Ricoh MP C6502 series Operation Manual

Ricoh MP C6502 series Operation Manual

Mp c6502/c8002 series
Hide thumbs Also See for MP C6502 series:
Table of Contents

Advertisement

Quick Links

Read This First
Manuals Provided with This Machine
Safety Information for This Machine
Other Information for This Machine
Appendix
For information not in this manual, refer to
the HTML/PDF files on the supplied
CD-ROM.
Read this manual carefully before you use this machine and keep
it handy for future reference. For safe and correct use, be sure to
read the Safety Information in this manual before using the
machine.

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh MP C6502 series

  • Page 1 Read This First Manuals Provided with This Machine Safety Information for This Machine Other Information for This Machine Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS How to Read the Manuals..........................3 Symbols Used in the Manuals........................3 Disclaimer................................3 Notes................................4 Machine Types............................... 4 1. Manuals Provided with This Machine Manuals for This Machine..........................5 Manuals List..............................7 On-screen Operating Instructions........................9 Formats of the Operating Instructions......................9 Reading the HTML Manuals on the CD-ROM.....................9 Installing and Opening the HTML Manuals....................
  • Page 4 Trademarks............................... 35...
  • Page 5: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 6: Notes

    Notes The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products. For good output quality, the manufacturer recommends that you use genuine toner from the manufacturer.
  • Page 7: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 8 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Explains Facsimile functions and operations. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 9: Manuals List

    Manuals for This Machine • You can download information about the machine's certification, which is based on an IT security certification system (hereafter CC Certification), from http://support-download.com/services/ device/ccmanual/mp_c6502_c8002/en/download_admin.html and http://support- download.com/services/device/ccmanual/mp_c6502_c8002/en/download_user.html. This information is about how to set up the machine. If you have purchased a CC Certified machine, be sure to read it before operating the machine so you can make the correct settings before using it.
  • Page 10 1. Manuals Provided with This Machine Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided PostScript 3 Extended Feature Settings Security Guide Driver Installation Guide • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian.
  • Page 11: On-Screen Operating Instructions

    On-screen Operating Instructions On-screen Operating Instructions This chapter describes the on-screen operating instructions of this machine. The on-screen operating instructions are included in the supplied manual CD-ROM. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 12: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 13 On-screen Operating Instructions Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. • To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your computer.
  • Page 14 1. Manuals Provided with This Machine...
  • Page 15: Safety Information For This Machine

    2. Safety Information for This Machine This chapter describes the safety precautions. Safety Information Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury.
  • Page 16 2. Safety Information for This Machine • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. • Do not place heavy objects on the machine. Doing so can cause the machine to topple over, possibly resulting in injury.
  • Page 17 Safety Information • Do not use power cords that are damaged, broken, or modified. Also, do not use power cords that have been trapped under heavy objects, pulled hard, or bent severely. Doing so could result in fire or electric shock. •...
  • Page 18 2. Safety Information for This Machine • Be sure to disconnect the power cord from the wall outlet at least once a year and check for the following: • The power cord's inner wires are exposed, broken, etc. • The power cord's coating has a crack or dent. •...
  • Page 19 Safety Information • Be sure to locate the machine as close as possible to a wall outlet. This will allow easy disconnection of the power cord in the event of an emergency. • If the machine emits smoke or odours, or if it behaves unusually, you must turn off its power immediately.
  • Page 20 2. Safety Information for This Machine • Contact your service representative if you need to lift the machine (such as when relocating it to another floor). Do not attempt to lift the machine without the assistance of your service representative. The machine will be damaged if it topples or is dropped, resulting in malfunction and risk of injury to users.
  • Page 21 Safety Information • When removing jammed paper, make sure not to trap or injure your fingers. • When loading paper, take care not to trap or injure your fingers. • Keep your hands clear of the booklet finisher tray when removing misfed paper, pulling out or pushing in the finisher's staple unit.
  • Page 22 2. Safety Information for This Machine • The following explains the warning messages on the plastic bag used in this product's packaging. • Keep the polythene materials (bags, etc.) supplied with this machine away from babies and small children at all times. Suffocation can result if polythene materials are brought into contact with the mouth or nose.
  • Page 23 Safety Information • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your skin. If toner comes into contact with your skin, wash the affected area thoroughly with soap and water. • Do not attempt to print on stapled sheets, aluminum foil, carbon paper, or any kind of conductive paper.
  • Page 24: Safety Labels Of This Machine

    2. Safety Information for This Machine Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated.
  • Page 25 Safety Labels of This Machine Keep your hands clear of the parts a label indicates. Otherwise, you might trap your fingers and an injury might occur. This label indicates the weight of the unit. However, this label is meant for customer engineers and operators who have received training.
  • Page 26 2. Safety Information for This Machine Paper trays CUZ107 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 27 Safety Labels of This Machine Finisher SR4090 or Booklet Finisher SR4100 CUZ103 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam.
  • Page 28: Power Switch Symbols

    2. Safety Information for This Machine Multi-Folding Unit CUZ204 Do not touch the parts a label indicates. The inside of the Multi-Folding Unit could be very hot. Caution should be taken when removing misfed paper. Do not touch the parts a label indicates. The inside of the Multi-Folding Unit could be very hot. Caution should be taken when removing misfed paper.
  • Page 29: Other Information For This Machine

    3. Other Information for This Machine This chapter describes laws and regulations related to this machine. Laws and Regulations Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 30 7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is...
  • Page 31: Important Safety Instructions For Facsimile Unit

    Laws and Regulations causing problems with your telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. 8. In the event of operation problems (document jam, copy jam, communication error indication), see the manual provided with this machine for instruction on resolving the problem. 9.
  • Page 32: Notes To Canadian Users Of Facsimile Unit

    3. Other Information for This Machine Save these instructions. IMPORTANTES MESURES DE SÉCURITÉ de l'unité Fax Certaines mesures de sécurité doivent être prises pendant l'utilisation de material téléphonique afin de réduire les risques d'incendie, de choc électrique et de blessures. En voici quelques-unes: •...
  • Page 33: Other Information

    Other Information Other Information ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ® ENERGY STAR Program. ®...
  • Page 34: Notes To Users In The State Of California (Notes To Users In Usa)

    3. Other Information for This Machine Sleep mode • If this machine remains idle for a specified period or when the [Energy Saver] key is pressed, it enters Sleep mode to further reduce its electrical consumption. • The default delay time the machine waits before entering Sleep mode is 60 minutes. This default time can be changed.
  • Page 35: Appendix

    4. Appendix This appendix describes trademarks and specifications for the machine. Specifications For specifications not described in this manual, see "Specifications", Maintenance and Specifications Warm-up time • Type 1: 50 seconds • Type 2: 45 seconds First copy/print time • Type 1 •...
  • Page 36 4. Appendix Power consumption when using the facsimile function • Immediate Transmission: • Type 1: approx. 200 W • Type 2: approx. 220 W • Memory Transmission: • Type 1: approx. 200 W • Type 2: approx. 220 W • Memory Reception: •...
  • Page 37 Trademarks Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the United States and other countries. Microsoft, Windows, Windows Server, Windows Vista, and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 38 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 39 © 2013...
  • Page 40 D136-7413...
  • Page 41: User Guide

    User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. For safe and correct use, be sure to read the Safety Information in "Read This First"...
  • Page 42 Guide to the Names and Functions of the Machine's Control Panel This illustration shows the control panel of the machine with options fully installed. [Home] key [Interrupt] key Press to display the [Home] screen. For details, Press to make interrupt copies. See "Interrupt see "How to Use the [Home] Screen".
  • Page 43 [Simple Screen] key Data In indicator (facsimile and printer mode) Press to switch to the simple screen. See "Switching Screen Patterns", Getting Started Flashes when the machine is receiving print jobs or LAN-Fax documents from a computer. See Fax [ # ] key (Enter key) and Print Press to confirm values entered or items specified.
  • Page 44 Quick Reference Copy Guide Tips How to select a color mode... (Color Copying) Paper Size A Select a color mode. Paper Size You can check the paper size using the scale on the exposure glass. Auto Image Density Dark texture originals will be copied so that How to save paper...
  • Page 45: Advanced Features

    How to finish your document... Document Server (Basic Copying) (Basic Copying) Why use it... Staple • To store often used documents centrally A Press [Finishing]. and print on demand. B Press [Finisher]. • To reduce network load. C Select one of the stapling positions (Copies will be sorted automatically).
  • Page 46 Quick Reference Fax Guide How to send a fax... How to program a Destination key... (Transmission) (Registering Addresses and Users, Connecting the A Specify a transmission mode: Machine/ System Settings • Memory Transmission, or A Press the {User Tools/Counter} key. •...
  • Page 47: Advanced Fax Features

    How to cancel a transmission... How to send at a specific time (Send Later) (Transmission) (Other Transmission Features) Memory + Immediate Before the original is scanned = before Using this function, you can instruct the pressing the {Start} key: machine to send the fax at a later time via Memory Transmission.
  • Page 48 Quick Reference Scanner Guide G Specify the destination(s). You can specify To use the scanner functions, several multiple destinations. settings must be made beforehand. For details about these settings, For scan to e-mail: see "Accessing User Tools", Connecting Before you select destination(s), make the Machine/ System Settings sure you have selected [To].
  • Page 49 How to save to the machine’s hard How to save to the machine’s hard disk... Registering an E-mail destination... disk... (Storing and Saving the Scanned Documents) (Registering Addresses and Users, Connecting the Machine/ System Settings A Press the {Home} key on the top left of A Press the {User Tools/Counter} key.
  • Page 51 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine Reducing my Costs............................. 9 Converting Documents to Electronic Formats Easily..................10 Registering Destinations...........................11 Operating the Machine More Effectively......................
  • Page 52 Turning On the Main Power........................49 Turning Off the Main Power........................49 When the Authentication Screen Is Displayed....................51 User Code Authentication Using the Control Panel.................. 51 Logging In Using the Control Panel......................51 Logging Out Using the Control Panel......................52 Placing Originals..............................53 Placing Originals on the Exposure Glass....................53 Placing Originals in the Auto Document Feeder..................
  • Page 53 Canceling a Transmission While the Original Is Being Scanned.............83 Canceling a Transmission After the Original Is Scanned................. 84 Storing a Document............................85 Sending Stored Documents.........................86 Printing the Journal Manually..........................88 5. Print Quick Install..............................89 Displaying the Printer Driver Properties......................90 Standard Printing..............................91 When Using the PCL 6 Printer Driver......................91 Printing on Both Sides of Sheets........................
  • Page 54 Basic Procedure for Storing Scan Files......................111 Checking a Stored File Selected from the List..................112 Specifying the File Type..........................113 Specifying Scan Settings..........................114 7. Document Server Storing Data..............................115 Printing Stored Documents..........................117 8. Web Image Monitor Displaying Top Page............................. 119 9.
  • Page 55 When the Machine Makes a Beeping Sound.....................173 When You Have Problems Operating the Machine...................174 When Multiple Functions Cannot Be Executed Simultaneously............179 Messages Displayed When Using the Copy/Document Server Function..........181 When Using the Connect Copy Function....................184 Messages Displayed When Using the Facsimile Function................. 186 When There Is a Problem Specifying the Network Settings..............
  • Page 56: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 57: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CUV210 The following information is region-specific.
  • Page 58: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder • LCIT RT4020 Large Capacity Tray (LCT) • LCIT RT4030 Wide Large Capacity Tray (Wide LCT) • Multi-Folding Unit FD4000 Multi-folding unit...
  • Page 59: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a description by what you want to do. Reducing my Costs BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax)) See "Combined Copying", Copy/ Document Server See "Combine Two Originals", Fax...
  • Page 60: Converting Documents To Electronic Formats Easily

    1. What You Can Do with This Machine Converting Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan Storing scan files in a shared folder See "Basic Procedure When Using Scan to Folder", Scan...
  • Page 61: Registering Destinations

    Registering Destinations Registering Destinations BRL060S Using the control panel to register destinations in the Address Book See "Registering Entered Destinations to the Address Book", Fax See "Registering a destination in the address book manually", Scan Using Web Image Monitor to register destinations from a computer See "Registering Internet Fax Destination Information Using Web Image Monitor", Fax Downloading destinations registered in the machine to the LAN-Fax driver destination list See "Using the machine's Address Book as the LAN-Fax destination list", Fax...
  • Page 62: Operating The Machine More Effectively

