User Cstm. Setg. & Addrs. Book Enhance File Protection Restrict Use of Destinations (Fax) Restrict Adding of User Destinations (Fax) Restrict Use of Destinations (Scanner) Restrict Adding of User Destin.(Scanner) Transfer to Fax Receiver Remote Diagnostics (Facsimile) –...
  • Page 649 9. Checking Operation Privileges Settings User Mach N/W File Unset LDAP Search Sleep Mode Service Test Call – – – – Notify Machine Status – – – – Service Mode Lock Firmware Version Network Security Level Auto Erase Memory Setting Erase All Memory –...
  • Page 650 System Settings Settings User Mach N/W File Unset Compulsory Security Stamp:Copier Compulsory Security Stamp:Doc. Srvr. Compulsory Security Stamp:Facsimile Compulsory Security Stamp:Printer Users Own Home Screen *4 Passwords cannot be read. *5 Only changing headings and user searches are possible. *6 The items that can be executed, changed and read differ according is set to access privilege. *7 Can only be cleared.
  • Page 651: Edit Home

    9. Checking Operation Privileges Edit Home When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Edit Home Settings User Mach N/W File Unset Edit Icons – –...
  • Page 652: Maintenance

    Maintenance Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Maintenance Settings User Mach N/W File Unset Plain Paper Setting – – – –...
  • Page 653: Copier / Document Server Features

    9. Checking Operation Privileges Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Features Settings User Mach N/W File Lv.1 Lv.2 Auto Image Density Priority Orig.'s Photo Type Prio. (Txt./Photo) Original's Photo Type Priority (Photo) Original's Type Display Paper Display (Stored File Print)
  • Page 654 Copier / Document Server Features Edit Settings User Mach N/W File Lv.1 Lv.2 Front Margin: Left/Right Back Margin: Left/Right Front Margin: Top/Bottom Back Margin: Top/Bottom 1 Sided 2 Sided Auto Margin: TtoT 1 Sided 2 Sided Auto Margin: TtoB Combine: Type of Separation Line Copy Order in Combine Input/Output Settings...
  • Page 655: Facsimile Features

    9. Checking Operation Privileges Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Quick Operation Key 1-3 Switch Title Search Destination Communication Page Count Adjust Sound Volume Box Setting...
  • Page 656 Facsimile Features Settings User Mach N/W File Lv.1 Lv.2 Memory File Transfer – – – – – Backup File TX Setting Reception Settings Settings User Mach N/W File Lv.1 Lv.2 Reception File Settings Switch Reception Mode Program Special Sender – –...
  • Page 657 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Internet Fax Setting Select Dial/Push Phone Program Fax Information Enable H.323 Enable SIP H.323 Settings SIP Settings Program/Change Gateway Delete Gateway Menu Protect Email Setting Folder Setting File Type to Transfer Security for Email TX Results...
  • Page 658: Printer Functions

    Printer Functions Printer Functions This section lists the printer function items that appear if [Printer] on the Home screen is pressed. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Printer Functions Settings User Mach N/W...
  • Page 659: Printer Features

    9. Checking Operation Privileges Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. List / Test Print Settings User Mach N/W File Lv.1 Lv.2 Multiple Lists – – – Configuration Page –...
  • Page 660 Printer Features Settings User Mach N/W File Lv.1 Lv.2 Store and Skip Errored Job Memory Overflow Rotate by 180 Degrees Print Compressed Data Memory Usage Duplex Copies Blank Page Print Edge Smoothing Toner Saving Reserved Job Waiting Time Printer Language Sub Paper Size Page Size Letterhead Setting...
  • Page 661 9. Checking Operation Privileges Host Interface Settings User Mach N/W File Lv.1 Lv.2 I/O Buffer I/O Timeout PCL Menu Settings User Mach N/W File Lv.1 Lv.2 Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution...
  • Page 662 Printer Features Settings User Mach N/W File Lv.1 Lv.2 Orientation Auto Detect PDF Menu Settings User Mach N/W File Lv.1 Lv.2 Change PDF Password PDF Group Password Reverse Order Printing Resolution Orientation Auto Detect Unauthorized Copy Preventn. Settings User Mach N/W File Lv.1 Lv.2...
  • Page 663: Scanner Features

