Ricoh SP 5200S Operating Instructions Manual

Ricoh SP 5200S Operating Instructions Manual

Network and system settings reference
Hide thumbs Also See for SP 5200S:
Table of Contents

Advertisement

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety
Information in "Manuals and Safety Information for This Machine" before using the machine.
Network and System Settings
1
System Settings
2
Connecting the Machine
3
Using a Printer Server
4
Monitoring and Configuring the Machine
5
Registering Addresses and Users for Facsimile/Scanner Functions
6
Special Operations under Windows
7
Appendix

Operating Instructions

Reference

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh SP 5200S

  • Page 1: Operating Instructions

    Operating Instructions Network and System Settings Reference System Settings Connecting the Machine Using a Printer Server Monitoring and Configuring the Machine Registering Addresses and Users for Facsimile/Scanner Functions Special Operations under Windows Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "Manuals and Safety Information for This Machine"...
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine..........................10 Notice................................13 Important..............................13 How to Read This Manual..........................14 Symbols................................14 Machine Types.............................14 Notes................................15 Names of Major Items..........................15 List of Options...............................15 About IP Address............................16 Laws and Regulations............................17 Legal Prohibition............................17 Model-Specific Information..........................18 Display Panel..............................19 Accessing User Tools............................20 Changing Default Settings...........................20 Quitting User Tools............................21 1.
  • Page 4 Deleting the LDAP server..........................66 Programming the Realm...........................68 Programming the Realm..........................68 Changing the Realm............................69 Deleting the Realm............................70 2. Connecting the Machine Connecting to the Interface..........................71 Connecting to the Ethernet Interface (mainly Europe and Asia).........72 Connecting to the Ethernet Interface (mainly North America)..........73 Connecting to the Gigabit Ethernet Interface (mainly Europe and Asia)......74 Connecting to the Gigabit Ethernet Interface...
  • Page 5 Ethernet...............................104 Wireless LAN.............................105 Network Settings Required to Use Document Server.................107 Ethernet...............................107 Wireless LAN.............................108 Using Utilities to Make Network Settings.....................110 Interface Settings............................110 File Transfer..............................115 Connecting the Machine to a Telephone Line and Telephone..............118 3. Using a Printer Server Preparing Printer Server..........................119 Using NetWare..............................120 Setting Up as a Print Server (NetWare 3.x)....................120 Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5)..............121...
  • Page 6 Using telnet..............................153 access.................................154 authfree..............................155 autonet................................155 bonjour...............................156 devicename..............................158 dhcp................................158 dhcp6.................................159 diprint.................................160 dns................................161 domainname..............................163 etherauth..............................163 etherconfig..............................164 help................................164 hostname..............................164 ifconfig................................165 info................................166 ipp................................166 ipsec................................167 ipv6................................167 logout.................................168 lpr................................168 netware..............................169 passwd...............................170 pathmtu...............................170 prnlog.................................171 rhpp................................171 route................................172 set................................173 show................................176 slp................................176 smb................................177 snmp................................178...
  • Page 7 sntp................................181 spoolsw..............................182 ssdp................................183 ssh................................183 status................................184 syslog................................184 upnp................................184 web................................185 wiconfig..............................185 wins................................190 wsmfp.................................191 8021x................................192 SNMP................................195 Getting Machine Information over the Network..................196 Current Machine Status..........................196 Printer configuration..........................201 Understanding the Displayed Information....................204 Print Job Information..........................204 Print Log Information..........................204 Configuring the Network Interface Board....................205 Message List..............................211 System Log Information..........................211 5.
  • Page 8 Deleting a Registered Name........................231 Carrying Over Registered Data for Use by Address Book Auto Register..........233 Authentication Information..........................234 Registering a User Code...........................234 Changing a User Code..........................236 Deleting a User Code..........................237 Displaying the Counter for Each User......................239 Printing the Counter for Each User......................239 Printing the Counter for All Users......................240 Clearing the Number of Prints for Each User..................241 Clearing the Number of Prints for All Users....................242...
  • Page 9 Registering a Group..........................280 Registering Names to a Group........................281 Adding a Group to Another Group......................283 Displaying Names Registered in a Group....................284 Removing a Name from a Group......................285 Deleting a Group Within Another Group....................286 Changing a Group Name........................287 Deleting a Group............................288 Registering a Protection Code........................290 Registering a Protection Code to a Single User..................290 Registering a Protection Code to a Group User..................291 Registering SMTP and LDAP Authentication....................293...
  • Page 10 Setting the Dynamic DNS Function......................308 Precautions..............................309 Connecting a Dial-Up Router to a Network....................309 NetWare Printing............................310 When the Wireless LAN Board Is Installed....................312 Configuring IEEE 802.1X..........................313 Installing a Site Certificate........................313 Installing Device Certificate........................313 Setting Items of IEEE 802.1X for Ethernet....................314 Setting Items of IEEE 802.1X for Wireless LAN..................316 Specifications..............................319 Copyrights..............................322 Boost................................322...
  • Page 11 Samba................................347 SASL................................353 SPX/IPX..............................353 The m17n library............................354 TinyScheme..............................354 TrouSerS..............................355 WPA Supplicant............................358 Zilb................................359 Trademarks..............................360 INDEX ................................363...
  • Page 12: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. ®...
  • Page 13 Facsimile Reference Explains Facsimile functions and operations. Printer Reference Explains Printer functions and operations. Scanner Reference Explains Scanner functions and operations. Network and System Settings Reference Explains how to connect the machine to a network and how to configure and operate the machine in a network environment.
  • Page 14 • App2Me Start Guide • The following software products are referred to using general names: Product name General name DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise SmartDeviceMonitor for Client 2 SmartDeviceMonitor for Client *1 Optional...
  • Page 15: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the manufacturer recommends that you use genuine toner from the manufacturer. The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products.
  • Page 16: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.
  • Page 17: Notes

    Notes Contents of this manual are subject to change without prior notice. Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional.
  • Page 18: About Ip Address

    About IP Address In this manual, "IP address" covers both IPv4 and IPv6 environments. Read the instructions that are relevant to the environment you are using.
  • Page 19: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 20: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CFE052 The following information is region-specific.
  • Page 21: Display Panel

    Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing When you select or specify an item on the display panel, it is highlighted like .
  • Page 22: Accessing User Tools

    Accessing User Tools This section describes how to access User Tools menu. User Tools allow you to change or set defaults. • Operations for system settings differ from normal operations. Always quit User Tools when you have finished. • Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the [Energy Saver] or [Clear Modes] key is pressed.
  • Page 23: Quitting User Tools

    • p.23 "System Settings" Quitting User Tools This section describes how to quit the settings of User Tools. Press the [User Tools/Counter] key. CCS003 • You can also quit User Tools by pressing [Exit].
  • Page 25: System Settings

    1. System Settings This chapter describes user tools in the System Settings menu. General Features This section describes the user tools in the General Features menu under System Settings. Program / Change / Delete User Text You can register text phrases you often use when specifying settings, such as ".com" and "Regards". You can register up to 40 entries.
  • Page 26 1. System Settings Default: [Medium] Warm-up Beeper (copier/Document Server) You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on. Default: [On] If the Panel Key Sound setting is [Off], the beeper does not sound, whatever the Warm-up Beeper setting.
  • Page 27: Output Tray Settings

    General Features Trays that can be selected differ depending on your machine type. Output: Facsimile (facsimile) Specify a tray to which documents are delivered. Trays that can be selected differ depending on your machine type. Output: Printer (printer) Specify a tray to which documents are delivered. Trays that can be selected differ depending on your machine type.
  • Page 28 1. System Settings Type 2 CFL001 1. Internal tray 2 2. Internal tray 1 Type 3 CFL016 1. Finisher shift tray...
  • Page 29: Tray Paper Settings

    Tray Paper Settings Tray Paper Settings This section describes the user tools in the Tray Paper Settings menu under System Settings. • If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed might occur because the correct paper size was not detected.
  • Page 30 1. System Settings You can specify a custom size of between 160.0 356.0 mm (6.30 14.01 inches) vertically, and between 98.0 216.0 mm (3.86 8.50 inches) horizontally. For details about auto detect paper size, see "Recommended Paper Sizes and Types", About This Machine.
  • Page 31 Tray Paper Settings Default for "Apply Auto Paper Select (Printer Only)": [Yes] If [No] is selected in "Apply Auto Paper Select (Printer Only)", "Auto Paper Select" is not available with the printer function and the key mark is displayed next to the paper tray on the printer screen. For details about the relations between possible paper sizes and thickness, see "Recommended Paper Sizes and Types", About This Machine.
  • Page 32 1. System Settings When [At Mode Selected] is selected, front or back cover sheet tray settings only appear when the cover function is selected. When [Full Time] is selected, the front or back cover sheet tray is always displayed. Slip Sheet Tray You can specify and display the paper tray that is used for setting slip sheets.
  • Page 33: Timer Settings

    Timer Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Auto Off Timer After a specified period has passed, following job completion, the machine automatically turns off, in order to conserve energy. This function is called "Auto Off". The machine status after the Auto Off operation is referred to as "Off mode"...
  • Page 34 1. System Settings Default: [On], [60 second(s)] Facsimile Auto Reset Timer (facsimile) Specify the time to elapse before the facsimile mode resets. The time can be set from 30 to 999 seconds, using the number keys. Default: [30 second(s)] Printer Auto Reset Timer (printer) Specify the time to elapse before the printer function resets.
  • Page 35: Setting The Date And Time (Mainly Europe And Asia)

    Timer Settings Setting the Date and Time (mainly Europe and Asia) This section describes how to set the date and time for the machine's internal clock. • Date Day, month, year • Time Hour, minute, second Time format: 24-hour Press the [User Tools/Counter] key. Press [System Settings].
  • Page 36: Setting The Date And Time (Mainly North America)

    1. System Settings Press [Exit]. Press the [User Tools/Counter] key. • Only dates that correspond with the year and month can be set. Incompatible dates will be refused. Setting the Date and Time (mainly North America) This section describes how to set the date and time for the machine's internal clock. •...
  • Page 37 Timer Settings Select [AM] or [PM] and enter the hour, minute, and second using the number keys. Then press [ ]. To change between hour, minute, and second, press [ ] or [ ]. Press [Exit]. Press the [User Tools/Counter] key. •...
  • Page 38: Interface Settings

    1. System Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Network This section describes the user tools in the Network menu under Interface Settings. Machine IPv4 Address Specify the machine's IPv4 network address. Default: [Auto-Obtain (DHCP)] When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx"...
  • Page 39: Ddns Configuration

    Interface Settings Default: [Auto-Obtain (DHCP)] When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a number). DDNS Configuration Specify the DDNS settings. Default: [Active] IPsec Specify the machine's IPsec function Active/Inactive. Default: [Inactive] For details about this function, consult your administrator. Domain Name Specify the domain name.
  • Page 40 1. System Settings NW Frame Type Select the frame type when you use NetWare. Default: [Auto Select] SMB Computer Name Specify the SMB computer name. Enter the computer name using up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Do not set a computer name starting with RNP and rnp.
  • Page 41 Interface Settings LAN Type When you have installed the wireless LAN board, select the method of connection. Default: [Ethernet] [LAN Type] is displayed when wireless LAN board is installed. If Ethernet and Wireless LAN are both connected, the selected interface has priority. Ping Command Check the network connection with ping command using given IPv4 address.
  • Page 42: Wireless Lan