    1. What You Can Do with This Machine Operating the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Fax/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions Registering frequently-used printing settings to the printer driver See "Using One Click Presets", Print Changing the initial settings of the printer driver to frequently-used printing settings...
  • Page 63: Customizing The [Home] Screen

    Customizing the [Home] Screen Customizing the [Home] Screen The icons of each function are displayed on the [Home] screen. CUM001 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons. •...
  • Page 64: Making Copies Using Various Functions

    1. What You Can Do with This Machine Making Copies Using Various Functions CJQ601 • You can make copies in full color. You can switch the color copy mode depending on the type of originals used and the desired finish. See "Copying in Color", Copy/ Document Server •...
  • Page 65 Making Copies Using Various Functions • The finisher allows you to sort, staple, and punch holes in your copies. See "Finishing", Copy/ Document Server...
  • Page 66: Printing Data Using Various Functions

    1. What You Can Do with This Machine Printing Data Using Various Functions CJQ614 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 67: Utilizing Stored Document

    Utilizing Stored Document Utilizing Stored Document You can store files scanned in copier, facsimile, printer, or scanner mode on the machine's hard disk. Web Image Monitor allows you to use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 68: Connecting Two Machines For Copying

    1. What You Can Do with This Machine Connecting Two Machines for Copying You can connect two machines together with copy connector. When you set up a copy job on one machine (the main machine), data is transferred to the other (the sub-machine) so that copies can be made on both machines simultaneously (Connect Copy).
  • Page 69: Sending And Receiving Faxes Without Paper

    Sending and Receiving Faxes without Paper Sending and Receiving Faxes without Paper Reception You can store and save received fax documents as electronic formats in the machine's hard disk without printing them. CJQ604 You can use Web Image Monitor to check, print, delete, retrieve, or download documents using your computer (Storing received documents).
  • Page 70 1. What You Can Do with This Machine CJQ605 • To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer, and then specify the destination. • You can also check the sent image data. •...
  • Page 71: Sending And Receiving Faxes Via The Internet

    Sending and Receiving Faxes via the Internet Sending and Receiving Faxes via the Internet xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx@xxx.com xxx@xxx.com xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx CJQ606 E-mail Transmission and Reception This machine converts scanned document images to e-mail format, and transmits and receives the e-mail data over the Internet.
  • Page 72 1. What You Can Do with This Machine • For details about the machine's settings, see "Network Settings Requirements", Connecting the Machine/ System Settings...
  • Page 73: Sending And Receiving Faxes By Using The Machine Without Fax Unit Installed

    Sending and Receiving Faxes by Using the Machine without Fax Unit Installed Sending and Receiving Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). CJQ612 •...
  • Page 74: Using The Facsimile And The Scanner In A Network Environment

    1. What You Can Do with This Machine Using the Facsimile and the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax See "Basic Procedure for Sending Scan Files by E-mail", Scan •...
  • Page 75: Embedding Text Information In Scanned Files

    Embedding Text Information in Scanned Files Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document.
  • Page 76: Preventing Information Leakage (Security Functions)

    1. What You Can Do with This Machine Preventing Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 77: Centrally Controlling Scan Conditions And Distribution

    Centrally Controlling Scan Conditions and Distribution Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data.
  • Page 78: Monitoring And Setting The Machine Using A Computer

    1. What You Can Do with This Machine Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 79: Preventing Unauthorized Copying

    Preventing Unauthorized Copying Preventing Unauthorized Copying You can print embedded patterns on printouts to prevent unauthorized copying. CUM003 • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy.
  • Page 80 1. What You Can Do with This Machine...
  • Page 81: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. Front and left view CUV201 1.
  • Page 82 2. Getting Started 5. Drawer Pull out the drawer when a paper jam occurs. 6. Paper trays (Trays 1–3) Load paper here. Tray 1 is a tandem tray where paper on the left side automatically moves to the right when paper there has run out.
  • Page 83 Guide to Names and Functions of Components Front and right view CUV202 1. ADF's extender Pull this extender to support large paper. 2. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 3.
  • Page 84 2. Getting Started Rear and left view CUV203 1. Vents Prevent overheating.
  • Page 85: Guide To Functions Of The Machine's Options

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options CUV204 1. Copy tray If you select this as the output tray, copied/printed paper and fax messages are delivered here face down. 2.
  • Page 86 2. Getting Started 7. Twin interposer Inserts cover or slip sheets into copied or printed paper. To use the twin interposer, Finisher SR4110 is required. 8. Multi-folding unit The Multi-folding unit can apply the following folds: Half Fold, Letter Fold-out, Letter Fold-in, Double Parallel Fold, Gate Fold, and Z-fold.
  • Page 87: Changing The Display Language

    Changing the Display Language Changing the Display Language You can change the language used on the display. English is set as default. Press the [User Tools/Counter] key. CUP009 Press language key until the language you want to display appears. Press the [User Tools/Counter] key.
  • Page 88: How To Use The [Home] Screen

    2. Getting Started How to Use the [Home] Screen The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 89: Adding Icons To The [Home] Screen

    How to Use the [Home] Screen 7. Shortcut icon You can add shortcuts to programs or Web pages to the [Home] screen. For details about how to register shortcuts, see page 39 "Adding Icons to the [Home] Screen". The program number appears on the bottom of the shortcut icon.
  • Page 90 2. Getting Started • You can change the position of icons. For details, see "Changing the Order of Icons on the [Home] Screen", Convenient Functions Adding icons to the [Home] screen using Web Image Monitor Start Web Image Monitor. For details, see "Using Web Image Monitor", Connecting the Machine/ System Settings Log in to Web Image Monitor as an administrator.
  • Page 91 How to Use the [Home] Screen Press [Edit Home]. Press [Add Icon]. Press the [Program] tab.
  • Page 92 2. Getting Started Make sure that [Copier Program] is selected. Select the program you want to add. Specify the position where [Blank] is displayed. Press [OK]. Press the [User Tools/Counter] key. • Press [ ] on the upper-right corner of the screen to check the position on the simple screen.
  • Page 93: Registering Functions In A Program

    Registering Functions in a Program Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Facsimile: 100 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Color mode, original type, density, Special Original, paper tray, Store File (except for User Name,...
  • Page 94 2. Getting Started Press the [Program] key. CUP008 Press [Program]. Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit]. • The number of characters you can enter for a program name varies depending on the functions as follows: •...
  • Page 95: Example Of Programs

    Registering Functions in a Program [Paper Tray Priority: Facsimile] in the [Tray Paper Settings] tab will be selected first. For details, see "System Settings", Connecting the Machine/ System Settings • Destinations that are registered in the machine's Address Book can be registered to a program of the scanner mode.
  • Page 96 2. Getting Started Program name Program description Effect Unified-size copy Specify [Mixed Sizes] in [Special You can print various size copies Original] and [Auto Reduce / onto one size of paper, so they are Enlarge] in the initial display. easier to manage. Stamping Specify [User Stamp] in [Edit / You can stamp the name of your...
  • Page 97 Registering Functions in a Program Program name Program description Effect Unified-size scan In [Scan Settings], select [Mixed You can skip this procedure to unify Original Sizes] in [Scan Size] and the size when reprinting scanned specify the finished size of scanned data.
  • Page 98 2. Getting Started Program name Program description Effect Specified time fax Specify [Send Later] in [TX Mode]. You can send a fax at a specified transmission time. Departmental fax Specify [Fax Header Print] in [TX This setting can be used if the transmission Mode].
  • Page 99: Turning On/Off The Power

    Turning On/Off the Power Turning On/Off the Power The main power switch is on the left side of the machine. When this switch is turned on, the main power turns on and the main power indicator on the right side of the control panel lights up. When this switch is turned off, the main power turns off and the main power indicator on the right side of the control panel goes out.
  • Page 100 2. Getting Started Open the main power switch cover, and then push the main power switch. The main power indicator goes out. The main power turns off automatically when the machine shuts down. If the screen on the control panel does not disappear, contact your service representative.
  • Page 101: When The Authentication Screen Is Displayed

    When the Authentication Screen Is Displayed When the Authentication Screen Is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 102: Logging Out Using The Control Panel

    2. Getting Started Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging Out Using the Control Panel This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 103: Placing Originals

    Placing Originals Placing Originals Placing Originals on the Exposure Glass • Keep your hands away from the hinges and exposure glass when lowering the ADF. Not doing so may result in an injury if your hands or fingers are pinched. •...
  • Page 104 2. Getting Started CVA052 1. Sensors Adjust the original guide to the original size. Place the aligned originals squarely face up in the ADF. Do not stack originals beyond the limit mark. The first page should be on the top. CVA053 1.
  • Page 105: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 106 3. Copy Press the [Start] key. When placing the original on the exposure glass, press the [ ] key after all originals are scanned. Some functions such as Batch mode may require that you press the [ ] key when placing originals in the ADF.
  • Page 107: Auto Reduce / Enlarge

    Auto Reduce / Enlarge Auto Reduce / Enlarge The machine automatically detects the original size and then selects an appropriate reproduction ratio based on the paper size you select. CKN008 • If you select a reproduction ratio after pressing [Auto Reduce / Enlarge], [Auto Reduce / Enlarge] is canceled and the image cannot be rotated automatically.
  • Page 108 3. Copy Press [Auto Reduce / Enlarge]. Select the paper size. Place the originals, and then press the [Start] key.
  • Page 109: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page. 2 Sided 2 Sided Copies one 2-sided page on one 2-sided page.
  • Page 110 3. Copy Original Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Dup./Combine/Series]. Make sure that [Duplex] is selected. If [Duplex] is not selected, press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output.
  • Page 111: Specifying The Original And Copy Orientation

    Duplex Copying Select the original orientation, and then press [OK]. Press the [Start] key. Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper.
  • Page 112 3. Copy Select [Top to Top] or [Top to Bottom] for [Original:] if the original is two-sided. Select [Top to Top] or [Top to Bottom] for [Copy:]. Press [OK].
  • Page 113: Combined Copying

    Combined Copying Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 114: One-Sided Combine

    3. Copy CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 There are six types of One-Sided Combine. 1 Sided 2 Originals Combine 1 Side Copies two 1-sided originals to one side of a sheet. 1 Sided 4 Originals Combine 1 Side Copies four 1-sided originals to one side of a sheet.
  • Page 115: Two-Sided Combine

    Combined Copying 2 Sided 4 Pages Combine 1 Side Copies two 2-sided originals to one side of a sheet. 2 Sided 8 Pages Combine 1 Side Copies four 2-sided originals to one side of a sheet. Press [Dup./Combine/Series]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original:].
  • Page 116 3. Copy CKN074 There are six types of Two-Sided Combine. 1 Sided 4 Originals Combine 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Combine 2 Sides Copies eight 1-sided originals to one sheet with four pages per side. 1 Sided 16 Originals Combine 2 Sides Copies 16 1-sided originals to one sheet with eight pages per side.
  • Page 117 Combined Copying Select [1 Sided] or [2 Sided] for [Original:]. Press [Combine 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original:] and/or [Copy:], and then press [OK]. Select the number of originals to combine. Press [OK]. Select the paper size.
  • Page 118: Copying Onto Custom Size Paper From The Bypass Tray

    3. Copy Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 139.7–487.7 mm (5.50–19.20 inches) and a vertical length of 90.0–330.2 mm (3.55–13.00 inches) can be fed in from the bypass tray. Note however that the limitation on the horizontal and vertical length range will vary depending on which options are installed.
  • Page 119: Copying Onto Envelopes

    Copying onto Envelopes Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Place the original on the exposure glass and place the envelope in the bypass tray or paper tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see page 146 "Recommended Paper Sizes and Types".
  • Page 120: Copying Onto Envelopes From The Paper Tray

    3. Copy Load the envelopes face up in the bypass tray. The bypass tray ( ) is automatically selected. Press the [ ] key. Press [Paper Size]. Specify the envelope size, and then press [OK] twice. Place the originals, and then press the [Start] key. Copying onto Envelopes from the Paper Tray Before using this function, specify the paper size and type under [Tray Paper Settings] in User Tools.
  • Page 121: Sort

    Sort Sort The machine assembles copies as sets in sequential order. • You cannot use the bypass tray with Rotate Sort. Sort/Shift Sort Copies are assembled as sets in sequential order. To use Shift Sort, a finisher is required. Each time the copies of one set or a job are delivered, the next copy is shifted to separate each set or job.
  • Page 122: Changing The Number Of Sets