    9. Checking Operation Privileges Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title Update Delivery Server Destination List – –...
  • Page 664 Scanner Features Send Settings Settings User Mach N/W File Lv.1 Lv.2 Compression (Black & White) Compression Method (Black & White) Compression (Grey Scale/Full Colour) Compression Method for High Compress. High Compression PDF Level Max. Email Size Divide & Send Email Insert Additional Email Info No.
  • Page 665: Browser Features

    9. Checking Operation Privileges Browser Features Settings User Mach File Unset Browser Default Settings – – – Settings per Users – – – View Logs – – –...
  • Page 666: Extended Feature Settings

    Extended Feature Settings Extended Feature Settings Extended Feature Settings Settings User Mach N/W File Unset Startup Setting Install Uninstall Extended Feature Info Administrator Tools – – – – – Add. Program Startup Setting Install Add. Program Uninstall Add. Program Add. Program Info...
  • Page 667: Web Image Monitor: Display Eco-Friendly Counter

    9. Checking Operation Privileges Web Image Monitor: Display Eco-friendly Counter These settings are in [Status/Information]. Each user can only view his or her own counter. Settings User Mach File Unset Device Total Counter – – – – – Counter per User –...
  • Page 668: Web Image Monitor: Job

    Web Image Monitor: Job Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. Job List Settings User Mach N/W File Unset Current/Waiting Jobs: Change Order – – – – – Current/Waiting Jobs: Suspend Printing/ –...
  • Page 669 9. Checking Operation Privileges Settings User Mach N/W File Unset Fax Remote Send History – – – Scanner Remote Send History – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 670: Web Image Monitor: Device Settings

    Web Image Monitor: Device Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. System Settings User...
  • Page 671 9. Checking Operation Privileges Paper Settings User Mach N/W File Unset Tray 1-3 Bypass Tray Date/Time Settings User Mach N/W File Unset Set Date Set Time SNTP Server Name SNTP Polling Interval Time Zone Timer Settings User Mach N/W File Unset Sleep Mode Timer System Auto Reset Timer...
  • Page 672 Web Image Monitor: Device Settings Logs Settings User Mach N/W File Unset Job Log Access Log Eco-friendly Logs Transfer Logs Encrypt Logs Classification Code Delete All Logs – – – – *1 Can only be changed to [Inactive]. Download Logs Settings User Mach N/W...
  • Page 673 9. Checking Operation Privileges Settings User Mach N/W File Unset SMTP Auth. Email Address – – – SMTP Auth. User Name – – – – SMTP Auth. Password – – – – SMTP Auth. Encryption – – – POP before SMTP –...
  • Page 674 Web Image Monitor: Device Settings Auto Email Notification Settings User Mach N/W File Unset Notification Message Groups to Notify Select Groups/Items to Notify Detailed Settings of Each Item On-demand Email Notification Settings User Mach N/W File Unset Notification Subject Notification Message Access Restriction to Information Receivable Email Address/Domain Name Settings...
  • Page 675 9. Checking Operation Privileges Settings User Mach N/W File Unset Printer Job Authentication Settings User Code Authentication Settings Basic Authentication Settings Windows Authentication Settings Group Settings for Windows Authentication LDAP Authentication Settings Integration Server Authentication Settings Group Settings for Integration Server Authentication Administrator Authentication Management Settings...
  • Page 676 Web Image Monitor: Device Settings Settings User Mach N/W File Unset File Administrator – – Login User Name – – Login Password – – Encryption Password – – *1 Administrators can only change their own accounts. Print Volume Use Limitation Settings User Mach N/W...
  • Page 677 9. Checking Operation Privileges Kerberos Authentication Settings User Mach N/W File Unset Encryption Algorithm – – – – – Realm 1-5 – – – – – Device Setting Information: Import Setting (Server) Settings User Mach N/W File Unset Import File From –...
  • Page 678 Web Image Monitor: Device Settings *1 R/W is the administrator with all privileges that include user administrator, machine administrator, network administrator, and file administrator privileges. Eco-friendly Counter Period/Administrator Message Settings User Mach N/W File Unset Display Information Screen Display Time Count Period Administrator Message Compulsory Security Stamp...
  • Page 679: Web Image Monitor: Printer