    1. System Settings For details about IEEE 802.1X authentication, see "Configuring IEEE 802.1X". • For details on how to access System Settings, see "Accessing User Tools". • p.20 "Accessing User Tools" • p.313 "Configuring IEEE 802.1X" Wireless LAN This section describes the user tools in the Wireless LAN menu under Interface Settings. [Wireless LAN] is displayed when this machine is installed with the wireless LAN board.
  • Page 43 Interface Settings (mainly North America) • IEEE 802.11 a/b/g Wireless LAN Frequency range: 2412 - 2462 MHz (1 - 11 channels) 5180 - 5240 MHz (36, 40, 44 and 48 channels) Default: [11] Security Method Specifies the encryption of the Wireless LAN. Default: [Off] If you select [WEP], always enter WEP key.
  • Page 44: Print List

    1. System Settings • For details on how to access System Settings, see "Accessing User Tools". • p.20 "Accessing User Tools" • p.313 "Configuring IEEE 802.1X" Print List This section describes how to print the configuration page. You can check items related to the network environment. The configuration page shows the current network settings and network information.
  • Page 45 Interface Settings Press [Print List]. Press the [Start] key. The configuration page is printed. Press [Exit]. Press the [User Tools/Counter] key. • You can also exit by pressing [Exit] on the User Tools main menu. • For details on how to access System Settings, see "Accessing User Tools". •...
  • Page 46: File Transfer

    1. System Settings File Transfer This section describes the user tools in the File Transfer menu under System Settings. Delivery Option Enables or disables sending stored or scanned documents to the ScanRouter delivery server. Default: [Off] Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do, you will have to preregister I/O devices in the ScanRouter delivery software.
  • Page 47 File Transfer If a fax is received but cannot be sent via the ScanRouter delivery software, it is stored in the machine's memory. If received document deletion is set to "1 (On)", documents that cannot be stored due to insufficient memory or an internal hard disk error will automatically be deleted, and a Reception File Erased Report will be printed.
  • Page 48 1. System Settings Enter the password using up to 128 characters. Spaces cannot be entered. • Encryption Select Encryption as follows: [Auto] Use if the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5. [On] Use if the authentication method is CRAM-MD5 or DIGEST-MD5. [Off] Use if the authentication method is PLAIN or LOGIN.
  • Page 49 File Transfer POP3 / IMAP4 Settings Specify the POP3/IMAP4 server name for receiving Internet faxes. The specified POP3/IMAP4 server name is used for [POP before SMTP]. Default: [Auto] • Server Name If DNS is in use, enter the host name. If DNS is not in use, enter the POP3/IMAP4 or server IPv4 address.
  • Page 50 1. System Settings Enter a port number between 1 and 65535 using the number keys, and then press the [ ] key. E-mail Reception Interval Specify, in minutes, the time interval for receiving Internet faxes via POP3 or IMAP4 server. Default: [On], [15 minute(s)] If [On] is selected, the time can be set from 2 to 1440 minutes in increments of one minute.
  • Page 51 File Transfer 11. Enter the text, and then press [OK]. Enter up to five lines of text. Each line can consist of up to 80 characters. 12. Press [OK]. 13. Press [Exit]. 14. Press the [User Tools/Counter] key. • Delete: 1.
  • Page 52 1. System Settings • E-mail Address Enter an e-mail address using up to 128 characters. • User Name Enter a user name using up to 191 characters. • Password Enter a password using up to 128 characters. Scanner Resend Interval Time Specifies the interval the machine waits before resending a scan file, if it cannot be sent to the delivery server or mail server.
  • Page 53: Administrator Tools

    Administrator Tools Administrator Tools This section describes the user tools in the Administrator Tools menu under System Settings. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Administrator Tools settings. Address Book Management You can add, change or delete information registered in the Address Book.
  • Page 54 1. System Settings Address Book: Program / Change / Delete Group Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group. • Program/Change You can register and change groups. •...
  • Page 55 Administrator Tools 5. Press the name key to be moved. You can select a name using the number keys. 6. Press the name key in place you want to move it to. The user key is moved to the selected position, and the user key currently at the selected position is moved forward or backward.
  • Page 56 1. System Settings Print Address Book: Destination List You can print the destination list registered in the Address Book. • Print in Title 1 Order Prints the Address Book in Title 1 order. • Print in Title 2 Order Prints the Address Book in Title 2 order. •...
  • Page 57 Administrator Tools 6. Enter the new name, and then press [OK]. 7. Press [OK]. 8. Press the [User Tools/Counter] key. Address Book: Switch Title Specifies the title to select a name. Default: [Title 1] Back Up / Restore Address Book You can back up the machine's Address Book to external storage or restore the backup copy from the external storage.
  • Page 58 1. System Settings Default: [Do not Carry-over] If you select [Carry-over Data], use the number keys to enter the registration number of the data you wish to carry over from an Address Book. For details about the Windows authentication, LDAP authentication, or Integration server authentication, consult your administrator.
  • Page 59 Administrator Tools Print Volume Use Limitation: Unit Count Setting For details about this function, consult your administrator. Media Slot Use For details about this function, consult your administrator. User Authentication Management • User Code Auth. Using User Code Authentication, you can limit the available functions and supervise their use. When using User Code Authentication, register the user code.
  • Page 60 1. System Settings Program / Change Administrator For details about this function, consult your administrator. Key Counter Management Specify the functions you want to manage with the key counter. • Copier • Document Server • Facsimile • Printer • Scanner External Charge Unit Management You can use the key card to specify an upper limit on machine use.
  • Page 61: Capture Priority

    Administrator Tools Delete All Files in Document Server You can delete files stored in the Document Server, including files stored for Sample Print, Locked Print, Hold Print, and Stored Print under the printer function. Even if a password is always set, all documents are deleted. A confirmation message appears.
  • Page 62 1. System Settings • Password • Realm Name • Search Conditions • Search Options This function supports LDAP Version 2.0 and 3.0. Digest authentication can only be used under LDAP Ver.3.0. To use the LDAP server, select [On] under LDAP Search. For details about how to program the LDAP Server, see "Programming the LDAP server".
  • Page 63 Administrator Tools Transfer Log Setting For details about this function, consult your administrator. Data Security for Copying For details about this function, consult your administrator. Fixed USB Port Specify whether or not to fix the USB port. Default: [Off] If set to [Level 1] It is not necessary to install a new driver when the printer driver of this machine has already been installed on the PC.
  • Page 64: Programming The Ldap Server

    1. System Settings Programming the LDAP server This section describes how to specify the LDAP server settings. This function supports LDAP version 2.0 and 3.0. Program the LDAP server to find e-mail destinations in the LDAP server Address Book directly. This function is possible when sending scan files by e-mail using the scanner or fax function.
  • Page 65 Programming the LDAP server Enter the server name, and then press [OK]. Press [Change] under "Search Base". Select a root folder to start the search from e-mail addresses registered in the selected folder are search targets. Enter the search base, and then press [OK]. For example, if the search target is the sales department of ABC company, enter "dc=sales department, o=ABC".
  • Page 66 1. System Settings If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 19 to 22, and then proceed to step 24. If you select [Kerberos Authentication], proceed to step 19 to 23, and then proceed to step 24. Press [Change] under "User Name".
  • Page 67 Programming the LDAP server Press [Connection Test]. Access the LDAP server to check that the proper connection is established. Check authentication works according to the authentication settings. Press [Exit]. If the connection test fails, check your settings and try again. This function does not check search conditions or the search base.
  • Page 68: Changing The Ldap Server

    1. System Settings The key does not appear on the search screen unless both "Attribute" and "Key Display" are registered. Make sure you register both to use the optional search. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • p.293 "Registering SMTP and LDAP Authentication" Changing the LDAP server This section describes how to change the programmed LDAP server.
  • Page 69 Programming the LDAP server Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [ Next] twice. Press [Program / Change / Delete LDAP Server]. Press [Delete]. Select the LDAP server you want to delete. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 70: Programming The Realm

    1. System Settings Programming the Realm This section describes how to specify the Realm settings. Program the realm to be used for Kerberos authentication. A realm is the network area in which Kerberos authentication is used. After confirming the network environment, specify the necessary items.
  • Page 71: Changing The Realm

    Programming the Realm Press [Change] under "Realm Name". Enter the realm name, and then press [OK]. Enter the realm name, or host name. You can enter a realm name using up to 64 characters. Press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 72: Deleting The Realm

    1. System Settings To change the realm name, press [Change] under "Realm Name". Enter the realm name, and then press [OK]. You can enter a realm name using up to 64 characters. To change the KDC server name, press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 73: Connecting The Machine

    2. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interface This section explains how to identify the machine's interface and connect the machine according to the network environment.
  • Page 74: Connecting To The Ethernet Interface (Mainly Europe And Asia)

    2. Connecting the Machine • The optional interface board slot can contain one module only: You can install only one wireless LAN board, one Gigabit Ethernet board, or one file format converter at a time in this slot. Connecting to the Ethernet Interface (mainly Europe and Asia) This section describes how to connect an Ethernet cable to the Ethernet interface.
  • Page 75: Connecting To The Ethernet Interface (Mainly North America)

    Connecting to the Interface Connect the other end of the Ethernet interface cable to a network connection device such as a hub. Turn on the main power switch of the machine. CFL014 1. Indicators When 100BASE-TX or 10BASE-T is operating, the green LED is lit and the orange LED flashes. If the machine is not connected to the network, both LEDs are turned off.
  • Page 76: Connecting To The Gigabit Ethernet Interface (Mainly Europe And Asia)

    2. Connecting the Machine Connect the Ethernet interface cable to the 10BASE-T/100BASE-TX port. CFL007 Connect the other end of the Ethernet interface cable to a network connection device such as a hub. Turn on the main power switch of the machine. CFL014 1.
  • Page 77 Connecting to the Interface • If the main power switch is on, turn it off. • Use the following Ethernet cables: • When using 100BASE-TX/10BASE-T: Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type 5 or more •...
  • Page 78: Connecting To The Gigabit Ethernet Interface (Mainly North America)

    2. Connecting the Machine Turn on the main power switch of the machine. CFL013 1. Indicator (green) When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating or the machine is not connected to the network, it is turned off. 2.
  • Page 79 Connecting to the Interface Shielded Twisted Pair Cable (STP) and Category type 5e or more Make sure the main power is switched off. Connect the Ethernet interface cable to the Gigabit Ethernet port. CFL008 Connect the other end of the Ethernet interface cable to a network connection device such as a hub.
  • Page 80: Connecting To The Usb (Type B) Interface

    2. Connecting the Machine Connecting to the USB (Type B) Interface This section describes how to connect the USB2.0 (Type B) interface cable to the USB2.0 port. Caution: Properly shield twisted pair cable (STP cable) must be used for connections to a host computer (and/or peripheral) in order to meet emission limits.
  • Page 81: Connecting A Device To The Machine's Usb Host Interface

    Connecting to the Interface Connecting a Device to the Machine's USB Host Interface This section explains how to connect a device to the machine's USB host interface. Connect one end of the USB interface cable to the machine's USB host interface. CFL010 Connect the other end of the USB interface cable to a card authentication device or media slot.
  • Page 82 2. Connecting the Machine Select the communication mode Select the communication mode 802.11 Ad-hoc Mode Infrastructure Mode Set the SSID Set the SSID Select ad-hoc channel Select Security Type Select Security Type Enable/Disable Encryption (WEP/WPA) Enable/Disable Encryption (WEP/WPA) Confirm the connection Confirm the connection BZU020 •...
  • Page 83 Connecting to the Interface When using in infrastructure mode, you can check the machine's radio wave status using the control panel. Press the [User Tools/Counter] key. Press [System Settings]. Press [Interface Settings]. Press [Wireless LAN]. Press [Wireless LAN Signal]. The machine's radio wave status appears. After checking radio wave status, press [Exit].
  • Page 84: Network Settings Required To Use The Printer/Lan-Fax