    3. Copy Press [Finishing]. Press [Finisher]. Select [Sort] or [Rotate Sort], and then press [OK]. Enter the number of copy sets using the number keys. Place the originals. To confirm the type of finishing, press the [Sample Copy] key. Press the [Start] key. Changing the Number of Sets You can change the number of copy sets during copying.
  • Page 123 Sort Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 124: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents on the Document Server screen. For details about the Document Server, see page 115 "Storing Data".
  • Page 125: Fax

    4. Fax This chapter describes frequently used facsimile functions and operations. For the information not included in this chapter, see Fax on the supplied CD-ROM. Basic Procedure for Transmissions (Memory Transmission) This section describes the basic procedure for transmitting documents using Memory Transmission. You can specify the fax, IP-Fax, Internet Fax, e-mail, or folder destinations.
  • Page 126 4. Fax Make sure [Immed. TX] is not highlighted. Place the original into the ADF. Make the scan settings such as scan size and resolution. Configure the transmission settings such as [TX Mode] as necessary. Specify a destination. You can enter the destination's number or address directly or select from the Address Book by pressing the destination key.
  • Page 127: Sending Originals Using The Exposure Glass (Memory Transmission)

    Basic Procedure for Transmissions (Memory Transmission) If you send documents to Internet Fax or e-mail destinations or enable the E-mail TX Results function, specify a sender. Press the [Start] key. Sending Originals Using the Exposure Glass (Memory Transmission) Make sure [Immed. TX] is not highlighted. Place the first page of the original face down on the exposure glass.
  • Page 128: Registering A Fax Destination

    4. Fax Registering a Fax Destination Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Check that [Program / Change] is selected. Press [New Program]. Press [Change] under "Name". The name entry display appears. Enter the name, and then press [OK]. Press [ Next].
  • Page 129: Deleting A Fax Destination

    Basic Procedure for Transmissions (Memory Transmission) Enter the fax number using the number keys, and then press [OK]. Specify optional settings such as "SUB Code", "SEP Code", and "International TX Mode". Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Deleting a Fax Destination •...
  • Page 130 4. Fax Press [Delete All], and then press [OK] under "Fax Destination". Press [OK]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 131: Transmitting While Checking Connection To Destination (Immediate Transmission)

    Transmitting while Checking Connection to Destination (Immediate Transmission) Transmitting while Checking Connection to Destination (Immediate Transmission) Using Immediate Transmission, you can send documents while checking the connection to the destination. You can specify fax or IP-Fax destinations. If you specify Internet Fax, e-mail, folder destinations, and group or multiple destinations, the transmission mode is automatically switched to Memory Transmission.
  • Page 132: Sending Originals Using The Exposure Glass (Immediate Transmission)

    4. Fax Specify a destination. If you make a mistake, press the [Clear] key, and then enter again. Press the [Start] key. Sending Originals Using the Exposure Glass (Immediate Transmission) Press [Immed. TX]. Place the first page face down on the exposure glass. Specify a destination.
  • Page 133: Canceling A Transmission

    Canceling a Transmission Canceling a Transmission This section explains how to cancel a fax transmission. Canceling a Transmission Before the Original Is Scanned Use this procedure to cancel a transmission before pressing the [Start] key. Press the [Reset] key. CUH002 Canceling a Transmission While the Original Is Being Scanned Use this procedure to cancel scanning or transmitting of the original while it is being scanned.
  • Page 134: Canceling A Transmission After The Original Is Scanned

    4. Fax Press [Cancel Scanning] or [Cancel TX]. Depending on the transmission mode and function you use, either [Cancel Scanning] or [Cancel TX] is displayed. Canceling a Transmission After the Original Is Scanned Use this procedure to cancel a transmission after the original is scanned. You can cancel transmission of a file while the file is being sent, stored in memory, or if it fails to transmit.
  • Page 135: Storing A Document

    Storing a Document Storing a Document You can store and send a document at the same time. You can also just store a document. The following information can be set for the stored documents as necessary: User Name You can set this function if necessary to know who and what departments stored documents in the machine.
  • Page 136: Sending Stored Documents

    4. Fax Set the user name, file name, and password as necessary. • User Name Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. •...
  • Page 137 Storing a Document Press [Select Stored File]. Select the documents to be sent. When multiple documents are selected, they are sent in the order of selection. • Press [User Name] to place the documents in order by programmed user name. •...
  • Page 138: Printing The Journal Manually

    4. Fax Printing the Journal Manually To print the Journal manually, select the printing method: [All], [Print per File No.], or [Print per User]. Prints the results of communications in the order made. Print per File No. Prints only the results of communications specified by file number. Print per User Prints the results of communications by individual senders.
  • Page 139: Print

    5. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 140: Displaying The Printer Driver Properties

    5. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 141: Standard Printing

    Standard Printing Standard Printing • The default setting is 2 sided printing. If you want to print on only one side, select [Off] for the 2 sided printing setting. • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete.
  • Page 142: Printing On Both Sides Of Sheets

    5. Print Printing on Both Sides of Sheets This section explains how to print on both sides of each page using the printer driver. • The types of paper that can be printed on both sides are as follows: • Plain 1 (66 to 74 g/m2), Plain 2 (74.1 to 100.9 g/m2), Recycled, Special 1, Special 2, Special 3, Middle Thick (101 to 127.4 g/m2), Thick 1 (127.5 to 150 g/m2), Thick 2 (150.1 to 216 g/m2), Thick 3 (216.1 to 256 g/m2), Thin (52.3 to 65.9 g/m2), Color, Letterhead, Preprinted, Prepunched, Bond, Cardstock, Coated...
  • Page 143: Combining Multiple Pages Into Single Page

    Combining Multiple Pages into Single Page Combining Multiple Pages into Single Page This section explains how to print multiple pages onto a single sheet. The combine printing function allows you to economize on paper by printing multiple sheets at reduced size onto a single sheet. When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click [Print].
  • Page 144 5. Print 4 Pages per Sheet Right, then Down Down, then Right Left, then Down Down, then Left...
  • Page 145: Printing On Envelopes

    Printing on Envelopes Printing on Envelopes Configure the paper settings appropriately using both the printer driver and the control panel. Configuring Envelope Settings Using the Control Panel Load envelopes in the paper tray. Press the [User Tools/Counter] key. CJS039 Press [Tray Paper Settings]. Select the paper size setting of the paper tray in which the envelopes are loaded.
  • Page 146 5. Print In the "Document Size:" list, select the envelope size. In the "Input Tray:" list, select the paper tray where the envelopes are loaded. In the "Paper Type:" list, select [Envelope]. Change any other print settings if necessary. Click [OK]. Start printing from the application's [Print] dialog box.
  • Page 147: Saving And Printing Using The Document Server

    Saving and Printing Using the Document Server Saving and Printing Using the Document Server The Document Server enables you to store documents on the machine's hard disk, and allows you to edit and print them as necessary. • Applications with their own drivers, such as PageMaker, do not support this function. •...
  • Page 148: Managing Documents Stored In Document Server

    5. Print Specify the folder number to store the document in the "Folder Number" box. When "0" is specified in the "Folder Number:" box, documents will be saved in the Shared folder. If the folder is protected by a password, enter the password in the "Folder Password:" box.
  • Page 149: Scan

    6. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 150: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    6. Scan If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 151 Basic Procedure When Using Scan to Folder Confirm the user name. The user name is displayed under [USERNAME]. Step 2: Creating a shared folder on a computer running Microsoft Windows Create a shared destination folder in Windows and enable sharing. In the following procedure, a computer which is running under Windows 7 Ultimate and participating in a domain is used as an example.
  • Page 152: Registering An Smb Folder

    6. Scan Step 3: Specifying access privileges for the created shared folder If you want to specify access privileges for the created folder to allow other users or groups to access the folder, configure the folder as follows: Right-click the folder created in step 2, and then click [Properties]. On the [Security] tab, click [Edit...].
  • Page 153 Basic Procedure When Using Scan to Folder The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title.
  • Page 154 6. Scan Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Locating the SMB folder manually Press [Change] under "Path".
  • Page 155: Deleting An Smb Registered Folder

    Basic Procedure When Using Scan to Folder Select the computer name of the destination computer. Shared folders under it appear. You can press [Up One Level] to switch between levels. Select the folder you want to register. Press [OK]. Deleting an SMB Registered Folder Press the [User Tools/Counter] key.
  • Page 156: Entering The Path To The Destination Manually

    6. Scan Entering the Path to the Destination Manually Press [Manual Entry]. Press [SMB]. Press [Manual Entry] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 157: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E- mail Press the [Home] key on the top left of the control panel, and press the [Scanner] icon on the [Home] screen. CJS113 Make sure that no previous settings remain. If a previous setting remains, press the [Reset] key.
  • Page 158: Registering An E-Mail Destination

    6. Scan Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. • Press [Original Feed Type], and then press [2 Sided Original]. •...
  • Page 159 Basic Procedure for Sending Scan Files by E-mail • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title. You can select [Frequent] and one more key for each title. Press [E-mail].
  • Page 160: Deleting An E-Mail Destination

    6. Scan Deleting an E-mail Destination Press the [User Tools/Counter] key. Press [Address Book Mangmnt]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, user code, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 161: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 162: Checking A Stored File Selected From The List

    6. Scan Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. • File Name Press [File Name], enter a file name, and then press [OK]. •...
  • Page 163: Specifying The File Type

    Specifying the File Type Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a memory storage device.
  • Page 164: Specifying Scan Settings

    6. Scan Specifying Scan Settings Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 165: Document Server

    7. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 166 7. Document Server Press the [Home] key on the top left of the control panel, and press the [Document Server] icon on the [Home] screen. CJS113 Press [To Scanning Screen]. Press [Target Fldr. to Store]. Specify a folder in which to store the document, and then press [OK]. Press [User Name].
  • Page 167: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [Finishing] ([Output], [Finisher], [Folding Unit]) • [Cover/Slip Sheet] ([Front Cover], [Back Cover], [Designate/Chapter], [Slip Sheet]) •...
  • Page 168 7. Document Server...
  • Page 169: Web Image Monitor

    8. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 170 8. Web Image Monitor The link to Help and dialog box for keyword search appears. 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents.
  • Page 171: Adding Paper And Toner

    9. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Precautions for Loading Paper • When loading paper, take care not to trap or injure your fingers. • Do not stack paper over the limit mark. •...
  • Page 172 9. Adding Paper and Toner Loosen the stack by riffling the sheets. CVA068 Holding its shorter ends, flex the stack back and forth to create space between the sheets. Repeat this several times. CVA069 CVA070...
  • Page 173 Precautions for Loading Paper Make sure there is space between the sheets. CVA071...
  • Page 174: Loading Paper Into Tray 1

    9. Adding Paper and Toner Loading Paper into Tray 1 (mainly Europe and Asia) Tray 1 can hold A4 paper only. If you want to print on 8 × 11 from Tray 1, contact your service representative. (mainly North America) Tray 1 can hold 8 ×...
  • Page 175 Loading Paper into Tray 1 • Left half of the tray pulled out CVA003 Carefully push the paper tray fully in. • You can load paper even if Tray 1 is in use. It is okay to pull out the left half of the tray while Tray 1 is in use.
  • Page 176: Loading Paper Into The A3/11 × 17 Tray Unit

    9. Adding Paper and Toner Loading Paper into the A3/11 × 17 Tray Unit (mainly Europe and Asia) A3/11 × 17 tray unit can hold A3 paper only. If you want to print on A4 , B4 JIS , 11 × 17 , ×...
  • Page 177: Loading Paper Into Trays 2 And 3

    Loading Paper into Trays 2 and 3 Loading Paper into Trays 2 and 3 Each paper tray is loaded in the same way. In the following example procedure, paper is loaded into Tray 2. • Check the paper edges are aligned at the right side. •...
  • Page 178: Loading Tab Stock Into Trays 2 And 3

    9. Adding Paper and Toner • Various sizes of paper can be loaded in Trays 2 and 3 by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in Trays 2 and 3", Paper Specifications and Adding Paper •...
  • Page 179: Loading Paper Into The Bypass Tray

    Loading Paper into the Bypass Tray Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Do not stack paper over the limit mark.
  • Page 180: Loading Tab Stock Into The Bypass Tray