    9. Checking Operation Privileges Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Basic Settings Settings User Mach N/W File Lv.1 Lv.2 Print Error Report...
  • Page 680 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 Paper Confirmation for Bypass Tray Store and Skip Errored Job Edge to Edge Print Default Printer Language Tray Switching List/Test Print Lock Extended Auto Tray Switching Virtual Printer Restrict Direct Print Jobs Initial screen switch setting Host Interface PCL Menu...
  • Page 681 9. Checking Operation Privileges Tray Parameters (PS) Settings User Mach N/W File Lv.1 Lv.2 Tray Parameters (PS) – – – – – Virtual Printer Settings Settings User Mach N/W File Lv.1 Lv.2 Virtual Printer Name Protocol Print Error Report Rotate by 180 Degrees Memory Usage Duplex Copies...
  • Page 682 Web Image Monitor: Printer PDF Temporary Password Settings User Mach N/W File Lv.1 Lv.2 PDF Temporary Password – – – – PDF Group Password Settings User Mach N/W File Lv.1 Lv.2 PDF Group Password – – – – – PDF Fixed Password Settings User Mach N/W...
  • Page 683: Web Image Monitor: Fax

    9. Checking Operation Privileges Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Initial Settings Settings User Mach N/W File Lv.1 Lv.2 Closed Network Code...
  • Page 684 Web Image Monitor: Fax Reception File Settings Settings User Mach N/W File Lv.1 Lv.2 Output Mode Switch Timer – – – – – Prohibit Auto Print – – – – – Print Standby to Print Files – – – – –...
  • Page 685: Web Image Monitor: Scanner

    9. Checking Operation Privileges Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. General Settings Settings User Mach N/W File Lv.1 Lv.2 Switch Title...
  • Page 686 Web Image Monitor: Scanner Settings User Mach N/W File Lv.1 Lv.2 Compression Method for High Compression Max. Email Size Divide & Send Email Insert Additional Email Info No. of Digits for Single Page Files Stored File Email Method Default Email Subject *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user privilege becomes R/W.
  • Page 687 9. Checking Operation Privileges Settings User Mach N/W File Lv.1 Lv.2 Send File Type – – –...
  • Page 688: Web Image Monitor: Interface

    Web Image Monitor: Interface Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Interface Settings Settings User Mach N/W...
  • Page 689 9. Checking Operation Privileges Settings User Mach N/W File Unset WEP Authentication – – – – WEP Key Number WEP Key WPA Authentication Method WPA-PSK/WPA2-PSK...
  • Page 690: Web Image Monitor: Network

    Web Image Monitor: Network Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. IPv4 Settings User Mach N/W...
  • Page 691 9. Checking Operation Privileges Settings User Mach N/W File Unset Stateless Address Manual Configuration Address DHCPv6 DHCPv6 Address DDNS LLMNR Details NetWare Settings User Mach N/W File Unset NetWare NetWare Print Settings NCP Delivery Settings User Mach N/W File Unset Protocol Workgroup Name Computer Name...
  • Page 692 Web Image Monitor: Network SNMP Settings User Mach N/W File Unset SNMP – – – – – Protocol – – – – – SNMPv1,v2 Setting – – – – – Community – – – – – SNMPv3 Settings User Mach N/W File Unset SNMP...
  • Page 693 9. Checking Operation Privileges Settings User Mach N/W File Unset Local Hostname Details Print Order Priority System Log Settings User Mach N/W File Unset System Log –...
  • Page 694: Web Image Monitor: Security