    2. Connecting the Machine Network Settings Required to Use the Printer/ LAN-Fax This section lists the network settings required for using the printer or LAN-Fax function. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the printer or LAN-Fax function with an Ethernet connection.
  • Page 85: Wireless Lan

    Network Settings Required to Use the Printer/LAN-Fax Menu User Tool Setting Requirements Interface Settings/Network SMB Work Group As required Interface Settings/Network Ethernet Speed As required Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Permit SSL / TLS Interface Settings/Network As required Communication...
  • Page 86 2. Connecting the Machine Menu User Tool Setting Requirements IPv6 Stateless Address Interface Settings/Network As required Autoconfiguration Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required...
  • Page 87 Network Settings Required to Use the Printer/LAN-Fax • p.36 "Interface Settings"...
  • Page 88: Network Settings Required To Use Internet Fax

    2. Connecting the Machine Network Settings Required to Use Internet Fax This section lists the network settings required for using Internet Fax. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using Internet Fax with an Ethernet connection. For details about how to specify the settings, see "Interface Settings"...
  • Page 89 Network Settings Required to Use Internet Fax Menu User Tool Setting Requirements IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer...
  • Page 90: Wireless Lan

    2. Connecting the Machine • p.44 "File Transfer" Wireless LAN This section lists the settings required for using Internet Fax with a wireless LAN connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network...
  • Page 91 Network Settings Required to Use Internet Fax Menu User Tool Setting Requirements File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address...
  • Page 92: Network Settings Required To Use E-Mail Function

    2. Connecting the Machine Network Settings Required to Use E-mail Function This section lists the network settings required for sending e-mail. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for sending e-mail with an Ethernet connection. For details about how to specify the settings, see "Interface Settings"...
  • Page 93 Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet File Transfer SMTP Server Necessary File Transfer SMTP Authentication...
  • Page 94: Wireless Lan

    2. Connecting the Machine Wireless LAN This section lists the settings required for sending e-mail with a Wireless LAN connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network...
  • Page 95 Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address As required File Transfer...
  • Page 96: Network Settings Required To Use Scan To Folder Function

    2. Connecting the Machine Network Settings Required to Use Scan to Folder Function This section lists the network settings required for sending files. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for sending files with an Ethernet connection.
  • Page 97: Wireless Lan

    Network Settings Required to Use Scan to Folder Function Menu User Tool Setting Requirements Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet Default User Name / Password File Transfer As required (Send)
  • Page 98 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network...
  • Page 99: Network Settings Required To Use The Network Delivery Scanner

    Network Settings Required to Use the Network Delivery Scanner Network Settings Required to Use the Network Delivery Scanner This section lists the network settings required for delivering data to the network. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for delivering data to the network with an Ethernet connection.
  • Page 100: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet File Transfer Delivery Option Necessary File Transfer Fax RX File Transmission As required File Transfer...
  • Page 101 Network Settings Required to Use the Network Delivery Scanner Menu User Tool Setting Requirements IPv6 Stateless Address Interface Settings/Network As required Autoconfiguration Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network...
  • Page 102 2. Connecting the Machine • p.36 "Interface Settings" • p.44 "File Transfer"...
  • Page 103: Network Settings Required To Use Wsd Scanner

    Network Settings Required to Use WSD Scanner Network Settings Required to Use WSD Scanner This section lists the network settings required for using WSD Scanner function. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using WSD Scanner function with an Ethernet connection.
  • Page 104: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network Ethernet Speed As required Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network Host Name As required Interface Settings/Network Machine Name...
  • Page 105 Network Settings Required to Use WSD Scanner Menu User Tool Setting Requirements Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network NCP Delivery Protocol As required...
  • Page 106: Network Settings Required To Use Network Twain Scanner

    2. Connecting the Machine Network Settings Required to Use Network TWAIN Scanner This section lists the network settings required for using the TWAIN Scanner under the network environment. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the network TWAIN Scanner with an Ethernet connection.
  • Page 107: Wireless Lan

    Network Settings Required to Use Network TWAIN Scanner • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [LAN Type] is displayed when the wireless LAN board is installed. • When both Ethernet and wireless LAN are connected, the selected interface takes precedence. •...
  • Page 108 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Wireless LAN Security Method As required • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [Wireless LAN] and [LAN Type] are displayed when the wireless LAN board is installed. When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
  • Page 109: Network Settings Required To Use Document Server

    Network Settings Required to Use Document Server Network Settings Required to Use Document Server This section lists the settings required for using the Document Server function under the network environment. • These settings should be made by the administrator, or with the advice of the administrator. Ethernet This section lists the settings required for using the Document Server function with an Ethernet connection.
  • Page 110: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network Host Name As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. •...
  • Page 111 Network Settings Required to Use Document Server Menu User Tool Setting Requirements Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Permit SSL / TLS Interface Settings/Network As required Communication Interface Settings/Network...
  • Page 112: Using Utilities To Make Network Settings

    2. Connecting the Machine Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor and telnet. • These settings should be made by the administrator, or with the advice of the administrator. •...
  • Page 113 Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. [Network] [IPv6 Stateless Address Autoconfiguration] • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [DNS Configuration] [Auto-Obtain (DHCP)]...
  • Page 114 2. Connecting the Machine • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "IPv4" • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "IPv6"...
  • Page 115 Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. [Network] [NW Frame Type] [Ethernet 802.3] • Web Image Monitor: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [NW Frame Type] [Ethernet SNAP]...
  • Page 116 2. Connecting the Machine • telnet: Can be used for specifying the setting. [Network] [Permit SSL / TLS Communication] [Ciphertext Only] • Web Image Monitor: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [Network] [Permit SSL / TLS Communication] [Ciphertext Priority]...
  • Page 117: File Transfer

    Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. File Transfer This section describes how to make File Transfer settings using utilities. Change settings by using Web Image Monitor and telnet. [File Transfer] [Delivery Option] •...
  • Page 118 2. Connecting the Machine [File Transfer] [POP3 / IMAP4 Settings] • Web Image Monitor: Can be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [File Transfer] [Administrator's E-mail Address] • Web Image Monitor: Can be used for specifying the setting. •...
  • Page 119 Using Utilities to Make Network Settings [File Transfer] [Number of Scanner Resends] • Web Image Monitor: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting.
  • Page 120: Connecting The Machine To A Telephone Line And Telephone

    2. Connecting the Machine Connecting the Machine to a Telephone Line and Telephone This section describes how to connect the machine to the telephone lines. • Make sure the connector is the correct type before you start. To connect the machine to a telephone line, use a snap-in modular type connector. Connect a telephone line cord to the G3 interface unit connector (LINE).
  • Page 121: Using A Printer Server

    3. Using a Printer Server This chapter describes how to configure the machine as a network printer. Preparing Printer Server This section explains how to configure the machine as a Windows network printer. The machine is configured to enable network clients to use it. •...
  • Page 122: Using Netware

    3. Using a Printer Server Using NetWare This section describes the setting procedure for network printers in the NetWare environment. In the NetWare environment, you can connect the machine as a "print server" or "remote printer". • IPv6 cannot be used on this function. •...
  • Page 123: Setting Up As A Print Server (Netware 4.X, 5/5.1, 6/6.5)

    Using NetWare • NDS Tree: To enable NDS mode, enter the name of the NDS tree you want to log in to. Use up to 32 alphanumeric characters. • NDS Context Name: To enable NDS mode, enter the print server context. Use up to 127 characters.
  • Page 124: Using Pure Ip In The Netware 5/5.1 Or 6/6.5 Environment

    3. Using a Printer Server • When using the printer as a print server in NetWare 4.x, NetWare 5/5.1, or NetWare 6/6.5, set it to the NDS mode. • When using NetWare 5/5.1 or NetWare 6/6.5, set the printer as a print server. Start Web Image Monitor.
  • Page 125 Using NetWare • When creating a queued print server in a pure IP environment of NetWare 5/5.1 or NetWare 6/6.5, create a print queue on the file server using NetWare Administrator. • This printer is not available as a remote printer for use in a pure IP environment. •...
  • Page 126: Setting Up As A Remote Printer (Netware 3.X)

    3. Using a Printer Server Start the print server by entering the following from the console of the NetWare server. If the print server is in operation, quit and restart it. To quit CAREE: unload pserver To start CAREE: load pserver [print server name] Setting up using Web Image Monitor Start Web Image Monitor.
  • Page 127 Using NetWare Setting up using PCONSOLE Enter "PCONSOLE" from the command prompt. F:> PCONSOLE Create a print queue. When using the existing print queue, go to the procedure for creating a printer. From the [Available Options] menu, select [Print Queue Information], and then press the [Enter] key.
  • Page 128 3. Using a Printer Server Start the print server by entering the following from the console of the NetWare server. If the print server is in operation, quit and restart it. To quit CAREE: unload pserver To start CAREE: load pserver [print server name] If the printer works as configured, the message "Waiting for job"...
  • Page 129: Setting Up As A Remote Printer (Netware 4.X, 5/5.1, 6/6.5)

    Using NetWare Setting Up as a Remote Printer (NetWare 4.x, 5/5.1, 6/6.5) Follow the procedure below to use the printer as a remote printer under NetWare 4.x, 5/ 5.1 and 6/6.5. • To use the printer as a remote printer under NetWare 4.x, 5/5.1, 6/6.5, set it to NDS mode. •...
  • Page 130 3. Using a Printer Server Assign the printer to the created print server. Click [Assignments], and then click [Add] in the [Assignments] area. In the [Available objects] box, click the queue you created, and then click [OK]. In the [Printers] area, click the printer you assigned, and then click [Printer Number]. Enter the printer number, and then click [OK].
  • Page 131 Using NetWare • For details about Web Image Monitor, see "Using Web Image Monitor". • p.131 "Using Web Image Monitor"...
  • Page 132 3. Using a Printer Server...
  • Page 133: Monitoring And Configuring The Machine

    4. Monitoring and Configuring the Machine This chapter describes how to monitor and configure the machine. Using Web Image Monitor Using Web Image Monitor, you can check the machine status and change settings. Available operations The following operations can be remotely performed using Web Image Monitor from a client computer.
  • Page 134: Displaying Top Page

    4. Monitoring and Configuring the Machine • Display and operation problems can occur if you do not enable JavaScript and cookies, or if you are using a non-recommended Web browser. • If you are using a proxy server, change the Web browser settings. Contact your administrator for information about the settings.
  • Page 135 Using Web Image Monitor Enter "http://(machine's IP address or host name)/" in your Web browser's URL bar. The top page of Web Image Monitor appears. If the machine's host name has been registered on the DNS or WINS server, you can enter it. When setting SSL, a protocol for encrypted communication, under environment which server authentication is issued, enter "https://(machine's IP address or host name)/".
  • Page 136: When User Authentication Is Set

    4. Monitoring and Configuring the Machine When User Authentication is Set Login (using Web Image Monitor) Follow the procedure below to log in when user authentication is set. Click [Login]. Enter a login user name and password, and then click [Login]. For details about the login user name and password, consult your network administrator.
  • Page 137 Using Web Image Monitor CFL003 1. Home The [Status], [Supplies], [Device Info], [Counter], and [Inquiry] tab are displayed. Details of the tab menu are displayed on the work area. 2. Document Server Display files stored in the Document Server. 3. Fax Received File Display received fax files.
  • Page 138: Access In The Administrator Mode