    9. Adding Paper and Toner • When loading thick paper, thin paper, OHP transparencies, or translucent paper, specify the paper size and the paper type. • Letterhead paper must be loaded in a specific orientation. For details, see page 143 "Loading Orientation-fixed Paper or Two-sided Paper".
  • Page 181 Loading Paper into the Bypass Tray • The default of [Printer Bypass Paper Size] is [Auto Detect]. Specifying regular sizes using the control panel Press the [User Tools/Counter] key. CUP009 Press [Tray Paper Settings]. Press [Printer Bypass Paper Size]. Select the paper size. Press [OK].
  • Page 182 9. Adding Paper and Toner Specifying a custom size paper using the control panel Press the [User Tools/Counter] key. CUP009 Press [Tray Paper Settings]. Press [Printer Bypass Paper Size]. Press [Custom Size]. If a custom size is already specified, press [Change Size]. Press [Vertical].
  • Page 183 Loading Paper into the Bypass Tray • Usually only one side of OHP transparencies can be used for printing. Be sure to load them with the print side up. • When printing onto OHP transparencies, remove printed sheets one by one. Press the [User Tools/Counter] key.
  • Page 184 9. Adding Paper and Toner • For details about paper thickness, see "Tray Paper Settings", Connecting the Machine/ System Settings...
  • Page 185: Loading Paper Into The Large Capacity Tray

    Loading Paper into the Large Capacity Tray Loading Paper into the Large Capacity Tray (mainly Europe and Asia) The LCT can hold A4 paper only. If you want to print on 8 × 11 or B5 JIS from the LCT, contact your service representative.
  • Page 186 9. Adding Paper and Toner CVA063 Load paper by repeating steps 2 and 3. Close the top cover of the LCT.
  • Page 187: Loading Paper Into The Wide Large Capacity Tray

    Loading Paper into the Wide Large Capacity Tray Loading Paper into the Wide Large Capacity Tray • Check that the paper edges are aligned with the left side. Check that paper in the paper tray is not being used, and then pull the tray carefully out until it stops.
  • Page 188 9. Adding Paper and Toner • You can load envelopes in the wide LCT. When loading envelopes, place them in the correct orientation. For details, see page 159 "Envelopes".
  • Page 189: Loading Paper Into The Interposer

    Loading Paper into the Interposer Loading Paper into the Interposer • Do not place anything on top of or leave documents on the sensor. This may lead to the paper size not being correctly scanned or paper jams. • When using the Z-fold function, the paper in the interposer must be of the same size as the prints after they have been folded.
  • Page 190 9. Adding Paper and Toner Interposer...
  • Page 191: Loading Paper Into The Twin Interposer

    Loading Paper into the Twin Interposer Loading Paper into the Twin Interposer • Do not place anything on top of or leave documents on the sensor. This may lead to the paper size not being correctly scanned or paper jams. While pressing the release lever, align the side fences with the paper size to be loaded.
  • Page 192 9. Adding Paper and Toner • To load the paper in the twin interposer, align the orientation of originals in the ADF as shown below. Twin interposer...
  • Page 193: Loading Orientation-Fixed Paper Or Two-Sided Paper

    Loading Orientation-fixed Paper or Two-sided Paper Loading Orientation-fixed Paper or Two-sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not be printed correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 194 9. Adding Paper and Toner Original orientation Exposure glass Unreadable • Copy orientation • Scanner • Paper orientation • Copier mode Bypass tray or Copy side Tray 1 Trays 2–3 wide LCT One-sided Two-sided • Printer mode Bypass tray or Print side Tray 1 Trays 2–3...
  • Page 195 Loading Orientation-fixed Paper or Two-sided Paper • In copier mode: • For details about how to make two-sided copies, see page 59 "Duplex Copying". • In printer mode: • To print on letterhead paper when [Auto Detect] is specified for [Letterhead Setting], you must specify [Letterhead] as the paper type in the printer driver's settings.
  • Page 196: Recommended Paper Sizes And Types

    9. Adding Paper and Toner Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use paper that curls, either because it is too dry or too damp, a staple clogging or paper jam may occur.
  • Page 197 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 52.3–256.0 g/m (14.0 lb. 1000 sheets Bond–141.0 lb. Index) Thin Paper–Thick Paper 3 , B4 JIS , 11 × 17 , 8 × 14 , 8 × 11 A3 , A4 , B4 JIS , 8 ×...
  • Page 198 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52.3–256.0 g/m (14.0 lb. Select the paper size using the 550 sheets Bond–141.0 lb. Index) Tray Paper Settings menu: Thin Paper–Thick Paper 3 A5 , 11 × 17 , 8 ×...
  • Page 199 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity Envelopes Select the paper size using the • : 50 sheets Tray Paper Settings menu: C5 Env • : 25 sheets *1 For details about how to load custom size paper, contact your service representative. *2 The tab sheet holder is required.
  • Page 200 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52.3–300.0 g/m (14.0 lb. • 100 sheets Bond–165.0 lb. Index) • Thick Paper 1: 40 Thin Paper–Thick Paper 4 sheets 11 × 17 , 8 × 14 , 8 ×...
  • Page 201 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity Tab stock A4 , 8 × 14 , 8 × 11 20 sheets 163.0 g/m (90.0 lb. Index), 199.0 g/m (110.0 lb. Index) *1, *3 Envelopes 10 sheets ×...
  • Page 202 9. Adding Paper and Toner Extension unit Paper type and weight Paper size Paper capacity 52.3–216.0 g/m (14.0 lb. 2500 sheets Bond–79.9 lb. Cover) Thin Paper–Thick Paper 2 × 11 52.3–216.0 g/m (14.0 lb. 2500 sheets Bond–79.9 lb. Cover) Thin Paper–Thick Paper 2 A4 , B4 JIS , B5 JIS , 8 ×...
  • Page 203 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 52.3–300.0 g/m (14.0 lb. Select the paper size using the 2000 sheets Bond–165.0 lb. Index) Tray Paper Settings menu: Thin Paper–Thick Paper 4 , B5 JIS , B6 JIS ×...
  • Page 204 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity Label paper (adhesive labels) , B4 JIS 20 sheet Tab stock A4 , 8 × 14 , 8 × 11 1000 sheets 163.0 g/m (90.0 lb. Index), 199.0 g/m (110.0 lb.
  • Page 205 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 64.0–216.0 g/m (17.1 lb. 200 sheets Bond–79.9 lb. Cover) Thin Paper–Thick Paper 2 11 × 17 , 8 × 11 × 13 , 8 × 13 , 12 × 18 ×...
  • Page 206 9. Adding Paper and Toner Paper type and weight Paper size Paper capacity 64.0–216.0 g/m (17.1 lb. Select the paper size using the 240 sheets × 2 Bond–79.9 lb. Cover) Tray Paper Settings menu: Thin Paper–Thick Paper 2 B5 JIS , 8 ×...
  • Page 207 Recommended Paper Sizes and Types Paper Thickness Paper weight Plain Paper 1 66.0–80.9 g/m (18.0–21.9 lb. Bond) Plain Paper 2 81.0–100.9 g/m (22.0–27.0 lb. Bond) Middle Thick 101.0–127.4 g/m (27.1 lb. Bond–46.9 lb. Cover) Thick Paper 1 127.5–150.0 g/m (47.0–55.0 lb. Cover) Thick Paper 2 150.1–216.0 g/m (55.1–79.9 lb.
  • Page 208 9. Adding Paper and Toner Machine/ System Settings . For the setting procedure of the Auto Tray Switching function, see "General Features", Copy/ Document Server • When loading label paper: • We recommend that you use specified label paper. • It is recommended to place one sheet at a time. •...
  • Page 209: Thick Paper

    Recommended Paper Sizes and Types Thick Paper This section gives you various details about and recommendations concerning thick paper. When loading thick paper of 127.5–256.0 g/m (47.0 lb. Bond–141.0 lb. Index) in Trays 1–3, 127.5–216.0 g/m (47.0 lb. Bond–79.9 lb. Cover) in the LCT, or 127.5–300.0 g/m (47.0 lb.
  • Page 210 9. Adding Paper and Toner • Do not use window envelopes. • Fan the envelopes before loading them. Otherwise, the envelopes may stick together because of the glue on them. If fanning does not prevent them sticking together, load them one by one. Note that some types of envelopes cannot be used with this machine.
  • Page 211 Recommended Paper Sizes and Types Orientation of Exposure glass Trays 2–3 Bypass tray, wide LCT envelopes Side-opening envelopes • Flaps: closed • Flaps: closed • Flaps: closed • Bottom side of • Bottom side of • Bottom side of envelopes: toward envelopes: toward envelopes: toward the front of the...
  • Page 212 9. Adding Paper and Toner Types of envelopes Trays 2–3 Bypass tray, wide LCT Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of envelopes: • Bottom side of envelopes: toward the back of the toward the back of the machine machine •...
  • Page 213 Recommended Paper Sizes and Types • Check the envelopes are not damp. • High temperature and high humidity conditions can reduce print quality and cause envelopes to become creased. • Depending on the environment, copying or printing on envelopes may wrinkle them even if they are recommended.
  • Page 214: Adding Toner

    9. Adding Paper and Toner Adding Toner This section explains precautions when adding toner, how to send faxes or scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 215 Adding Toner • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible.
  • Page 216: Sending Faxes Or Scanned Documents When Toner Has Run Out

    9. Adding Paper and Toner • For details about how to check contact number where you can order supplies, see "Inquiry", Maintenance and Specifications Sending Faxes or Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send faxes or scanned documents.
  • Page 217 Adding Toner Please see our local company website for information on the recycling of supply products, or you can recycle items according to the requirements of your local municipalities or private recyclers.
  • Page 218 9. Adding Paper and Toner...
  • Page 219: 10. Troubleshooting

    10. Troubleshooting This chapter describes basic troubleshooting procedures. When a Status Icon Is Displayed This section describes the status icons displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Status Icon Status : Paper Misfeed icon Appears when a paper misfeed occurs.
  • Page 220 10. Troubleshooting Status Icon Status : Waste Staple Full icon Appears when the waste staple receptacle is full. For details about removing staple waste, see "Removing Staple Waste", Troubleshooting : Service Call icon Appears when the machine is malfunctioning or requires maintenance.
  • Page 221: When The Indicator Lamp For The [Check Status] Key Is Lit Or Flashing

    When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing If the indicator lamp for the [Check Status] key lights up or flashes, press the [Check Status] key to display the [Check Status] screen.
  • Page 222 10. Troubleshooting Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper. For details about loading not print out. paper, see "Loading Paper", Paper Specifications and Adding Paper An error has occurred.
  • Page 223: When The Machine Makes A Beeping Sound

    When the Machine Makes a Beeping Sound When the Machine Makes a Beeping Sound The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep...
  • Page 224: When You Have Problems Operating The Machine

    10. Troubleshooting When You Have Problems Operating the Machine Problem Causes Solutions When the machine is turned Functions other than the Wait a little longer. on, the only icon that copier function are not yet appears on the home screen ready.
  • Page 225 When You Have Problems Operating the Machine Problem Causes Solutions The power turns off The Weekly Timer setting is Change the Weekly Timer setting. For automatically. set to [Main Power Off]. details about the Weekly Timer setting, see "Timer Settings", Connecting the Machine/ System Settings The user code entry screen is Users are restricted by User...
  • Page 226 10. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. Using curled paper often • Take the stiffness out of the paper causes misfeeds, soiled with your hands to straighten out paper edges, or slipped the curl. positions while performing • Load the paper up side down so staple or stack printing.
  • Page 227 When You Have Problems Operating the Machine Problem Causes Solutions Misfeeds occur frequently. Paper of undetectable size • Remove misfed paper. For details has been loaded. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting • If you load a paper size that is not selected automatically, you need to specify the paper size with the control panel.
  • Page 228 10. Troubleshooting Problem Causes Solutions An error has occurred when The Address Book cannot be Wait a while, and then retry the the Address Book is changed while deleting the operation. changed from the display multiple stored documents. panel or Web Image Monitor.
  • Page 229: When Multiple Functions Cannot Be Executed Simultaneously

    When You Have Problems Operating the Machine Fold Problem Causes Solutions Wrinkling occurs when gate Wrinkling can occur if gate When applying gate fold, letter fold-in, fold, letter fold-in, or letter fold, letter fold-in, or letter or letter fold-out to paper larger than fold-out is applied.
  • Page 230 10. Troubleshooting For details about Function Compatibility, see "Function Compatibility", Troubleshooting...
  • Page 231: Messages Displayed When Using The Copy/Document Server Function