    Web Image Monitor: Security Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Network Security – – – – – Access Control – – – – – IPP Authentication – – – –...
  • Page 695: Web Image Monitor: @Remote

    9. Checking Operation Privileges Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Setup RC Gate – – – – – Update RC Gate Firmware – – – – – RC Gate Proxy Server –...
  • Page 696: Web Image Monitor: Webpage

    Web Image Monitor: Webpage Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach File...
  • Page 697: Web Image Monitor: Extended Feature Settings

    9. Checking Operation Privileges Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset Startup Setting – – – – – Extended Feature Info Install – – – – – Uninstall –...
  • Page 698: Web Image Monitor: Address Book

    Web Image Monitor: Address Book Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset Add User – – – Change – – – Delete – – – Add Group – – – Data Carry-over Setting for Address Book Auto- –...
  • Page 699: Web Image Monitor: Reset Printer Job

    9. Checking Operation Privileges Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset Reset Current Job – – – – – Reset All Jobs – – – – –...
  • Page 700: Web Image Monitor: Reset The Machine

    Web Image Monitor: Reset the Machine Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach...
  • Page 701: Web Image Monitor: Device Home Management

    9. Checking Operation Privileges Web Image Monitor: Device Home Management These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations of the available settings in [Administrator Authentication Management]. Settings User Mach File...
  • Page 702: Web Image Monitor: Customize Screen Per User

    Web Image Monitor: Customize Screen per User Web Image Monitor: Customize Screen per User Users can change only their own settings. Settings User Mach File Unset Edit Icons – – – – – Restore Default Icon Display – – – –...
  • Page 703: Web Image Monitor: Document Server

    9. Checking Operation Privileges Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see p.367 "List of Operation Privileges for Stored Files". Settings User Mach File...
  • Page 704: Web Image Monitor: Fax Received File

    Web Image Monitor: Fax Received File Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset Print – – – – Delete – – – – Download – – – – Edit detailed information –...
  • Page 705: Web Image Monitor: Printer: Print Jobs

    9. Checking Operation Privileges Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 706: List Of Operation Privileges For Stored Files

    List of Operation Privileges for Stored Files List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 707 9. Checking Operation Privileges Settings Read Edit Full Owner File Insert File – – – Delete Pages – – – Print specified page – Duplicate File – Delete File – – *1 The owner can change operation privileges.
  • Page 708: List Of Operation Privileges For Address Books

    List of Operation Privileges for Address Books List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 709 9. Checking Operation Privileges Settings Read Edit Full Entry User Login Password – – – – SMTP Authentication – – – – Folder Authentication – LDAP Authentication – – – – Available functions – – – – Print Volum. Use Limit. –...
  • Page 710 List of Operation Privileges for Address Books Fax Dest. Settings Read Edit Full Entry User Fax Destination Select Line Adv. Features International TX Mode Fax Header Label Insertion Email Settings Read Edit Full Entry User Email Address Use Email Address for Send via SMTP Server Folder Settings...
  • Page 711 9. Checking Operation Privileges • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 712: Trademarks

    Trademarks Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. LINUX is a registered trademark of Linus Torvalds.
  • Page 713 9. Checking Operation Privileges ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ®...
  • Page 714: Index

    INDEX Erase All Memory..........Error code............Access Control............. Error message............Access permission for stored files...... ESP Protocol............Address Book access permission......Extended security functions........ Administrator............Administrator privileges........Administrator registration........Firmware validity..........AH Protocol..........145, 146 AH Protocol + ESP Protocol....... 145, 146 IEEE 802.1X............
  • Page 715 Operational issues..........Windows authentication........Password for stored files........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax).. 75, 261 Restrict Adding of User Destinations (Scanner). Restrict Display of User Information....
  • Page 717 D127-7519 © 2011...
  • Page 718 User Information on Electrical & Electronic Equipment Users in the countries where this symbol shown in this section has been specified in national law on collection and treatment of E-waste Our Products contain high quality components and are designed to facilitate recycling.

Table of Contents

Save PDF