    4. Monitoring and Configuring the Machine 1. Home The [Status], [Supplies], [Device Info], [Counter], and [Inquiry] tab are displayed. Details of the tab menu are displayed on the work area. 2. Document Server Display files stored in the Document Server. 3.
  • Page 139 Using Web Image Monitor Home Status Menu Guest mode Administrator mode Reset Device None Modify Reset Printer Job None Modify Status Read Read Toner Read Read Input Tray Read Read Output Tray Read Read Supplies Menu Guest mode Administrator mode Maintenance Kit Read Read...
  • Page 140 4. Monitoring and Configuring the Machine Menu Guest mode Administrator mode Send/TX Total Read Read Fax Transmission Read Read Scanner Send Read Read Coverage Read Read Other Function(s) Read Read Inquiry Menu Guest mode Administrator mode Machine Maintenance/ Read Read Repair Sales Representative Read...
  • Page 141 Using Web Image Monitor Job List Menu Guest mode Administrator mode Current/Waiting Jobs Read Read/Modify Job History Read Read Printer Menu Guest mode Administrator mode Spool Printing Read Read/Modify Job History Read Read Error Log Read Read *1 "Spool Printing" appears only if the Spool function is enabled. You can enable and disable the Spool setting using the "spoolsw"...
  • Page 142 4. Monitoring and Configuring the Machine Configuration Device Settings Menu Guest mode Administrator mode System Read Read/Modify Paper Read Read/Modify Date/Time Read Read/Modify Timer Read Read/Modify Logs None Read/Modify Download Logs None Read/Modify E-mail Read Read/Modify Auto E-mail Notification None Read/Modify On-demand E-mail None...
  • Page 143 Using Web Image Monitor Menu Guest mode Administrator mode Tray Parameters (PCL) None Read/Modify Tray Parameters (PS) None Read/Modify Virtual Printer Settings Read Read/Modify PDF Temporary Password Modify None PDF Group Password None Modify PDF Fixed Password None Modify *1 This setting is not available on this machine. Menu Guest mode Administrator mode...
  • Page 144 4. Monitoring and Configuring the Machine Interface Menu Guest mode Administrator mode Interface Settings Read Read/Modify Wireless LAN Settings Read Read/Modify Network Menu Guest mode Administrator mode IPv4 Read Read/Modify IPv6 Read Read/Modify NetWare Read Read/Modify Read Read/Modify SNMP None Read/Modify SNMPv3 None...
  • Page 145 Using Web Image Monitor Menu Guest mode Administrator mode User Lockout Policy None Read/Modify IEEE 802.1X None Read/Modify S/MIME None Read/Modify RC Gate Menu Guest mode Administrator mode Setup RC Gate None Read/Modify Update RC Gate Firmware None Read RC Gate Proxy Server None Read/Modify Webpage...
  • Page 146: Displaying Web Image Monitor Help

    4. Monitoring and Configuring the Machine Menu Guest mode Administrator mode Copy Card Save Data None Read/Modify • Some items are not displayed depending on the security settings. Displaying Web Image Monitor Help When using Help for the first time, clicking the Help button ( ) makes the following screen appear, in which you can view Help in two different ways, as shown below: Viewing Help on our Web site...
  • Page 147 Using Web Image Monitor In the [Set Help URL Target] box, enter the URL of the help file. If you saved the help file to "\\Server_A\HELP\EN", enter "file://Server_A/HELP/". For example, if you saved the file to a Web server, and the URL of the index file is "http:// a.b.c.d/ HELP/EN/index.html", enter "http://a.b.c.d/HELP/".
  • Page 148: When Using Ipp With Smartdevicemonitor For Client

    4. Monitoring and Configuring the Machine When Using IPP with SmartDeviceMonitor for Client To use this function, you must first download SmartDeviceMonitor for Client from the manufacturer's Web site and install it on your computer. Contact your local dealer for information on downloading SmartDeviceMonitor for Client.
  • Page 149: Machine Status Notification By E-Mail

    Machine Status Notification by E-Mail Machine Status Notification by E-Mail Whenever a paper tray becomes empty or paper is jammed, an e-mail alert is issued to the registered addresses to notify the machine status. For this notification, you can make the e-mail notification settings. Notification timing and e-mail content can be set.
  • Page 150 4. Monitoring and Configuring the Machine • Replacement Required: Print Cartridge • Replacement Required Soon: Print Cartridge • Toner Almost Empty (Remaining Level Selectable) Log in to Web Image Monitor in administrator mode. In the menu area, click [Configuration]. Under "Device Settings", click [E-mail]. Make the following settings: •...
  • Page 151: Setting The Account For E-Mail Notification

    Machine Status Notification by E-Mail • p.131 "Using Web Image Monitor" Setting the Account for E-mail Notification Before you use Auto E-mail Notification or On-demand E-mail notification, setup an e-mail account to be used for the function. Perform the following configuration task in Web Image Monitor. Log in to Web Image Monitor in administrator mode.
  • Page 152 4. Monitoring and Configuring the Machine 2. In the menu area, click [Configuration]. 3. Under "Device Settings", click [E-mail]. 4. Make the following settings in SMTP column: • SMTP Server Name: Enter the IP address or host name of the SMTP server. •...
  • Page 153: Auto E-Mail Notification

    Machine Status Notification by E-Mail Auto E-mail Notification Log in to Web Image Monitor in administrator mode. In the menu area, click [Configuration]. Under "Device Settings", click [Auto E-mail Notification]. The dialog box for making notification settings appears. Make the following settings: •...
  • Page 154: Format Of On-Demand E-Mail Messages

    4. Monitoring and Configuring the Machine • Items in the Receivable E-mail Address/Domain Name Settings column: Enter an e-mail address or domain name to use for requesting information by e-mail and to receive its return e-mail. Click [OK]. Click [Logout]. Quit Web Image Monitor.
  • Page 155: Remote Maintenance Using Telnet

    Remote Maintenance Using telnet Remote Maintenance Using telnet • Remote Maintenance should be protected so that access is allowed to administrators only. • The password is the same as the one of Web Image Monitor administrator. When the password is changed using "telnet", other's change also.
  • Page 156: Access

    4. Monitoring and Configuring the Machine access Use the "access" command to view and configure access control. You can also specify two or more access ranges. View settings msh> access IPv4 configuration display msh> access "ID" range IPv6 configuration display msh>...
  • Page 157: Authfree

    Remote Maintenance Using telnet • For IPv4 and IPv6, you can select an ID number between 1 and 5. • IPv6 can register and select the range and the mask for each access ranges. • IPv6 mask ranges between 1 - 128 can be selected. •...
  • Page 158: Bonjour

    4. Monitoring and Configuring the Machine msh> autonet {on|off} • {on} means "active" and {off} means "inactive". Current interface priority configuration display msh> autonet priority Interface priority configuration msh> autonet priority "interface_name" • You can give interface's AutoNet parameter priority. •...
  • Page 159 Remote Maintenance Using telnet Setting order of priority for each protocol • msh> bonjour diprint [0-99] • msh> bonjour lpr [0-99] • msh> bonjour ipp [0-99] You can specify the order of priority for "diprint", "lpr", and "ipp". Smaller numbers indicate higher priority.
  • Page 160: Devicename

    4. Monitoring and Configuring the Machine devicename Use the "devicename" command to display and change the printer name. View settings msh> devicename Printer name configuration msh> devicename name "string" • Enter a printer name using up to 31 alphanumeric characters. •...
  • Page 161: Dhcp6

    Remote Maintenance Using telnet Interface priority configuration msh> dhcp priority "interface_name" • You can select which interface has DHCP parameter priority. • Priority settings are available when multiple interfaces are installed. DNS server address selection msh> dhcp dnsaddr {dhcp|static} • Specify whether to obtain the DNS server address from the DHCP server or use the address set by a user.
  • Page 162: Diprint

    4. Monitoring and Configuring the Machine Interface name Interface configured wlan IEEE 802.11 interface Viewing and specifying DNS server address selection (obtained from the dhcpv6 server/user specified value) msh> dhcp6 dnsaddr {dhcp|static} DUID(DHCP unique ID) deletion and display msh> dhcp6 duid clear Viewing and specifying the time required to re-obtain the parameter obtained from dhcpv6 msh>...
  • Page 163: Dns

    Remote Maintenance Using telnet • You can specify the timeout interval to use when the printer is expecting data from the network. • The default is 300 seconds. • This command functions in conjunction with the "lpr" command. Specifying the number of concurrent connections msh>...
  • Page 164 4. Monitoring and Configuring the Machine • wlan can be specified only when the IEEE 802.11 interface is installed. Interface name Interface configured ether Ethernet interface wlan IEEE 802.11 interface Specifying the record overlap operation msh> dns overlap {update|add} • You can specify operations performed when records overlap. •...
  • Page 165: Domainname

    Remote Maintenance Using telnet • Appears during dual stacking only. domainname Use the "domainname" command to display or configure the domain name settings. You can configure the Ethernet interface or IEEE 802.11 interface. View settings The following command displays the current domain name: msh>...
  • Page 166: Etherconfig

    4. Monitoring and Configuring the Machine etherconfig Use the "etherconfig" command to view and configure the Ethernet parameters. View settings msh> etherconfig Specify Ethernet Speed msh> etherconfig speed {auto|10f|10h|100f|100h} • auto=Auto Select • 10f=10 Mbps Full Duplex • 10h=10 Mbps Half Duplex •...
  • Page 167: Ifconfig

    Remote Maintenance Using telnet • If you do not specify an interface, the Ethernet interface is selected automatically. Interface name Interface configured ether Ethernet interface wlan IEEE 802.11 interface Initializing the printer name for each interface msh>hostname "interface_name" clear name ifconfig Use the "ifconfig"...
  • Page 168: Info

    4. Monitoring and Configuring the Machine msh> ifconfig ether netmask 255.255.255.0 Broadcast address configuration msh> ifconfig "interface_name" broadcast "address" Changing the interface msh> ifconfig "interface" up • When using the optional IEEE 802.11 interface unit, you can specify either Ethernet or IEEE 802.11 interface.
  • Page 169: Ipsec

    Remote Maintenance Using telnet IPP user authorization configuration Use IPP user authorization to restrict users to print with IPP. The default is "off". msh> ipp auth {off|digest|basic} • User authorization settings are "basic" and "digest". • If user authorization is specified, register a user name. You can register up to 10 users. IPP user name configuration Configure IPP users according to the following messages: msh>...
  • Page 170: Logout

    4. Monitoring and Configuring the Machine If "on" is selected, IPv6 requests information required for maintaining stateful connection to the router for as long as the printer power is turned on. This setting allows information from the router to be obtained constantly, and periodically refreshes the effective period of the stateless address. logout Use "logout"...
  • Page 171: Netware

    Remote Maintenance Using telnet netware Use the "netware" command to view and configure the NetWare settings such as the print server name or file server name. The following commands are available only when the NetWare is installed. NetWare Printer Server Names msh>...
  • Page 172: Passwd

    4. Monitoring and Configuring the Machine Setting login mode for NDS tree name msh> netware tree "NDS tree name" File transfer protocol msh> netware trans {ipv4pri|ipxpri|ipv4|ipx} • If you do not specify the protocol, the current setting is displayed. Protocol Set Protocol ipv4pri IPv4+IPX(IPv4)
  • Page 173: Prnlog

    Remote Maintenance Using telnet View settings msh> pathmtu Configuration msh> pathmtu {on|off} • The default is "on". • If the MTU size of the sent data is larger than the router's MTU, the router will declare it impassable, and communication will fail. If this happens, setting "pathmtu" to "on" optimizes the MTU size and prevents data output failure.
  • Page 174: Route