    Messages Displayed When Using the Copy/Document Server Function Messages Displayed When Using the Copy/ Document Server Function • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper. For details about recommended paper, see page 146 "Recommended Paper Sizes and Types".
  • Page 232 10. Troubleshooting Message Causes Solutions "Cannot display preview of The image data may have Press [Exit] to display the preview this page." been corrupted. screen without a thumbnail. If the selected document contains several pages, press [Switch] on the "Display Page" area to change the page, and then a preview of the next page will appear.
  • Page 233 Messages Displayed When Using the Copy/Document Server Function Message Causes Solutions "File being stored exceeded The scanned originals have Press [Exit], and then store again with max. number of pages per too many pages to store as an appropriate number of pages. file.
  • Page 234: When Using The Connect Copy Function

    10. Troubleshooting Message Causes Solutions "Stapling capacity The number of sheets per set Check the stapler capacity. For details exceeded." is over the staple capacity. about the stapler capacity, see "Specifications for Finisher SR4090", "Specifications for Booklet Finisher SR4100", or "Specifications for Finisher SR4110", Maintenance and Specifications "The selected folder is...
  • Page 235 Messages Displayed When Using the Copy/Document Server Function Message Causes Solutions "Cannot print from the sub- The sub-machine's User Press the [User Tools/Counter] key to machine. Check the status of Tools menu is open. close the User Tools menu. the sub-machine." "Cannot print from the sub- The sub-machine has Continue copying using the main...
  • Page 236: Messages Displayed When Using The Facsimile Function

    10. Troubleshooting Messages Displayed When Using the Facsimile Function Message Causes Solutions "Cannot find the specified The name of the computer or Check that the computer name and the path. Please check the folder entered as the folder name for the destination are settings."...
  • Page 237: When There Is A Problem Specifying The Network Settings

    Messages Displayed When Using the Facsimile Function Message Causes Solutions "Some page(s) are near The first page of the The original's blank side might have blank." document is almost blank. been scanned. Be sure to place your originals correctly. For details about determining the cause of blank pages, see "Detecting Blank Pages", Fax •...
  • Page 238 10. Troubleshooting Message Causes Solutions "Check whether there are Registering of user name is • Correct that the correct SIP Server any network problems." rejected by SIP server. IP Address and SIP User Name are listed in [SIP Settings] of [13-17] [Facsimile Features].
  • Page 239 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are The "Effective Protocol" and • Check that the correct IP address any network problems." "SIP Server IP Address" is specified for the machine in settings are different, or an [System Settings].
  • Page 240 10. Troubleshooting Message Causes Solutions "Check whether there are E-mail transmission was • Check that User Name and any network problems." refused by SMTP Password for the following authentication, POP before settings in [System Settings] are [14-09] SMTP authentication, or login listed correctly.
  • Page 241 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Check whether there are No POP3/IMAP4 server • Check that the correct Server any network problems." address is registered. Name or Server Address is listed in [POP3 / IMAP4 Settings] of [15-01] [System Settings].
  • Page 242 10. Troubleshooting Message Causes Solutions "Check whether there are Cannot find the DNS server • Check that the following settings any network problems." or POP3/IMAP4 server. in [System Settings] are listed correctly. [15-11] • IP address of the DNS Server •...
  • Page 243: When The Remote Fax Function Cannot Be Used

    Messages Displayed When Using the Facsimile Function • Settings that can be confirmed in System Settings or Facsimile Features on the control panel can also be confirmed from Web Image Monitor. For details about how to confirm the settings from Web Image Monitor, see Web Image Monitor Help.
  • Page 244 10. Troubleshooting Message Causes Solutions "Check whether there are • An IP address has not • Check that the correct IP address any network problems." been registered for the is specified for the machine in main machine. [System Settings]. For details [16-00] about the IP address of the main •...
  • Page 245 Messages Displayed When Using the Facsimile Function Message Causes Solutions "Connection with the remote The settings or machine For details about the settings and machine has failed. There is configuration for using the machine configuration for using the a problem with the remote remote fax function to remote fax function to connect to a machine structure.
  • Page 246: Messages Displayed When Using The Printer Function

    10. Troubleshooting Messages Displayed When Using the Printer Function This section describes the principal messages that appear on the display panel, error logs or reports. If other messages appear, follow their instructions. Messages Displayed on the Control Panel When Using the Printer Function •...
  • Page 247 Messages Displayed When Using the Printer Function Message Causes Solutions "Load following paper in n. The printer driver settings are Check that the printer driver settings To cancel job, press [Job incorrect or the tray does not are correct, and then load paper of Reset]."...
  • Page 248 10. Troubleshooting Message Causes Solutions "Printer font error." An error has occurred in the Contact your service representative. font settings. "Problems with the wireless The machine has detected a Check that the Bluetooth unit is card. Please call service." Bluetooth failure, or it could installed properly, or contact your not detect a Bluetooth unit.
  • Page 249: Messages Printed On The Error Logs Or Reports When Using The Printer Function

    Messages Displayed When Using the Printer Function Message Causes Solutions "Unable to access the • An error occurred Save the file to a different memory specified memory storage when the machine storage device, and then try to print device." accessed the memory again.
  • Page 250 10. Troubleshooting Message Causes Solutions "An error occurred while The [Enter User Text:] field On the printer driver's [Detailed processing an Unauthorized on the [Unauthorized Copy Settings] tab, click [Effects] in "Menu:". Copy Prevention job. The Prevention for Pattern Select [Unauthorized Copy job was cancelled."...
  • Page 251 Messages Displayed When Using the Printer Function Message Causes Solutions "The selected paper type is Job reset is automatically Specify the correct paper type, and not supported. This job has performed if the specified then print the file again. been cancelled." paper type is incorrect.
  • Page 252 10. Troubleshooting Message Causes Solutions "Exceeded max. pages. The number of pages Reduce the number of pages to print. Collate is incomplete." exceeds the maximum number of sheets that you can use Collate with. "Exceeded the maximum The maximum number of For details about the maximum number of number of multi-sheet fold multi-sheet folds (Half Fold)
  • Page 253 Messages Displayed When Using the Printer Function When documents cannot be stored in the Document Server Message Causes Solutions "Cannot store data of this The paper size exceeded Reduce the paper size of the file that size." the capacity of the you want to send to a size that the Document Server.
  • Page 254 10. Troubleshooting Message Causes Solutions "The print job has been The hard disk became full Delete the files stored in the Document cancelled because capture after a file was stored. Server or reduce the file size to be sent. file(s) could not be stored: Exceeded max.
  • Page 255 Messages Displayed When Using the Printer Function Message Causes Solutions "HDD is full. (Auto)" The hard disk became full Delete unneeded files stored in the while using the error job machine. store function to store Alternatively, reduce the data size of Normal Print jobs as Hold the Temporary Print file and/or the Print files.
  • Page 256 10. Troubleshooting Message Causes Solutions "You do not have a privilege The entered login user name Check that the user name and to use this function. This job or login password is not password are correct. has been cancelled." correct. "You do not have a privilege The logged in user is not For details about how to set...
  • Page 257 Messages Displayed When Using the Printer Function Message Causes Solutions "98: Error" The machine could not Turn off the power, and then back on access Hard disk correctly. again. If the message appears frequently, contact your service representative. "99: Error" This data cannot be printed.
  • Page 258 10. Troubleshooting Message Causes Solutions "Exceeded max. number of While printing a Sample Delete unneeded files stored in the files to print for temporary / Print, Locked Print, Hold machine. stored jobs." Print, or Stored Print file, the maximum file capacity was exceeded.
  • Page 259 Messages Displayed When Using the Printer Function Message Causes Solutions "Insufficient Memory" A memory allocation error PCL 6 occurred. Select a lower resolution on the printer driver. For details about how to change the resolution setting, see the printer driver Help. On the printer driver's [Detailed Settings] tab, click [Print Quality] in "Menu:", and then select...
  • Page 260: Messages Displayed When Using The Scanner Function

    10. Troubleshooting Messages Displayed When Using the Scanner Function Messages Displayed on the Control Panel When Using the Scanner Function This section describes likely causes of and possible solutions for the error messages that appear on the control panel. If a message not described here appears, act according to the message. Message Causes Solutions...
  • Page 261 Messages Displayed When Using the Scanner Function Message Causes Solutions "Exceeded max. number of The maximum enterable Check the maximum number of alphanumeric characters." number of alphanumeric characters which can be entered, and characters has been then enter it again. For details about exceeded.
  • Page 262 10. Troubleshooting Message Causes Solutions "The program is recalled. The program contains a For details about how to set Cannot recall the destination for which the permissions, see Security Guide destination(s) for which currently logged-in user access privileges are does not have permission to required."...
  • Page 263 Messages Displayed When Using the Scanner Function Message Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity." maximum data capacity. again. Note that it may not be possible to scan very large originals at a high "Check scanning resolution, resolution.
  • Page 264 10. Troubleshooting Message Causes Solutions "Not all of the image will be Using [Specify Reproduction Specify a large size in [Specify Size], scanned." Ratio] to scale down a large and then try to scan the original again. document may cause part of If displaying the entire image is not the image to be lost.
  • Page 265 Messages Displayed When Using the Scanner Function Message Causes Solutions "Memory is full. Scanning Because there is not enough Specify whether to use the data or not. has been cancelled. Press free hard disk space in the [Send] to send the scanned machine for delivering or data, or press [Cancel] to sending by e-mail while...
  • Page 266 10. Troubleshooting Message Causes Solutions "Transmission has failed. Transmission has failed. Allocate sufficient space. Insufficient memory in the There was not enough free destination hard disk. To space on the hard disk of the check the current status, SMTP server, FTP server, or press [Scanned Files client computer at the Status]."...
  • Page 267 Messages Displayed When Using the Scanner Function Message Causes Solutions "Some of selected files are You cannot delete a file Cancel transmission ("Waiting..." status currently in use. They could which is waiting to be cleared) or the DeskTopBinder setting, not be deleted." transmitted ("Waiting..."...
  • Page 268 10. Troubleshooting When the WSD scanner function cannot be used Message Causes Solutions "Cannot communicate with WSD (Device) protocol or For details about how to enable or PC. Contact the WSD (Scanner) protocol is disable the WSD protocol, see Security administrator."...
  • Page 269 Messages Displayed When Using the Scanner Function When documents cannot be stored on a memory storage device Message Causes Solutions "Cannot write on the The memory storage device • Replace the memory storage memory storage device is full and scan data cannot device.
  • Page 270: Messages Displayed On The Client Computer

    10. Troubleshooting Message Causes Solutions "Memory is full. Press [Write] The scan could not be Select whether or not to save the to write the current scanned completed because there scanned document to the memory data to the memory storage was insufficient hard disk storage device.
  • Page 271 Messages Displayed When Using the Scanner Function Message Causes Solutions "Cannot specify any more The maximum number of The maximum number of scanning scanning area." registerable scan areas has areas that can be stored is 100. Delete been exceeded. unneeded scanning areas. "Clear Misfeed(s) in ADF."...
  • Page 272 10. Troubleshooting Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help. The problem may be due to the following cause: •...
  • Page 273 Messages Displayed When Using the Scanner Function Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such •...
  • Page 274 10. Troubleshooting Message Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly. network correctly. ("XXX"...
  • Page 275 Messages Displayed When Using the Scanner Function Message Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool.
  • Page 276: When Other Messages Appear

    10. Troubleshooting When Other Messages Appear Message Causes Solutions "Cannot connect with the • The wireless LAN Turn off the power, and then confirm wireless card. Turn the main board was not inserted the wireless LAN board is inserted power switch off, then check when the machine was correctly.
  • Page 277: When There Is A Problem Scanning Or Storing Originals

    When Other Messages Appear Message Causes Solutions "Self checking..." The machine is performing The machine may perform periodic image adjustment maintenance during operations. The operations. frequency and duration of maintenance depends on the humidity, temperature, and printing factors such as number of prints, paper size, and paper type.
  • Page 278: When The Home Screen Cannot Be Edited

    10. Troubleshooting When the Home Screen Cannot Be Edited Message Causes Solutions "The image data size is not The image data size is not For details about file size for shortcut valid. See the manual for valid. image, see "Displaying the Image on required data."...
  • Page 279: When Data Cannot Be Sent Due To A Problem With The Destination

    When Other Messages Appear Message Causes Solutions "Updating the destination The destination list is being Wait until the message disappears. Do list... Please wait. Specified updated from the network not turn off the power while this destination(s) or sender's using Web Image Monitor. message is displayed.
  • Page 280: When The Machine Cannot Be Operated Due To A Problem With The User Certificate