    4. Monitoring and Configuring the Machine • "RHPP" is an abbreviation of "Reliable Host Printing Protocol", which is a manufacturer-original printing protocol. route Use the "route" command to view and control the routing table. Specified route information display msh> route get "destination" •...
  • Page 175: Set

    Remote Maintenance Using telnet • You cannot register a record that has the same destination and prefix as a registered record. • You cannot register a record that uses "0000:0000:0000:0000:0000:0000:0000:0000" as its destination. Deleting a specified IPv6 destination from routing table msh>...
  • Page 176 4. Monitoring and Configuring the Machine msh> set lpr6 msh> set ftp msh> set ftp6 msh> set rsh msh> set rsh6 msh> set diprint msh> set diprint6 msh> set web msh> set snmp msh> set ssl msh> set ssl6 msh> set nrs msh>...
  • Page 177 Remote Maintenance Using telnet Configuration • Enter "up" to enable the protocol, and enter "down" to disable the protocol. You can set the protocol to "active" or "inactive". msh> set ipv4 {up|down} • If you disable IPv4, you cannot use remote access after logging out. If you did this by mistake, you can use the control panel to enable remote access via IPv4.
  • Page 178: Show

    4. Monitoring and Configuring the Machine msh> set ipp {up|down} msh> set ipp6 {up|down} msh> set http {up|down} msh> set http6 {up|down} msh> set bonjour {up|down} msh> set bonjour6 {up|down} msh> set ssh {up|down} msh> set ssdp {up|down} msh> set nbt {up|down} msh>...
  • Page 179: Smb

    Remote Maintenance Using telnet • You can search the NetWare server using SLP in the PureIP environment of NetWare 5/5.1. Using the "slp" command, you can configure the value of TTL which can be used by SLP multicast packet. • The default value of TTL is 1. A search is executed only within a local segment. If the router does not support multicast, the settings are not available even if the TTL value is increased.
  • Page 180: Snmp

    4. Monitoring and Configuring the Machine Specifying higher priority SMB client ports msh> smb client port {139|445} Displaying SMB client authentication level msh> smb client auth Specifying SMB client authentication level msh> smb client auth {0|1} snmp Use the "snmp" command to display and edit the SNMP configuration settings such as the community name.
  • Page 181 Remote Maintenance Using telnet • You can configure ten SNMP access settings numbered 1-10. • The printer cannot be accessed from SmartDeviceMonitor for Admin or SmartDeviceMonitor for Client if “public” is not registered in numbers 1-10. When changing the community name, use SmartDeviceMonitor for Admin and SNMP Setup Tool to correspond with printer settings.
  • Page 182 4. Monitoring and Configuring the Machine • The network interface board accepts requests only from hosts that have IPv4, IPv6, and IPX addresses with access types of "read-only" or "read-write". Enter "0" to have the network interface board accept requests from any host without requiring a specific type of access. •...
  • Page 183: Sntp

    Remote Maintenance Using telnet msh> snmp v3trap [1-5] {ipv4|ipv6|ipx} "address" Configuring a sending protocol for SNMP v3 TRAP "IPX" is shown only when the NetWare is installed. msh> snmp v3trap [1-5] active {ipv4|ipv6|ipx} {on|off} Configuring a user account for SNMP v3 TRAP msh>...
  • Page 184: Spoolsw

    4. Monitoring and Configuring the Machine Deleting NTP server configuration msh> sntp server clear Interval configuration msh> sntp interval "polling_time" • You can specify the interval at which the printer synchronizes with the operator-specified NTP server. The default is 60 minutes. •...
  • Page 185: Ssdp

    Remote Maintenance Using telnet msh> spoolsw smb {on|off} msh> spoolsw ftp {on|off} msh> spoolsw sftp {on|off} msh> spoolsw wsprn {on|off} ssdp Use the "ssdp" command to view and configure the SSDP settings. View settings msh> ssdp Setting effective time msh> ssdp profile [1801-86400] The default is 10800 seconds.
  • Page 186: Status

    4. Monitoring and Configuring the Machine Setting an open key for SSH/SFTP msh> ssh genkey {512|768|1024} "character string" Create an open key for SSH/SFTP communication. Usable characters are ASCII 0x20-0x7e (32 bytes) other than "0". The default key length is 1024, and the character string is blank. If you do not specify this parameter, an open key with the default value will be created.
  • Page 187: Web

    Remote Maintenance Using telnet Public URL configuration msh> upnp url "string" • Enter the URL string in the character string. Use the "web" command to display and configure parameters on Web Image Monitor. View settings msh> web URL configuration You can set URLs linked by clicking [URL] on Web Image Monitor. msh>...
  • Page 188 4. Monitoring and Configuring the Machine View settings msh> wiconfig View IEEE 802.11 information msh> wiconfig cardinfo If IEEE 802.11 is disabled or unavailable, information about it will not appear. Configuration msh> wiconfig "parameter" Parameter Value configured mode {ap|802.11adhoc} You can set the infrastructure mode (ap) or the 802.11 Ad hoc mode (802.11adhoc).
  • Page 189 Remote Maintenance Using telnet Parameter Value configured key "key value" val [1|2|3|4] You can specify the WEP key by entering in hexadecimal. With a 64-bit WEP, you can use 10 digit hexadecimals. With a 128-bit WEP, you can use 26 digit hexadecimals. Up to four WEP keys can be registered.
  • Page 190 4. Monitoring and Configuring the Machine Parameter Value configured wepauth {open|shared} You can set an authorization mode when using WEP. The specified value and authorized mode are as follows: open: open system authorization (default) shared: shared key authorization security {none|wep|wpa} You can specify the Security Mode.
  • Page 191 Remote Maintenance Using telnet Parameter Value configured eap {tls|ttls|leap|peap} {chap|mschap| You can specify the EAP authentication type. mschapv2|pap|md5|tls} tls: EAP-TLS (default) ttls: EAP-TTLS leap: LEAP peap: PEAP chap, mschap, mschapv2, pap, md5, and tls are settings for the phase 2 method, and one of these must be specified if EAP-TTLS or PEAP is selected.
  • Page 192: Wins

    4. Monitoring and Configuring the Machine Parameter Value configured srvcert {on|off} You can set the server certificate. The default is "off". imca {on|off} You can enable or disable the certificate when the intermediate certificate authority is present. The default is "off". srvid "character string"...
  • Page 193: Wsmfp

    Remote Maintenance Using telnet • If the IPv4 address obtained from DHCP differs from the WINS IPv4 address, the DHCP address is the valid address. Configuration msh> wins "interface_name" {on|off} • {on} means "active" and {off} means "inactive". • Be sure to specify the interface. •...
  • Page 194: 8021X

    4. Monitoring and Configuring the Machine View settings msh> wsmfp Comment settings msh> wsmfp comments "comment" • If you do not specify a comment, current setting is displayed. Location configuration mah> wsmfp location "location" • If you do not specify a comment, current setting is displayed. Presentation URL configuration msh>...
  • Page 195 Remote Maintenance Using telnet View settings msh> 8021x Configuration msh> 8021x "parameter" Parameter Value configured eap {tls|ttls|leap|peap} {chap|mschap| You can specify the EAP authentication type. mschapv2|pap|md5|tls} tls: EAP-TLS (default) ttls: EAP-TTLS leap: LEAP peap: PEAP chap, mschap, mschapv2, pap, md5, and tls are settings for the phase 2 method, and one of these must be specified if EAP-TTLS or PEAP is selected.
  • Page 196 4. Monitoring and Configuring the Machine Parameter Value configured domain "character string" You can specify the login domain name for the Radius server. The characters you can enter are ASCII 0x20-0x7e (64 bytes), but not "@" or "\". The default is blank. password "character string"...
  • Page 197: Snmp

    SNMP SNMP Using the SNMP manager, you can get information about the machine. The SNMP agent operating on UDP and IPX is incorporated into the built-in Ethernet board and optional IEEE 802.11 interface unit of this machine. This machine also supports SNMPv3, which increases user authentication, data encryption, and access control security.
  • Page 198: Getting Machine Information Over The Network

    4. Monitoring and Configuring the Machine Getting Machine Information over the Network This section explains details of each item displayed in the machine status and information. Current Machine Status This section explains how you can check the machine's status and the items displayed. Depending on the options installed on the machine, some items might not be displayed.
  • Page 199 Getting Machine Information over the Network Messages Description Error: Address Book An error has occurred in the data of the address book. Error: Command Transmission An error has occurred in the machine. Error: Ethernet Board An Ethernet board error has occurred. Error: HDD Board A hard disk drive board error has occurred.
  • Page 200 4. Monitoring and Configuring the Machine Messages Description In Use: Copier The copier is being used. In Use: Fax The fax is being used. In Use: Finisher Other functions is using Finisher. In Use: Input Tray Other functions is using the input tray. In Use: Staple Unit Other functions is using the staple unit.
  • Page 201 Getting Machine Information over the Network Messages Description Mismatch: Paper Size/Image Size Indicated paper tray does not contain paper that matches the size of the print image. Mismatch: Paper Type Indicated paper tray does not contain paper of selected type. Near Replacing: Maintenance Kit Prepare a new maintenance kit.
  • Page 202 4. Monitoring and Configuring the Machine Messages Description Original on Exposure Glass The original remains on the exposure glass. Panel Off Mode The machine is in Panel-Off mode. Panel Off Mode>>Printing ava. The machine is in Control Panel-Off mode. Paper in Duplex Unit The paper remains in the duplex unit.
  • Page 203: Printer Configuration

    Getting Machine Information over the Network Messages Description Replace Prt Crtdg: Wst Tnr Full The waste toner is full. It is time to replace the print cartridge. Replace Prt Cart: Pt Life Ended The life of the photoconductor unit has ended. It is time to replace the print cartridge.
  • Page 204 4. Monitoring and Configuring the Machine This section explains the checking procedure for input/output tray and printer language. • UNIX: Use the "info" parameter and the "rsh", "rcp", "ftp", and "sftp" commands. "rsh" and "rcp" cannot be used in a Windows environment. •...
  • Page 205 Getting Machine Information over the Network • For details about UNIX commands and parameters, see UNIX Supplement.
  • Page 206: Understanding The Displayed Information

    4. Monitoring and Configuring the Machine Understanding the Displayed Information This section explains how to read status information returned by the network interface board. Print Job Information Use the following command to display print job information: • UNIX: Use the "stat" parameter and the "rsh", "rcp", "ftp", and "sftp" commands. "rsh" and "rcp" cannot be used in a Windows environment.
  • Page 207: Configuring The Network Interface Board

    Understanding the Displayed Information Item Description Print request ID. User Print request user name. Page Number of pages printed Result Print Request Result Communication Result • OK Print was completed normally. However, the print result may not be as required due to printer problems.
  • Page 208 4. Monitoring and Configuring the Machine IPv4, IPv6, IPsec, NetWare, SMB Device Up/Down The following device is displayed ("Up" indicates enabled; "Down", indicates disabled): Ethernet interface Displays the Ethernet speed. Syslog priority "LOG_INFO" is displayed. NVRAM version Displays the NVRAM version. Device name Displays the device name.
  • Page 209 Understanding the Displayed Information • Host name • DNS Domain • Access Control IPv4: Access Entry [1]-[5] IPv6: Access Entry [1]-[5] • SNTP Server • Time Zone • SNTP Server polling time • SYSLOG server • Home page URL1 • Home page link name1 •...
  • Page 210 4. Monitoring and Configuring the Machine Mode, Direct print, Notification • Workgroup name • Computer name • Comment • Share name[1] • Protocol Wireless LAN The following items are displayed: Host name, Communication Mode, SSID, Channel, Security, WEP Authentication, WEP Encryption key number, WEP Encryption keys [1]-[4], WPA Encryption, WPA Authentication, Pre-Shared Key, User name, Domain name, EAP Type, Password, Phase 2 user name, Phase 2 Method TTLS, Phase 2 Method PEAP, Server cert., Intermediate CA, Server ID, Sub domain, Mic check...
  • Page 211 Understanding the Displayed Information SSDP The following items are displayed: UUID, Profile, TTL UPnP The following item is displayed: Bonjour The following items are displayed: Computer Name(cname), Local Hostname(ether), Local Hostname(wlan), Location, Priority(diprint), Priority(lpr), Priority(ipp), IP TTL, LinkLocal Route for Multi I/F, IPP Port SNMP The following items are displayed: SNMPv1v2, SNMPv3, protocol, v1Trap, v2Trap, v3Trap, SNMPv1v2 Remote Setting, SNMPv3...
  • Page 212 4. Monitoring and Configuring the Machine IEEE 802.1X The following items are displayed: User name, Domain name, EAP Type, Password, Phase 2 user name, Phase 2 Method TTLS, Phase 2 Method PEAP, Server cert., Intermediate CA, Server ID, Sub domain Shell mode "User mode"...
  • Page 213: Message List

    Message List Message List This is a list of messages that appear in the machine's system log. The system log can be viewed using the "syslog" command. System Log Information Use the following command to display the system log information: •...
  • Page 214 4. Monitoring and Configuring the Machine Message Problem and solutions add_sess_IPv6: community <community name> The same community name already exists. Use already defined. another community name. add_sess_IPX: bad trap addr: <IPX address> The IPX address (00:00:00:00:00:00) is community <community name> unavailable when the community access type is TRAP.
  • Page 215 Message List Message Problem and solutions cipher suite mismatch The uni-cast / multi-cast suite (TKIP/AES/WEP) of the access point is different from the suite used by the supplicant. client EAP method rejected The authentication mode of the access point is different with the authentication mode of the supplicant.
  • Page 216 4. Monitoring and Configuring the Machine Message Problem and solutions Current IPX address <IPX address> The current IP address is <IPX address>. dpsd is disabled. Communication via PictBridge is unavailable because PictBridge is disabled in the security mode. Enable PictBridge in the security mode. DHCP lease time expired.
  • Page 217 Message List Message Problem and solutions IEEE 802.11 current channel <channel number> Displays the current channel number of the active wireless card (in ad hoc and infrastructure mode). IEEE 802.11 MAC Address = <MAC address> Displays the MAC address of the wireless interface.
  • Page 218 4. Monitoring and Configuring the Machine Message Problem and solutions <Interface name> card removed The interface managed by the supplicant has been removed. <Interface name> interface down The interface managed by the supplicant is disabled, or cannot connect to the access point. <Interface name>...
  • Page 219 Message List Message Problem and solutions MIC failure TKIP counter measures started The supplicant using TKIP has detected two instances of tampering within 60 seconds and has started counter measures. MIC failure TKIP counter measures stopped Counter measures have stopped after 60 seconds (since the supplicant using TKIP started counter measures against tampering).
  • Page 220 4. Monitoring and Configuring the Machine Message Problem and solutions Open log file <file name> The specified log file was opened when the print server was online. permission denied. When canceling a job, it was determined after checking the user name and host address that the user's privileges were insufficient.
  • Page 221 Message List Message Problem and solutions session_IPv4 <community name> not defined. The requested community name is not defined. session_IPv6 <community name> not defined. The requested community name is not defined. session_IPX <community name> not defined. The requested community name is not defined. Set context to <NDS context name>...
  • Page 222 4. Monitoring and Configuring the Machine Message Problem and solutions SMTPC: failed to get smtp server ip-address. The SMTP server IP address could not be obtained. This could be because: • The specified DNS server could not be found. • No connection to the network has been established.
  • Page 223 Message List Message Problem and solutions Started. The bonjour (rendezvous) function has started. stopped The supplicant has just stopped. success key received The supplicant received the EAP-Success key. success but invalid key The supplicant received a message reporting that EAP authentication was successful, but the EAPOL key was invalid.
  • Page 224 4. Monitoring and Configuring the Machine Message Problem and solutions waiting for keys The supplicant is waiting for the session key. WINS name registration: No response to server There was no response from the WINS server. (WINS server address) Check that the correct WINS server address is entered.
  • Page 225: Registering Addresses And Users For Facsimile/Scanner Functions

    5. Registering Addresses and Users for Facsimile/Scanner Functions This chapter describes how to register destinations and users in the Address Book. For details on how to access System Settings, see "Accessing User Tools". Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily.
  • Page 226 5. Registering Addresses and Users for Facsimile/Scanner Functions Protection You can set protection codes to stop sender's name from being used or folders from being accessed without authorization. Fax Dest. You can register fax numbers and fax header, and select label insertion. When using IP-Fax, you can register the IP-Fax destination and select the protocol.
  • Page 227 Address Book Folder You can register the protocol, path name and server name. • SMB • FTP • NCP Add to Group You can put registered e-mail and folder destinations into a group for easier management.
  • Page 228: Managing Names In The Address Book

    5. Registering Addresses and Users for Facsimile/Scanner Functions • You can also use Web Image Monitor to register names in the Address Book. • For details about using Web Image Monitor, see Web Image Monitor Help. • Using Web Image Monitor, you can backup Address Book data. We recommend backing up data when using the Address Book.
  • Page 229: Sending E-Mail By Quick Dial

    Address Book Sending E-mail by Quick Dial By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting them from the fax initial display when sending a document by Internet fax or e-mail. You can also specify an e-mail address by selecting the destination shown on the initial scanner display when sending a document using the scanner function.
  • Page 230 5. Registering Addresses and Users for Facsimile/Scanner Functions • Facsimile • Printer • Scanner • p.234 "Authentication Information"...
  • Page 231: Registering Names

    Registering Names Registering Names Register user information including their names. The user name is useful for selecting a destination when sending faxes or e-mail. You can also use it as a folder destination. You can register up to 2000 names. Registering Names This section describes how to register names.
  • Page 232: Changing A Registered Name

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title.
  • Page 233: Deleting A Registered Name

    Registering Names Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the registered name you want to change. Press the name key, or enter the registered number using the number keys. To change the name or key display, press [Change] under "Name" or "Key Display". Enter the name or key display, and then press [OK].
  • Page 234 5. Registering Addresses and Users for Facsimile/Scanner Functions Select the name you want to delete. Press the name key, or enter the registered number using the number keys. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 235: Carrying Over Registered Data For Use By Address Book Auto Register

    Carrying Over Registered Data for Use by Address Book Auto Register Carrying Over Registered Data for Use by Address Book Auto Register By using Data Carry-over Settings for Address Book Auto Program, you can carry over user authentication information that has already been registered to the Address Book of the Windows authentication, LDAP authentication, or integration server authentication.
  • Page 236: Authentication Information

    5. Registering Addresses and Users for Facsimile/Scanner Functions Authentication Information Following describes the procedure for authenticating a user code. • The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code become invalid. Register user codes to limit users to the following functions and check their use of each function: •...
  • Page 237 Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Press the name whose code is to be registered, or enter the registered number using the number key. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 238: Changing A User Code

    5. Registering Addresses and Users for Facsimile/Scanner Functions Select the functions to be used with the user code from "Available Functions". Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • You can enter a one-to eight-digit user code. • To register the name, see "Registering Names". •...
  • Page 239: Deleting A User Code

    Authentication Information Check that [Program / Change] is selected. Select the user whose user code you want to change. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP-Fax destination. Press [Auth.
  • Page 240 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Press [Program / Change]. Select the name whose code is to be deleted. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 241: Displaying The Counter For Each User

    Authentication Information Displaying the Counter for Each User This section describes how to display the counter for each user. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the function usage you want to print from [Print], [Transmission], or [Scanner]. Counters for individual function usage under each user code appear.
  • Page 242: Printing The Counter For All Users

    5. Registering Addresses and Users for Facsimile/Scanner Functions Select a user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page. Press [Print Counter List] under "Per User". Select the function usage you want to print from [Copier], [Printer], [Fax Prints], [Fax Transmission], [Scanner], and [Total Prints].
  • Page 243: Clearing The Number Of Prints For Each User

    Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Press [Print Counter List] under "All Users". Select the function usage you want to print from [Copier], [Printer], [Fax Prints], [Fax Transmission], [Scanner], and [Total Prints]. Press [Print].
  • Page 244: Clearing The Number Of Prints For All Users

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page. Press [Clear] under "Per User".
  • Page 245 Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Press [Clear] under "All Users". Select the function usage you want to clear from [Copier], [Printer], [Fax Prints], [Fax Transmission], [Scanner], and [All Counters]. Press [OK].
  • Page 246: Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Fax Destination This section describes the procedure for registering, changing, and deleting Fax Destinations. Register a fax destination so you do not need to enter fax numbers each time, and can send documents that have been scanned in using the facsimile function.
  • Page 247 Fax Destination The default is "1st Name". Label insertion Use label insertion to print information such as the destination name on the sheet printed out at the destination. Data is printed as follows: • Destination Name The destination name specified in [Fax Destination] is printed with "To" before it at the top of the sheet.
  • Page 248: Registering A Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering a Fax Destination This section describes how to register a fax destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose fax destination you want to register.
  • Page 249: Changing A Fax Destination

    Fax Destination • To register the name, see "Registering Names". • When a group is registered, you can also add this fax destination to the group. For details about registering groups, see "Registering Names to a Group". • p.229 "Registering Names" •...
  • Page 250 5. Registering Addresses and Users for Facsimile/Scanner Functions • To change the name, key display and title, see "Registering Names". • p.229 "Registering Names" To change the fax number This section describes how to change the fax number. Press [Change] under "Fax Destination". Enter the new fax number using the number keys, and then press [OK].
  • Page 251: Deleting A Fax Destination

    Fax Destination Select [Off] or [On], and then press [OK]. To select the fax header This section describes how to select the fax header. You can register a fax header in Program Fax Information in Facsimile Features. Press [Change] under "Fax Header". Select [1st Name] or [2nd Name], and then press [OK].
  • Page 252 5. Registering Addresses and Users for Facsimile/Scanner Functions Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose fax destination you want to delete. Press the name key, or enter the registered number using the number keys.
  • Page 253: Registering An Ip-Fax Destination

    Fax Destination • p.229 "Registering Names" Registering an IP-Fax Destination This section describes how to register an IP-Fax Destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose IP-Fax destination you want to register.
  • Page 254: Changing A Registered Ip-Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To register the name, see "Registering Names". • p.229 "Registering Names" Changing a Registered IP-Fax Destination This section describes how to change an IP-Fax Destination. Press the [User Tools/Counter] key.
  • Page 255 Fax Destination Press [Change] under "Fax Destination". Enter the new destination, and then press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To change the name, key display and title, see "Registering Names". • p.229 "Registering Names" To change the IP-Fax Destination This section describes how to change a registered IP-Fax destination.
  • Page 256 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Change] under "TX SUB Code". Enter the SUB Code using the number keys, and then press [OK]. To enter a password, press [Change] under "Password (SID)". Enter a password using the number keys, and then press [OK]. Press [OK].
  • Page 257: Deleting A Registered Ip-Fax Destination