    10. Troubleshooting When the Machine Cannot Be Operated Due to a Problem with the User Certificate Message Causes Solutions "The destination cannot be The user certificate A new user certificate must be installed. selected because its (destination certificate) has For details about the user certificate encryption certificate is not expired.
  • Page 281: When Problems Occur While Logging In

    When Other Messages Appear Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the Digital with digital signature or digital signature or PDF/A with digital Signature's device certificate PDF/A with digital signature) must be installed.
  • Page 282: When The User Lacks Privileges To Perform An Operation

    10. Troubleshooting When the User Lacks Privileges to Perform an Operation Message Causes Solutions "You do not have the The logged in user name For details about how to set privileges to use this does not have permission for permissions, see Security Guide function."...
  • Page 283: Index

    INDEX Distributed scan management......Document Server..10, 17, 39, 74, 97, 98, 115 2 Sided Print............9, 92 Drawer..............DSM............... Duplex..............A3/11 × 17 tray unit........35, 126 Duplex Copy............. 9, 59 Address Book........11, 78, 79, 228 Address Book Management......... ADF..............
  • Page 284 Paper thickness............ Paper tray............... LAN-Fax............. 9, 19 Paper type............Large capacity tray........8, 35, 135 Paperless Fax............LCT..............8, 35 Parallel connection..........LDAP Server............Path............... Loading orientation-fixed paper......PCL................Loading paper............. Placing originals............ Loading two-sided paper........Preventing information leakage......Locked Print............Printer..
  • Page 285 Storing data............Storing document..........Storing received documents......... Symbols..............Tab Stock............ 128, 130 Thick paper..........132, 159 Toner............164, 166 Tray 1............32, 124 Tray 2............ 32, 127, 128 Tray 3............ 32, 127, 128 Turning On/Off the Power........Twin interposer..........36, 141 Two-Sided Combine..........
  • Page 286 MEMO D136-7403...
  • Page 287 © 2013...
  • Page 288 D136-7403...
  • Page 289: Operating Instructions

    Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 291 TABLE OF CONTENTS Functions That Require Options.........................9 Main Software Names............................10 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators and Users..........................13 Administrators..............................14 Configuring Administrator Authentication......................15 Specifying Administrator Privileges......................16 Registering and Changing Administrators....................18 Using Web Image Monitor to Configure Administrator Authentication..........20 Administrator Login Method..........................22 Logging in Using the Control Panel......................22 Logging in Using Web Image Monitor......................23...
  • Page 292 Creating the Server Certificate........................50 If the Fax Number Cannot be Obtained....................50 LDAP Authentication............................52 Integration Server Authentication........................57 Printer Job Authentication..........................62 Printer Job Authentication Levels.........................62 Printer Job Types............................62 "authfree" Command...........................65 Auto Registration to the Address Book......................66 Automatically Registered Address Book Items..................66 Data Carry-over Setting for Address Book Auto-program...............66 User Lockout Function............................68 Specifying the User Lockout Function......................69 Canceling Password Lockout........................69...
  • Page 293 Printing a List of Print Volume Use Counters....................87 Clearing Print Volume Use Counters......................88 Configuring the Auto-Reset Function......................89 4. Preventing Leakage of Information from Machines Protecting the Address Book...........................91 Specifying Address Book Access Permissions...................91 Encrypting Data in the Address Book......................93 Encrypting Data on the Hard Disk........................95 Enabling the Encryption Settings.........................97 Backing Up the Encryption Key........................99 Updating the Encryption Key........................100...
  • Page 294 Enabling SSL/TLS............................130 User Setting for SSL/TLS...........................131 Setting the SSL/TLS Encryption Mode.....................132 Enabling SSL for SMTP Connections.......................133 Configuring S/MIME............................135 E-mail Encryption............................135 Attaching an Electronic Signature......................137 Specifying Checking of the Certificate Valid Period................139 Configuring PDFs with Electronic Signatures....................141 Configuring IPsec............................142 Encryption and Authentication by IPsec....................142 Encryption Key Auto Exchange Settings....................143 IPsec Settings.............................144 Encryption Key Auto Exchange Settings Configuration Flow..............150...
  • Page 295 Configuring Access Permission for Each User for Stored Files..............179 Specifying Passwords for Stored Files.....................181 Unlocking Stored Files..........................182 Managing Locked Print Files.........................184 Deleting Locked Print Files........................184 Changing the Password of a Locked Print File..................186 Unlocking a Locked Print File........................187 Unauthorized Copy Prevention / Data Security for Copying..............189 Enabling Pattern Printing...........................190 Enabling Detect Data Security for Copying....................191 Printing User Information on Paper.......................193...
  • Page 296 Changing the Browser Settings........................239 Preventing Setting Changes Using the Browser..................241 Checking the Usage Status of the Browser Functions................242 Troubleshooting............................242 Managing Device Information........................244 Exporting Device Information........................245 Importing Device Information........................246 Troubleshooting............................247 Managing Eco-friendly Counter........................250 Configuring the Display of Eco-friendly Counters..................250 Clearing a Machine's Eco-friendly Counter....................251 Clearing Users’...
  • Page 297 If the Machine Cannot Be Operated......................285 9. List of Operation Privileges for Settings How to Read..............................291 System Settings...............................292 Edit Home...............................302 Copier / Document Server Features......................303 Facsimile Features............................310 Printer Functions.............................313 Printer Features...............................314 Scanner Features............................318 Browser Features............................320 Extended Feature Settings..........................321 Maintenance..............................322 Web Image Monitor: Display Eco-friendly Counter...................323 Web Image Monitor: Job..........................324 Web Image Monitor: Device Settings......................326 Web Image Monitor: Printer.........................336...
  • Page 298 Web Image Monitor: Printer: Print Jobs.......................363 List of Operation Privileges for Stored Files....................364 List of Operation Privileges for Address Books....................366 Trademarks..............................370 INDEX ................................373...
  • Page 299: Functions That Require Options

    Functions That Require Options The following functions require certain options and additional functions. • Detect Data Security for Copying Copy Data Security Unit • Viewing Web pages on the display (Browser function) Browser unit For details about other functions that require options, see "Functions Requiring Optional Configurations", Getting Started.
  • Page 300: Main Software Names

    Main Software Names Product name Names in the text DeskTopBinder Lite and DeskTopBinder DeskTopBinder Professional ScanRouter EX Professional and ScanRouter the ScanRouter delivery software EX Enterprise *1 This product is no longer sold.
  • Page 301: Getting Started

    1. Getting Started This chapter describes the precautions to take when using the machine's security features and how to configure the administrator settings. Before Configuring the Security Function Settings • If the security settings are not configured, the data in the machine is vulnerable to attack. •...
  • Page 302: Before Using This Machine

    1. Getting Started Before Using This Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want a high level of security, make the following setting before using the machine. Turn the machine on. For details about turning on the main power, see "Turning On/Off the Power", Getting Started.
  • Page 303: Administrators And Users

    Administrators and Users Administrators and Users This section explains the terms "administrator", "supervisor", "user", and "owner" as used in this manual. Administrator There are four types of administrators for the machine: user administrator, machine administrator, network administrator, and file administrator. Their main role is to specify the settings for operating the machine.
  • Page 304: Administrators

    1. Getting Started Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator and enable the authentication function before using the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 305: Configuring Administrator Authentication

    Configuring Administrator Authentication Configuring Administrator Authentication Administrator authentication requires the login user name and password for verifying administrators attempting to specify the machine's settings or access them from a network. When registering an administrator, you cannot use a login user name already registered in the Address Book. Administrators are handled differently from the users registered in the Address Book.
  • Page 306: Specifying Administrator Privileges

    1. Getting Started Users registered in the Address Book can also change and delete their own information. If any of the users forget their password, the user administrator can delete it and create a new one, allowing the user to access the machine again. 2.
  • Page 307 Configuring Administrator Authentication Press [System Settings]. Press [Administrator Tools]. Press [ Next]. Press [Administrator Authentication Management]. Press [User Management], [Machine Management], [Network Management], or [File Management] to select which settings to manage. Set "Admin. Authentication" to [On]. "Available Settings" appears. Select the settings to manage from "Available Settings".
  • Page 308: Registering And Changing Administrators

    1. Getting Started To specify administrator authentication for more than one category, repeat Steps 6 to 8. Press [OK]. Press the [User Tools/Counter] key. Registering and Changing Administrators If administrator authentication has been specified, we recommend only one person take each administrator role.
  • Page 309 Configuring Administrator Authentication In the line for the administrator whose privilege you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. When allocating administrators' privileges to one person each, select one administrator under each category as shown below.
  • Page 310: Using Web Image Monitor To Configure Administrator Authentication

    1. Getting Started Re-enter the encryption password for confirmation, and then press [OK]. Press [OK] twice. You will be automatically logged out. • For the characters that can be used for login user names and passwords, see page 20 "Usable characters for user names and passwords".
  • Page 311 Configuring Administrator Authentication Click [Administrator Authentication Management] or [Program/Change Administrator] under "Device Settings". Change the settings as desired. Log out. • For details about Web Image Monitor, see Web Image Monitor Help.
  • Page 312: Administrator Login Method

    1. Getting Started Administrator Login Method If administrator authentication has been specified, log in using an administrator's user name and password. Supervisors log in the same way. Logging in Using the Control Panel Press the [User Tools/Counter] key. Press the [Login/Logout] key. CJS040 The login screen appears.
  • Page 313: Logging In Using Web Image Monitor

    Administrator Login Method Enter the login user name, and then press [OK]. The default login name for administrators is "admin" and "supervisor" for supervisors. Enter the login password, and then press [OK]. There is no preset default password for administrators or supervisors. Therefore, leave the password field blank and press [OK].
  • Page 314: Administrator Logout Method

    1. Getting Started Administrator Logout Method If administrator authentication has been specified, be sure to log out after completing settings. Supervisors log out in the same way. Logging out Using the Control Panel Press the [Login/Logout] key. Press [Yes]. • You can log out using the following procedures also. •...
  • Page 315: Supervisor

    Supervisor Supervisor The supervisor can delete an administrator's password and specify a new one. If any of the administrators forgets their password or if any of the administrators changes, the supervisor can assign a new password. If you have logged in using the supervisor's user name and password, you cannot use normal functions or specify system settings.
  • Page 316: Changing The Supervisor

    1. Getting Started Press [Change] for the administrator you wish to reset. Press [Change] for "Login Password". Enter the login password, and then press [OK]. Re-enter the login password for confirmation, and then press [OK]. Press [OK] twice. You will be automatically logged out. •...
  • Page 317 Supervisor Press [OK] twice. You will be automatically logged out.
  • Page 318 1. Getting Started...
  • Page 319: Configuring User Authentication

    2. Configuring User Authentication This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication. Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the information in the machine's Address Book, and can only use the functions they are permitted to access by administrators.
  • Page 320: About User Authentication

    2. Configuring User Authentication About User Authentication User authentication is a system requiring the login user name and password for verifying users to operate the machine or access the machine over the network. CJC010 1. User A user performs normal operations on the machine, such as copying and printing. 2.
  • Page 321: Configuring User Authentication

    Configuring User Authentication Configuring User Authentication There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 322 2. Configuring User Authentication Type Details Basic authentication Authentication is performed using the machine's address book. It is necessary to register users in the machine's address book in advance. Authentication can be applied to each user. Windows authentication Authentication is performed using the domain controller of the Windows server on the same network as the machine.
  • Page 323 Configuring User Authentication • From a security perspective, when switching from User Code authentication to another authentication method, we recommend that you delete accounts you are not going to use, or set up a login password. For details about deleting accounts, see "Deleting a Registered Name", Connecting the Machine/ System Settings.
  • Page 324: User Code Authentication

    2. Configuring User Authentication User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Registering a User Code", Connecting the Machine/ System Settings.
  • Page 325 User Code Authentication In "Functions to Restrict", select the functions that you want to restrict. If the function you want to select is not displayed, press [ Next]. The selected functions are subject to User Code authentication. User Code authentication is not applied to the functions not selected.
  • Page 326 2. Configuring User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 327: Basic Authentication

    Basic Authentication Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 328 2. Configuring User Authentication In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next]. The functions you select here become the default Basic Authentication settings that will be assigned to all new users of the Address Book.
  • Page 329: Authentication Information Stored In The Address Book

    Basic Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 330: Specifying Login User Names And Passwords

    2. Configuring User Authentication User authentication can also be specified via Web Image Monitor. For details, see Web Image Monitor Help. Specifying Login User Names and Passwords In "Address Book Management", specify the login user name and login password to be used for "User Authentication Management".
  • Page 331: Specifying Login Details

    Basic Authentication Press [Exit]. Log out. Specifying Login Details The login user name and password specified in "Address Book Management" can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication". If you do not want to use the login user name and password specified in "Address Book Management" for "SMTP Authentication", "Folder Authentication", or "LDAP Authentication", see "Registering Folders"...
  • Page 332: Windows Authentication

    2. Configuring User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 333 Windows Authentication • Windows Server 2003/2003 R2 • Windows Server 2008/2008 R2 • Windows Server 2012 To use Kerberos authentication under Windows Server 2008, Service Pack 2 or later must be installed. • Transmission between the machine and the KDC server is encrypted if Kerberos authentication is enabled.
  • Page 334: Specifying Windows Authentication

    2. Configuring User Authentication Specifying Windows Authentication Before beginning to configure the machine, make sure that administrator authentication is properly configured under "Administrator Authentication Management". Log in as the machine administrator from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next].
  • Page 335 Windows Authentication Select Kerberos authentication realm and proceed to step 10. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters. For details about registering a realm, see "Programming the Realm", Connecting the Machine/ System Settings.
  • Page 336 2. Configuring User Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 337 Windows Authentication Press [ Next]. Under "Group", press [Program / Change], and then press [* Not Programmed]. Press [Change] for "Group Name", and then enter the group name. Press [OK]. In "Available Functions", select which of the machine's functions you want to permit. If the function you want to select is not displayed, press [ Next].
  • Page 338: Installing Internet Information Services (Iis) And Certificate Services

    2. Configuring User Authentication Installing Internet Information Services (IIS) and Certificate Services Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory. We recommend you install Internet Information Services (IIS) and Certificate services as the Windows components.
  • Page 339 Windows Authentication Installation under Windows Server 2012 On the Start screen, click [Server Manager]. On the [Manage] menu, click [Add Roles and Features]. Click [Next>]. Select [Role-based or feature-based installation], and then click [Next>]. Select a server. Select the "Active Directory Certificate Services" and "Web Server (IIS)" check boxes, and then click [Next>].
  • Page 340: Creating The Server Certificate

    2. Configuring User Authentication Creating the Server Certificate After installing Internet Information Services (IIS) and Certificate services Windows components, create the Server Certificate as follows: Windows Server 2008 R2 is used to illustrate the procedure. On the [Start] menu, point to [Administrative Tools], and then click [Internet Information Services (IIS) Manager].
  • Page 341 Windows Authentication Click [Active Directory Scheme] in the left column, and then open the [Attributes] folder. Right-click [facsimileTelephoneNumber], and then click [Properties]. Select the "Replicate this attribute to the Global Catalog" check box, and then click [Apply]. Click [OK]. On the [File] menu, click [Save]. Specify a file name and a location in which to store the file, and then click [Save].
  • Page 342: Ldap Authentication

    2. Configuring User Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 343 LDAP Authentication • When SSL is being used, TLSv1 or SSLv3 can function on the LDAP server. • The LDAP server must be registered in the machine. • When registering the LDAP server, the following setting must be specified. • Server Name •...
  • Page 344 2. Configuring User Authentication Press [ Next]. Press [User Authentication Management]. Select [LDAP Auth.]. If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication. Select the "Printer Job Authentication" level. For a description of the printer job authentication levels, see page 62 "Printer Job Authentication".
  • Page 345 LDAP Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 346 2. Configuring User Authentication For details about specifying available functions for individuals or groups, see page 78 "Limiting Available Functions". Press [ Next]. Press [Change] for "Login Name Attribute". Enter the login name attribute, and then press [OK]. Use the login name attribute as a search criterion to obtain information about an authenticated user.
  • Page 347: Integration Server Authentication

    Integration Server Authentication Integration Server Authentication For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient. For example, if the delivery server and the machine share the same Integration Server authentication, single sign-on is possible using DeskTopBinder.
  • Page 348 2. Configuring User Authentication Press [Change] for "Server Name". Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IPv4 address or host name. In "Authentication Type", select the authentication system for external authentication. Select an available authentication system.
  • Page 349 Integration Server Authentication If you set "Authentication Type" to [Windows (Native)] or [Windows (NT Compatible)], you can use the global group. If you set "Authentication Type" to [Notes], you can use the Notes group. If you set "Authentication Type" to [Basic (Integration Server)], you can use the groups created using the Authentication Manager.
  • Page 350 2. Configuring User Authentication Select the "Printer Job Authentication" level. If you cannot see this item, press [ Next] to display more settings. For a description of the printer job authentication levels, see page 62 "Printer Job Authentication". If you select [Entire] or [Simple (All)], proceed to step 25. If you select [Simple (Limitation)], proceed to step 22.
  • Page 351 Integration Server Authentication Press [On] for "Use Secure Connection (SSL)", and then press [OK]. To not use secure sockets layer (SSL) for authentication, press [Off]. Press [OK]. Press the [Login/Logout] key. A confirmation message appears. If you press [Yes], you will be automatically logged out.
  • Page 352: Printer Job Authentication

    2. Configuring User Authentication Printer Job Authentication Printer job authentication is a function allowing user authentication to be applied to print jobs. User authentication is supported by the PCL and PostScript3 drivers. The PostScript3 driver supports User Code authentication only. Printer Job Authentication Levels The security level for "Entire"...
  • Page 353 Printer Job Authentication When user authentication is disabled, printing is possible for all job types. Printer job types: A printer job is specified when: 1. The [User Authentication] check box is selected in the PCL printer driver or in the PCL universal driver.
  • Page 354 2. Configuring User Authentication Printer Job Authenticati Simple (All) Simple (All) Simple (All) Entire Entire Entire Driver Encryption Simple Simple Key:Encryp Encryption Encryption tion Strength Printer Job Type 3 Printer Job Type 4 Printer Job Type 5 Printer Job Type 6 Printer Job Type 7 Printer Job...
  • Page 355: Authfree" Command

    Printer Job Authentication "authfree" Command If [Simple (Limitation)] is selected under printer job authentication, the telnet authfree command can be used to specify exceptions to the printer job authentication. The default user name for logging into telnet is "admin". The password is not configured by default. For details about logging into and using telnet, see "Remote Maintenance Using telnet", Connecting the Machine/ System Settings.
  • Page 356: Auto Registration To The Address Book

    2. Configuring User Authentication Auto Registration to the Address Book The personal information of users logging in via Windows, LDAP or Integration Server authentication is automatically registered in the Address Book. Any other information may be specified by copying from other registered users.
  • Page 357 Auto Registration to the Address Book Press [Data Carry-over Setting for Address Book Auto-program]. Press [Carry-over Data]. Use the number keys to enter the registration number of the Address Book to apply the specified setting, and then press [ ]. Press [OK].
  • Page 358: User Lockout Function

    2. Configuring User Authentication User Lockout Function If an incorrect password is entered several times, the User Lockout function prevents further login attempts under the same user name. Even if the locked out user enters the correct password later, authentication will fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor disables the lockout.
  • Page 359: Specifying The User Lockout Function

    User Lockout Function Locked out user Unlocking administrator supervisor machine administrator Specifying the User Lockout Function Log in as the machine administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [User Lockout Policy] under "Security". Set "Lockout"...
  • Page 360: Auto Logout

    2. Configuring User Authentication Auto Logout After you log in, the machine automatically logs you out if you do not use the control panel within a given time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto Logout.
  • Page 361 Auto Logout • If a paper jam occurs or toner runs out, the machine might not be able to perform the Auto Logout function. • You can specify the Auto Logout setting for Web Image Monitor in [Webpage]. For details, see the Web Image Monitor Help.
  • Page 362: Authentication Using An External Device

    2. Configuring User Authentication Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 363: Restricting Machine Usage

    3. Restricting Machine Usage This chapter explains how to restrict use of the machine by the user. Restricting Usage of the Destination List The use of the destination list can be restricted separately under the scanner and fax functions. Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) You can prohibit the sending of faxes and scanned documents to addresses other than those registered in the Address Book.
  • Page 364 3. Restricting Machine Usage If you set "Restrict Use of Destinations (Fax)" to [On], "Restrict Adding of User Destinations (Fax)" will not appear. Similarly, if you set "Restrict Use of Destinations (Scanner)" to [On], "Restrict Adding of User Destinations (Scanner)" will not appear. Press [OK].
  • Page 365: Preventing Changes To Administrator Settings

    Preventing Changes to Administrator Settings Preventing Changes to Administrator Settings Limiting the Settings that Can Be Changed by Each Administrator The settings that can be made for this machine vary depending on the type of administrator, allowing the range of operations that can be made to be divided among the administrators. The following administrators are defined for this machine.
  • Page 366: Specifying Menu Protect

    3. Restricting Machine Usage Specifying Menu Protect Menu Protect allows you to limit user permission to access the settings in the User Tools menu except for the System Settings. This setting can be used regardless of user authentication. To change the menu protect setting, first enable administrator authentication.
  • Page 367: Scanner Function

    Specifying Menu Protect Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out. Scanner Function Log in as the machine administrator from the control panel. Press [Scanner Features]. Press [Initial Settings]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Log out.
  • Page 368: Limiting Available Functions

    3. Restricting Machine Usage Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Specify the functions available to registered users. By making this setting, you can limit the functions available to users.
  • Page 369 Limiting Available Functions In "Available Functions", select the functions you want to specify. If the function you want to select is not displayed, press [ Next]. Press [OK]. Log out.
  • Page 370: Restricting Media Slot Access

    3. Restricting Machine Usage Restricting Media Slot Access Specify on the control panel whether or not to allow users to use the media slots. With this setting, you can restrict storing scanned files on a removable memory device, and also restrict printing of files stored on a removable memory device.
  • Page 371: Managing Print Volume Per User

    Managing Print Volume per User Managing Print Volume per User This function limits how much each user can print. If users reach their maximum print volume, their print jobs are canceled and/or a message indicating so is displayed. Print volume The print volume is calculated by multiplying the number of pages by a unit count.
  • Page 372: Specifying Limitations For Print Volume

    3. Restricting Machine Usage • The login user name or user code registered in the Address Book is changed while the user is logged in and authenticated. If the following occurs, print volume management will not function correctly: • Under Windows or LDAP authentication, a user logs in to the same user account by using multiple login user names, and these multiple login names are registered in the Address Book as separate users.
  • Page 373 Managing Print Volume per User Press [Print Volume Use Limitation: Unit Count Setting]. For each print condition, use the number keys to enter a per-page unit count between "0" and "200", and then press [ ]. If you specify "0" for a print condition, no volume restriction is applied to jobs matching that condition.
  • Page 374: Specifying The Default Maximum Use Count

    3. Restricting Machine Usage Under User Code authentication, users cannot check the print volume they have made, using either the control panel or Web Image Monitor. Under User Code authentication, administrators can inform users of the print volume they have made. •...
  • Page 375 Managing Print Volume per User Select the user whose maximum available print volume you want to specify. Press [Auth. Info]. Press [ Next] four times. Press [Limit] in "Print Volum. Use Limit.". "Print Volum. Use Limit." does not appear if you have selected [Allow Continue Use] in "Machine action when limit is reached".
  • Page 376: Checking Print Volume Per User

    3. Restricting Machine Usage Press [OK]. Log out. • The maximum print volume for an individual user can also be specified in [Address Book] in Web Image Monitor. • You can search for users by entering a name in the text box at the top of the control panel, and then pressing [Search].
  • Page 377: Printing A List Of Print Volume Use Counters

    Managing Print Volume per User • Authorized users and the user administrator can also use [Address Book] in Web Image Monitor to check users' print volume use counters. Printing a List of Print Volume Use Counters Log in as the machine administrator from the control panel. Press [System Settings].
  • Page 378: Clearing Print Volume Use Counters

    3. Restricting Machine Usage Select the counter you want to print in the list, and then press [Print]. Log out. • Print volume use counter lists can be printed only if the following paper sizes is loaded in the paper tray: A4, 8 ×...
  • Page 379: Configuring The Auto-Reset Function