    Fax Destination Press [Change] under "Line 2". Select the new standard message or press [Manual Entry] to enter the new message. If you selected “Manual Entry” in step 4, enter the new message, and then press [OK]. Press [OK]. Press [Change] under "Line 3". Select the new standard message, and then press [OK].
  • Page 258 5. Registering Addresses and Users for Facsimile/Scanner Functions You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination. Press [Fax Dest.]. Press [Change] under "Fax Destination". Press [Delete All], and then press [OK]. Press [OK].
  • Page 259: E-Mail Destination

    E-mail Destination E-mail Destination This section describes the procedure for registering, changing, and deleting E-mail Destination. Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan files from scanner or fax function by e-mail. •...
  • Page 260 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [E-mail]. Press [Change]. Enter the e-mail address. Press [OK]. Select [E-mail / Internet Fax Destination] or [Internet Fax Destination Only]. If [E-mail / Internet Fax Destination] is specified, registered e-mail addresses appear in both the internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 261: Changing An E-Mail Destination

    E-mail Destination • p.229 "Registering Names" Changing an E-mail Destination This section describes how to change an e-mail destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to change.
  • Page 262: Deleting An E-Mail Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To change the name, key display and title, see "Registering Names". • p.229 "Registering Names" Deleting an E-mail Destination This section describes how to delete an e-mail destination. Press the [User Tools/Counter] key.
  • Page 263 E-mail Destination • To delete the name, key display and title, see "Registering Names". • p.229 "Registering Names"...
  • Page 264: Registering Folders

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering Folders This section describes the procedure for registering, changing, and deleting folders. By registering a shared folder, you can send scan files or received fax documents to it directly. There are three types of protocol you can use: •...
  • Page 265 Registering Folders Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. Press the name key, or enter the registered number using the number keys. Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth.
  • Page 266 5. Registering Addresses and Users for Facsimile/Scanner Functions For details about how to specify the path using Browse Network, see "Locating the SMB folder using Browse Network". Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [OK].
  • Page 267 Registering Folders If the network does not allow automatic obtaining of IP addresses, include the destination computer’s IP address in the path. For example: if the IP address of the destination computer is "192.168.0.191", and the folder name is "Share", the path will be \\192.168.0.191\Share. Press [OK].
  • Page 268: Changing An Smb Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions If you have not specified folder authentication, or if an incorrect user name or password has been entered for folder authentication, the login screen appears. Enter the login user name, and then press [OK]. Enter the login user name specified for folder authentication.
  • Page 269: Deleting An Smb Registered Folder

    Registering Folders Press [Exit]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To change the name, key display and title, see "Registering Names". • p.229 "Registering Names" • p.264 "Locating the SMB folder manually" • p.265 "Locating the SMB folder using Browse Network" Changing the protocol This section describes how to change the protocol.
  • Page 270: Registering An Ftp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 271 Registering Folders Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 272 5. Registering Addresses and Users for Facsimile/Scanner Functions Enter the port number using the number keys, and then press the [ ] key. You can enter 1 to 65535. Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again.
  • Page 273: Changing An Ftp Folder

    Registering Folders • p.229 "Registering Names" Changing an FTP Folder This section describes how to change the registered FTP folder. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to change.
  • Page 274: Deleting An Ftp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Changing the protocol This section describes how to change the protocol. Press [SMB] or [NCP]. A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. Enter each item again.
  • Page 275: Registering An Ncp Folder

    Registering Folders Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 276 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 277 Registering Folders Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth. Info] on the right side of "Folder Authentication". When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified in "Default User Name / Password (Send)"...
  • Page 278 5. Registering Addresses and Users for Facsimile/Scanner Functions Locating the NCP folder manually This section describes how to locate the NCP folder manually. Press [Change] under "Path". Enter the path where the folder is located. Press [OK]. Press [Connection Test] to check the path is set correctly. Press [Exit].
  • Page 279: Changing An Ncp Registered Folder

    Registering Folders Changing an NCP Registered Folder This section describes how to change the registered NCP folder. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the user of the registered folder you want to change. Press the name key, or enter the registered number using the number keys.
  • Page 280: Deleting An Ncp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions • p.229 "Registering Names" Changing the protocol This section describes how to change the protocol. Press [SMB] or [FTP]. A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. Enter each item again.
  • Page 281 Registering Folders Select a user of the folder you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 282: Registering Names To A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management of e-mail addresses and folders for each group.
  • Page 283: Registering Names To A Group

    Registering Names to a Group Press [Change] under "Group Name". Enter the group name, and then press [OK]. The Key Display name is set automatically. Press the title key under "Select Title", if necessary. The keys you can select are as follows: •...
  • Page 284 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name to register in a group. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP- Fax destination.
  • Page 285: Adding A Group To Another Group

    Registering Names to a Group Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Adding a Group to Another Group This section describes how to add a group to another group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group].
  • Page 286: Displaying Names Registered In A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Displaying Names Registered in a Group This section describes how to display names registered in a group. You can check the names or groups registered in each group. Press the [User Tools/Counter] key.
  • Page 287: Removing A Name From A Group

    Registering Names to a Group Press [Exit]. Press the [User Tools/Counter] key. Removing a Name from a Group This section describes how to remove a name from a group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management].
  • Page 288: Deleting A Group Within Another Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Deleting a Group Within Another Group This section describes how to delete a group within another group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools].
  • Page 289: Changing A Group Name

    Registering Names to a Group Select the group that you want to delete from. The group key is deselected and the group is deleted from it. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Changing a Group Name This section describes how to change a group name. Press the [User Tools/Counter] key.
  • Page 290: Deleting A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to change. You can search by the registered name. To change the group name and key display, press [Change] under "Group Name"...
  • Page 291 Registering Names to a Group Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Press [Delete]. Press a group key you want to delete. You can search by the registered name. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 292: Registering A Protection Code

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering a Protection Code This section describes how to register a Protection Code. You can stop sender's names or folders being accessed by setting a protection code. You can use this function to protect the following: •...
  • Page 293: Registering A Protection Code To A Group User

    Registering a Protection Code Press [Protection]. Press [Destination] or [Sender] under "Use Name as". Both [Destination] and [Sender] can be selected at the same time. Press [Folder Destination] or [Sender] under "Protection Object". Press [Change] under "Protection Code". Enter a protection code using the number keys, and then press the [ ] key. Press [OK].
  • Page 294 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to register or enter the registered number using the number keys.
  • Page 295: Registering Smtp And Ldap Authentication

    Registering SMTP and LDAP Authentication Registering SMTP and LDAP Authentication This section describes how to register SMTP and LDAP Authentication. SMTP Authentication This section describes how to register SMTP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an SMTP server.
  • Page 296: Ldap Authentication

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Change] under "Login User Name". Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [OK].
  • Page 297 Registering SMTP and LDAP Authentication • When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you have specified in Program / Change / Delete LDAP Server of Administrator Tools settings applies. For details, see "Programming the LDAP server". Press the [User Tools/Counter] key.
  • Page 298 5. Registering Addresses and Users for Facsimile/Scanner Functions Enter the password again to confirm, and then press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To register the name, see "Registering Names". • You can enter up to 128 characters for the user name. •...
  • Page 299: Printing Files Directly From Windows

    6. Special Operations under Windows This chapter describes how to print files directly from Windows. Printing Files Directly from Windows You can print files directly using Windows commands (lpr, ftp, or sftp). For example, you can print ® ® PostScript files for PostScript Setup Follow the procedure below to make network environment settings.
  • Page 300: Printing Commands

    6. Special Operations under Windows In other cases Add the IP address and host name of the network printer to the hosts file on the computer used for printing. Methods of addition vary depending on operating systems. Open the hosts file using memo pad files, for instance. The hosts file can be found in the following folder: \WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS Add an IPv4 or IPv6 address and host name to the hosts file using the following format:...
  • Page 301 Printing Files Directly from Windows • The "option" specified in a command is an intrinsic printer option and its syntax is similar to printing from UNIX. For details, see UNIX Supplement. When specifying a printer by IP address c:> lpr -Sprinter's IP address [-Poption] [-ol] \path\file name When using a host name instead of an IP address c:>...
  • Page 302 6. Special Operations under Windows Password: When user authentication is set, enter a login user name and password. When printing a binary file, set the file mode to binary. ftp> bin When printing a binary file in ASCII mode, print may not come out correctly. Specify files to be printed.
  • Page 303: When Using Windows Terminal Service/Citrix Presentation Server/Citrix Xenapp

    7. Appendix When Using Windows Terminal Service/Citrix Presentation Server/Citrix XenApp The following explains how to use Windows Terminal Service and Maintenance. Operating Environment The following operating systems and Citrix Presentation Server/Citrix XenApp versions are supported. Citrix Presentation Server 4.5/Citrix XenApp 5.0 •...
  • Page 304 7. Appendix Citrix Presentation Server/Citrix XenApp [Printer driver replication] Using [Printer driver replication] can distribute printer drivers across all servers in a server farm. We strongly recommend testing this function in your network environment before using it for your work. •...
  • Page 305: Using Dhcp

    Using DHCP Using DHCP You can use the printer in a DHCP environment. You can also register the printer NetBIOS name on a WINS server when it is running. • Printers that register the printer NetBIOS name on a WINS server must be configured for the WINS server.
  • Page 306: Configuring The Wins Server

    7. Appendix Configuring the WINS Server This section explains configuring the WINS server. The printer can be configured to register its NetBIOS name with a WINS server when the power is turned on. This enables the NetBIOS name of the printer to be specified from SmartDeviceMonitor for Admin even in a DHCP environment.
  • Page 307: Using Telnet

    Configuring the WINS Server Using telnet You can also use telnet to configure WINS. Use the "wins" command to make the setting with telnet. • p.153 "Remote Maintenance Using telnet"...
  • Page 308: Using The Dynamic Dns Function

    7. Appendix Using the Dynamic DNS Function Dynamic DNS is a function which dynamically updates (registers and deletes) records (A record, AAAA record, CNAME, and PTR record) managed by the DNS server. When a DNS server is part of the network environment to which this machine, a DNS client, is connected, records can be dynamically updated using this function.
  • Page 309: Dns Servers Targeted For Operation

    Using the Dynamic DNS Function • When the dynamic DNS function is not used, records managed by the DNS server must be updated manually, if the machine's IP address is changed. • To update the record using the machine, the DNS server has to have one of the following: •...
  • Page 310: Setting The Dynamic Dns Function

    7. Appendix Setting the Dynamic DNS Function Make settings with telnet using the "dns" command. • For details, see "Remote Maintenance Using telnet". • p.153 "Remote Maintenance Using telnet"...
  • Page 311: Precautions

    Precautions Precautions Please pay attention to the following when using the network interface board. When configuration is necessary, follow the appropriate procedures below. Connecting a Dial-Up Router to a Network When using NetWare (file server) If the NetWare file server and printer are on opposite sides of a router, packets are sent back and forth continuously, possibly incurring communications charges.
  • Page 312: Netware Printing

    7. Appendix If the machine is connected to a network, observe the following points when setting up the machine or changing settings: For more details, see the operating instructions and Help for the ScanRouter delivery software and DeskTopBinder. When a dial-up router is connected in a network environment The settings for the delivery server to be connected must be made appropriately for the machine with the ScanRouter delivery software, Auto Document Link, or DeskTopBinder.
  • Page 313: Banner Page

    Precautions Banner page You should not configure a banner page on NetWare. If you want to change the banner page setting, always configure it using Windows. • Under Windows XP and Windows Server 2003/2003 R2, clear the [Enable banner] check box on the [NetWare Settings] tab in the printer properties dialog box.
  • Page 314: When The Wireless Lan Board Is Installed

    7. Appendix When the Wireless LAN Board Is Installed Please pay attention to the following when using the IEEE 802.11 interface on the network. When using the wireless LAN interface on the network, note the following: When moving the machine Detach the antennas when relocating the machine locally.
  • Page 315: Configuring Ieee 802.1X

    Configuring IEEE 802.1X Configuring IEEE 802.1X IEEE 802.1X can be configured using Web Image Monitor's administrator mode. You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures. Types and requirements of certificates are as follows: EAP Types Requiring a "Site Certificate"...
  • Page 316: Setting Items Of Ieee 802.1X For Ethernet

    7. Appendix Enter appropriate "Common Name" and "Country Code" on "Certificate Information" page, and then click [OK]. "Updating..." appears. Wait for about 2 minutes, and then click [OK]. Click [Details], shown in the "Device Certificate" window as the memo pad icon for "Requesting".
  • Page 317 Configuring IEEE 802.1X In "User Name", enter the user name set in the RADIUS server. Enter the domain name in "Domain Name". Select "EAP Type". Configurations differ according to the EAP Type. EAP-TLS • Make the following settings according to the operating system you are using: •...
  • Page 318: Setting Items Of Ieee 802.1X For Wireless Lan

    7. Appendix Click [OK]. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. In the menu area, click [Configuration]. Under "Interface", click [Interface Settings]. Select [Active] in "Ethernet Security". Click [OK]. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. Click [Logout].
  • Page 319 Configuring IEEE 802.1X • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 320 7. Appendix "Updating..." appears. Wait for about one or two minutes, and then click [OK]. Click [Logout]. Quit the Web Image Monitor. • If there is a problem with settings, you might not be able to communicate with the printer. To identify the problem, print a network summary.
  • Page 321: Specifications

    Specifications Specifications Interface 1000BASE-T, 100BASE-TX, 10BASE-T, IEEE 802.11 a/b/g Frame type Ethernet II, IEEE 802.2, IEEE 802.3, SNAP Printer (LAN-Fax) TCP/IP (IPv4/IPv6) DIPRINT IPP-SSL IPX/SPX (NetWare) WSD (Printer) Internet Fax TCP/IP (IPv4/IPv6) SMTP SMTP-C POP3 IMAP4 Network Scanner IPv4 FTP-C SMTP...
  • Page 322 7. Appendix SMTP-C POP3 WSD (Scanner) Document Server TCP/IP (IPv4/IPv6) FTP-C HTTP HTTPS Management Function TCP/IP (IPv4/IPv6) FTP-C SNMP SNMP-C HTTP HTTPS TELNET DHCP DNS-C LDAP...
  • Page 323 Specifications To use IPP and SMB, use the SmartDeviceMonitor for Client port. To use IPP under Windows XP/Vista/7, Windows Server 2003/2003 R2/ 2008/2008 R2, use the Standard IPP port. Under Windows Vista/7, or Windows Server 2008/2008 R2, WSD (Printer), WSD (Scanner), uses the WSD Port.
  • Page 324: Copyrights

    7. Appendix Copyrights Boost Boost Software License - Version 1.0 - August 17th, 2003 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS...
  • Page 325: Heimdal

    Copyrights Heimdal Copyright (c) 1997-2005 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, Sweden). All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 326: Jpeg Library

    7. Appendix print language emulations Copyright (c) 1987-2006 Zoran Corporation. All rights reserved. JPEG LIBRARY • The software installed on this product is based in part on the work of the Independent JPEG Group. libusb libusb is covered by the LGPL: This library is free software;...
  • Page 327: Nana

    Copyrights COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Copyright (c) 1990-2, RSA Data Security, Inc.
  • Page 328: Net-Snmp

    7. Appendix 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"...
  • Page 329 Copyrights Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 330 7. Appendix ---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) ----- Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Use is subject to license terms below. This distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc.
  • Page 331 Copyrights WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 332: Netbsd

    7. Appendix * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * The name of Fabasoft R&D Software GmbH &...
  • Page 333 Copyrights 4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 334 7. Appendix • This product includes software developed by Hellmuth Michaelis and Joerg Wunsch. • This product includes software developed by Internet Research Institute, Inc. • This product includes software developed by Leo Weppelman and Waldi Ravens. • This product includes software developed by Mika Kortelainen. •...
  • Page 335 Copyrights • This product includes software developed by Charles M. Hannum, by the University of Vermont and State Agricultural College and Garrett A.Wollman, by William F. Jolitz, and by the University of California,Berkeley, Lawrence Berkeley Laboratory, and its contributors. • This product includes software developed by Charles M. Hannum. •...
  • Page 336 7. Appendix • This product includes software developed by Ezra Story. • This product includes software developed by Frank van der Linden for the NetBSD Project. • This product includes software developed by Gardner Buchanan. • This product includes software developed by Gary Thomas. •...
  • Page 337 Copyrights • This product includes software developed by Kazuhisa Shimizu. • This product includes software developed by Kazuki Sakamoto. • This product includes software developed by Kenneth Stailey. • This product includes software developed by Kiyoshi Ikehara. • This product includes software developed by Klaus Burkert,by Bernd Ernesti, by Michael van Elst, and by the University of California, Berkeley and its contributors.
  • Page 338 7. Appendix • This product includes software developed by Michael Smith. • This product includes software developed by Mike Glover and contributors. • This product includes software developed by Mike Pritchard. • This product includes software developed by Minoura Makoto. •...
  • Page 339 Copyrights • This product includes software developed by Takumi Nakamura. • This product includes software developed by Tatoku Ogaito for the NetBSD Project. • This product includes software developed by Terrence R. Lambert. • This product includes software developed by Tetsuya Isaki. •...
  • Page 340 7. Appendix • This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/) • This product includes software developed by the PocketBSD project and its contributors. • This product includes software developed by the RiscBSD kernel team •...
  • Page 341: Open Ldap

    Copyrights • This product includes software developed for the NetBSD Project by Genetec Corporation. • This product includes software developed for the NetBSD Project by Jonathan Stone. • This product includes software developed for the NetBSD Project by Piermont Information Systems Inc.
  • Page 342: Open Ssh

    7. Appendix 2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and 3. Redistributions must contain a verbatim copy of this document. The OpenLDAP Foundation may revise this license from time to time.
  • Page 343 Copyrights [However, none of that term is relevant at this point in time. All of these restrictively licenced software components which he talks about have been removed from OpenSSH, i.e., - RSA is no longer included, found in the OpenSSL library - IDEA is no longer included, its use is deprecated - DES is now external, in the OpenSSL library - GMP is no longer used, and instead we call BN code from OpenSSL...
  • Page 344 7. Appendix The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a BSD-style license. Cryptographic attack detector for ssh - source code Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that this copyright notice is retained.
  • Page 345 Copyrights Markus Friedl Theo de Raadt Niels Provos Dug Song Kevin Steves Daniel Kouril Wesley Griffin Per Allansson Jason Downs Solar Designer Todd C. Miller Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 346: Open Ssl

    7. Appendix Eric P. Allman The Regents of the University of California Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 347 Copyrights 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"...
  • Page 348: Racoon

    7. Appendix 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 349: Samba

    Copyrights Sablotron (Version 0.82) Copyright (c) 2000 Ginger Alliance Ltd. All Rights Reserved. a) The application software installed on this product includes the Sablotron software Version 0.82 (hereinafter, "Sablotron 0.82"), with modifications made by the product manufacturer. The original code of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of the Sablotron 0.82 has been derived from such original code provided by Ginger Alliance Ltd.
  • Page 350 7. Appendix The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it.
  • Page 351 Copyrights copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
  • Page 352 7. Appendix of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
  • Page 353 Copyrights It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
  • Page 354 7. Appendix FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS ), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
  • Page 355: Sasl

    Copyrights SASL Copyright (c) 2001 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 356: The M17N Library

    7. Appendix The m17n library http://www.m17n.org/index.html The m17n library 1.2.0 release Copyright (C) 2003, 2004 National Institute of Advanced Industrial Science and Technology (AIST) Registration Number H15PRO112 The m17n library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation;...
  • Page 357: Trousers

    Copyrights NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. TrouSerS THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
  • Page 358 7. Appendix c) Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no assurances are provided by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity. Each Contributor disclaims any liability to Recipient for claims brought by any other entity based on infringement of intellectual property rights or otherwise.
  • Page 359 Copyrights brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement.
  • Page 360: Wpa Supplicant

    • To obtain the source code for opening TrouSerS (Version 0.27), which is provided with this machine, access the Web site at the following URL: http://www.ricoh.com/support/trousers/ index.html • TrouSerS version control is by SourceForge CVS. For methods of obtaining the source code, access the Web site at the following URL: http://sourceforge.net/cvs/?group_id=126012...
  • Page 361: Zilb

    Copyrights 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and /or other materials provided with the distribution. 3. Neither the name (s) of the above-listed copyright holder (s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 362: Trademarks

    7. Appendix Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Bonjour, Macintosh, Mac OS, and Safari are trademarks of Apple Inc, registered in the U.S. and other countries.
  • Page 363 Trademarks • The product names of Windows Vista are as follows: ® ® Microsoft Windows Vista Ultimate ® ® Microsoft Windows Vista Business ® ® Microsoft Windows Vista Home Premium ® ® Microsoft Windows Vista Home Basic ® ® Microsoft Windows Vista Enterprise •...
  • Page 364 7. Appendix...
  • Page 365: Index

    INDEX Changing an NCP Registered Folder....Changing an SMB folder........Account for e-mail notification......Citrix XenApp............Ad-hoc Channel............ Clearing the number of prints for all users..Adding a group to another group..... Clearing the number of prints for each user..Address book............
  • Page 366 Document server Ethernet................Host name............wireless LAN..............Host Name............. Domain Name............Dynamic DNS............IEEE 802.11 a/b/g interface checking the signal............E-mail connecting................ethernet................setup procedure..............wireless LAN..............IEEE 802.11 interface........E-mail Communication Port........IEEE 802.1X............E-mail destination..........device certificate............. E-mail Reception Interval........Ethernet................
  • Page 367 List of Options............NetWare 6.5........121, 122, 127 Locating the NCP folder manually..... Network..............Locating the NCP folder using browse network..Network delivery scanner ................Ethernet................Locating the SMB folder manually....wireless LAN..............Locating the SMB folder using Browse Network..Network interface board configuration....
  • Page 368 Print job information Program / Change Administrator......ftp..................Program/Change/Delete User Text....info................... Pure IP environment rcp..................NetWare 5..............rsh..................NetWare 5.1..............sftp..................NetWare 6..............Print List..............NetWare 6.5..............Print log information ftp..................rcp..........prnlog................196, 201, 204, 211 rcp..................Realm..............rsh..................
  • Page 369 Ethernet................bonjour................wireless LAN..............devicename..............dhcp................. Scanner Auto Reset Timer........dhcp6................Scanner Resend Interval Time......diprint................Screen Colour Setting........... dns..................Security Method............ domainname..............Select Protocol............. etherauth................Sending e-mail by quick dial......etherconfig............... Sending fax by quick dial........help.................. Sending scanned files to a shared folder directly... hostname.................
  • Page 370 Trademarks............checking the signal............Transfer Log Setting..........connecting................setup procedure..............Tray paper settings..........Wireless LAN Signal..........Tray Paper Size WSD scanner Tray 1.................. Ethernet................Tray 2-4................wireless LAN..............USB Host Interface connecting................USB interface connecting................User Authentication Management....... User tools............... change the settings............
  • Page 371 © 2011...
  • Page 372 M052-7011...

This manual is also suitable for:

Sp 5210sr

Table of Contents