    Managing Print Volume per User To clear the print volume use counters of every user, press [Clear] under "All Users". To clear the print volume use counters of selected users only, select the users whose counters you want to clear, and then press [Clear] under "Per User". To select all the users displayed on the page, press [Select All on the Page].
  • Page 380 3. Restricting Machine Usage Log in as the machine administrator from the control panel. Press [System Settings]. Press [Administrator Tools]. Press [ Next] four times. Press [Volume Use Counter: Scheduled/Specified Reset Settings]. Select one of [Every Month], [Specify Date] and [Specify Cycle]. Configure the conditions.
  • Page 381: Preventing Leakage Of Information From Machines

    4. Preventing Leakage of Information from Machines This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk. Protecting the Address Book You can specify who is allowed to access the data in the Address Book. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
  • Page 382 4. Preventing Leakage of Information from Machines Press [Program/Change/Delete] for "Permissions for Users / Groups", under "Protect Destination". Press [New Program]. Select the users or groups to which to apply the access permission. You can select more than one user. By pressing [All Users], you can select all the users.
  • Page 383: Encrypting Data In The Address Book

    Protecting the Address Book Encrypting Data in the Address Book • The machine cannot be used during encryption. The time it takes to encrypt the data in the Address Book depends on the number of registered users. Encrypting the data in the Address Book may take a long time. Log in as the user administrator from the control panel.
  • Page 384 4. Preventing Leakage of Information from Machines If you press [Stop] during decryption, the data stays encrypted. Normally, once encryption is complete, "Encryption / Decryption is successfully complete. Press [Exit]." appears. Press [Exit]. Press [OK]. Log out. • If you register additional users after encrypting the data in the Address Book, those users are also encrypted.
  • Page 385: Encrypting Data On The Hard Disk

    Encrypting Data on the Hard Disk Encrypting Data on the Hard Disk • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. Prevent information leakage by encrypting the Address Book, authentication information, and stored documents as the data is written.
  • Page 386 4. Preventing Leakage of Information from Machines Setting Data to be kept Data to be initialized Required time File System Data • Embedded Software • Stored documents Approx. 1 hour Only Architecture (stored documents in 30 minutes applications' Document Server, program/log Locked Print files / Sample Print files /...
  • Page 387: Enabling The Encryption Settings

    Encrypting Data on the Hard Disk Enabling the Encryption Settings • The machine cannot be operated while data is being encrypted. • Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power is not turned off while the encryption process is in progress. If the machine's main power is turned off while the encryption process is in progress, the hard disk will be damaged and all data on it will be unusable.
  • Page 388 4. Preventing Leakage of Information from Machines Press [Machine Data Encryption Settings]. Press [Encrypt]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 389: Backing Up The Encryption Key

    Encrypting Data on the Hard Disk Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 390: Updating The Encryption Key

    4. Preventing Leakage of Information from Machines Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally. • The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption key safely for retrieving backup data.
  • Page 391: Canceling Data Encryption

    Encrypting Data on the Hard Disk Press [OK]. Press [Exit]. Press [Exit]. Log out. Turn off the main power switch, and then turn the main power switch back on. The machine will start to convert the data on the memory after you turn on the machine. Wait until the message "Memory conversion complete.
  • Page 392: Deleting Data On The Hard Disk

    4. Preventing Leakage of Information from Machines Deleting Data on the Hard Disk The machine's hard disk stores all document data from the copier, printer and scanner functions. It also stores the data of users' Document Server and code counters, and the Address Book. To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data stored on the hard disk.
  • Page 393 Deleting Data on the Hard Disk Overwrite icon When Auto Erase Memory is set to [On], the Data Overwrite icon will be indicated in the bottom right hand corner of the panel display of your machine. Icon Icon name Explanation This icon is lit when there is temporary data to be overwritten, Dirty and blinks during overwriting.
  • Page 394 4. Preventing Leakage of Information from Machines Temporary data is overwritten multiple times with random numbers. The number of overwrites can be selected from 1 to 9. • The default method for overwriting is "Random Numbers", and the default number of overwrites is •...
  • Page 395 Deleting Data on the Hard Disk Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ].
  • Page 396: Erase All Memory

    4. Preventing Leakage of Information from Machines • Spool printing jobs Facsimile • LAN-Fax print data • Faxes sent/received using remote machines Data sent or received directly by this machine via facsimile, as well as fax numbers, will not be overwritten by Auto Erase Memory.
  • Page 397 Deleting Data on the Hard Disk • Applications using Embedded Software Architecture • SSL server certificates • Machine's network settings • If the main power switch is turned off before "Erase All Memory" is completed, overwriting will be stopped and data will be left on the hard disk. •...
  • Page 398 4. Preventing Leakage of Information from Machines If you select [Random Numbers], proceed to step 8. Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [ ]. Press [Erase]. Press [Yes]. When overwriting is completed, press [Exit], and then turn off the main power.
  • Page 399: Enhanced Network Security

    5. Enhanced Network Security This chapter describes the functions for enhancing security when the machine is connected to the network. Access Control The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
  • Page 400: Enabling And Disabling Protocols

    5. Enhanced Network Security Enabling and Disabling Protocols Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network. Network settings can be specified on the control panel or by using Web Image Monitor, telnet, SmartDeviceMonitor for Admin/Device Manager NX Lite or Remote Communication Gate S.
  • Page 401 Enabling and Disabling Protocols Protocol Port Setting method When disabled TCP:21 • Web Image Monitor Functions that require FTP cannot be used. • telnet You can restrict personal information • SmartDeviceMonitor from being displayed by making for Admin settings on the control panel using •...
  • Page 402 5. Enhanced Network Security Protocol Port Setting method When disabled HTTP TCP:80 • Web Image Monitor Functions that require HTTP cannot be used. • telnet Cannot print using IPP on port 80. • SmartDeviceMonitor for Admin • Device Manager NX Lite HTTPS TCP:443...
  • Page 403 Enabling and Disabling Protocols Protocol Port Setting method When disabled SNMPv3 UDP:161 • Web Image Monitor Functions that require SNMPv3 cannot be used. • telnet You can also make settings to require • SmartDeviceMonitor SNMPv3 encrypted transmission and for Admin restrict the use of other transmission •...
  • Page 404 5. Enhanced Network Security Protocol Port Setting method When disabled IP-Fax TCP:1720 (H. • Control panel IP-Fax connecting functions using H. 323) 323, SIP and T.38 cannot be used. • Web Image Monitor UDP:1719 • SmartDeviceMonitor (Gatekeeper) for Admin TCP/UDP: •...
  • Page 405 Enabling and Disabling Protocols Protocol Port Setting method When disabled DIPRINT TCP:9100 • Web Image Monitor DIPRINT functions cannot be used. • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP:10021 • Control panel You can attempt to update firmware via FTP.
  • Page 406 5. Enhanced Network Security Protocol Port Setting method When disabled WSD (Printer) TCP:53001 • Web Image Monitor WSD (Printer) functions cannot be used. (variable) • telnet • SmartDeviceMonitor for Admin • Device Manager NX Lite • Remote Communication Gate S TCP-53002 •...
  • Page 407: Enabling And Disabling Protocols Using The Control Panel

    Enabling and Disabling Protocols Enabling and Disabling Protocols Using the Control Panel Log in as the network administrator from the control panel. Press [System Settings]. Press [Interface Settings]. Press [Effective Protocol]. Set the desired protocols to active/inactive. Press [OK]. Log out. Enabling and Disabling Protocols Using Web Image Monitor Log in as the network administrator from Web Image Monitor.
  • Page 408 5. Enhanced Network Security "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If the previous screen does not reappear after you click [OK], wait for a while, and then click the web browser's refresh button. Log out.
  • Page 409: Specifying Network Security Level

    Specifying Network Security Level Specifying Network Security Level This setting lets you change the security level to limit unauthorized access. You can make network security level settings on the control panel, as well as Web Image Monitor. However, the protocols that can be specified differ.
  • Page 410: Specifying Network Security Level Using Web Image Monitor

    5. Enhanced Network Security Press [Network Security Level]. Select the network security level. Select [Level 0], [Level 1], [Level 2], or [FIPS140]. Press [OK]. Log out. Specifying Network Security Level Using Web Image Monitor Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration].
  • Page 411 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 IPP > Port 631 Open Open Close Close SSL/TLS > Port 443 Open Open Open Open SSL/TLS > Permit SSL/TLS Ciphertext Ciphertext Ciphertext Ciphertext Communication Priority Priority Only Only SSL/TLS Version >...
  • Page 412 5. Enhanced Network Security Function Level 0 Level 1 FIPS 140 Level 2 WSD (Scanner)/DSM Active Active Active Active WSD (Encrypted Communication of Inactive Inactive Active Active Device) RHPP Active Active Inactive Inactive The same settings are applied to IPv4 and IPv6. TCP/IP setting is not governed by the security level.
  • Page 413 Specifying Network Security Level Function Level 0 Level 1 FIPS 140 Level 2 S/MIME > Encryption 3DES-168 bit 3DES-168 bit 3DES-168 bit AES-256 bit Algorithm S/MIME > Digest SHA1 SHA1 SHA1 SHA-256 bit Algorithm SNMPv3 > SHA1 SHA1 SHA1 Authentication Algorithm SNMPv3 >...
  • Page 414: Protecting The Communication Path Via A Device Certificate

    5. Enhanced Network Security Protecting the Communication Path via a Device Certificate This machine can protect its communication path and establish encrypted communications using SSL/ TLS, IPsec, S/MIME, or IEEE 802.1X. It can also protect PDFs by means of a PDF or PDF/A digital signature.
  • Page 415: Creating And Installing A Device Certificate From Web Image Monitor (Self-Signed Certificate)

    Protecting the Communication Path via a Device Certificate Press [Program / Delete Device Certificate]. Check that [Program] is selected. Press [Certificate 1]. Only [Certificate 1] can be created from the control panel. Make the necessary settings. To use the device certificate for S/MIME, PDF Digital Signature, or PDF/A Digital Signature, enter the machine's administrator’s e-mail address in the e-mail address setting.
  • Page 416: Creating The Device Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Check the radio button next to the number of the certificate you want to create. To use SSL/TLS, select [Certificate 1]. To use any other protocol, select the certificate number desired. Click [Create]. Click [Delete] to delete the device certificate from the machine. Make the necessary settings.
  • Page 417: Installing The Device Certificate (Issued By A Certificate Authority)

    Protecting the Communication Path via a Device Certificate Apply to the certificate authority for the device certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority. For the application, click Web Image Monitor Details icon and use the information that appears in "Certificate Details".
  • Page 418: Installing An Intermediate Certificate (Issued By A Certificate Authority)

    5. Enhanced Network Security Installing an Intermediate Certificate (Issued by a Certificate Authority) This section explains how to use Web Image Monitor to install an intermediate certificate issued by a certificate authority. If you do not have the intermediate certificate issued by the certificate authority, a warning message will appear during communication.
  • Page 419: Configuring Ssl/Tls

    Configuring SSL/TLS Configuring SSL/TLS Configuring the machine to use SSL/TLS enables encrypted communication. Doing so helps prevent data from being intercepted, cracked or tampered with during transmission. Flow of SSL/TLS encrypted communications 1. To access the machine from a user's computer, request the SSL/TLS device certificate and public key.
  • Page 420: Enabling Ssl/Tls

    5. Enhanced Network Security Create and install a device certificate from the control panel or Web Image Monitor. 2. Enabling SSL/TLS Enable the SSL/TLS setting using Web Image Monitor. Configuration flow when using an authority issued certificate 1. Creating a device certificate and applying to the authority After creating a device certificate on Web Image Monitor, apply to the certificate authority.
  • Page 421: User Setting For Ssl/Tls

    Configuring SSL/TLS Under "Encryption Strength Setting", specify the strength of encryption to be applied for "AES", "3DES", and/or "RC4". You must select at least one check box. Note that the availability of encryption strengths will vary depending on the settings you have specified for "TLS1.2", "TLS1.1", "TLS1.0", or "SSL3.0".
  • Page 422: Setting The Ssl/Tls Encryption Mode

    5. Enhanced Network Security • If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store location with the certificate authority. • To change the host name or IP address in [Common Name] of the device certificate when using the operating system's standard IPP port under Windows Vista/7/8 or Windows Server 2008/2008 R2/2012, delete any previously configured PC printer beforehand and re-install it after changing [Common Name].
  • Page 423: Enabling Ssl For Smtp Connections

    Configuring SSL/TLS Press [Permit SSL / TLS Communication]. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Cleartext] as the encrypted communication mode. Press [OK]. Log out. • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 424 5. Enhanced Network Security In "Use Secure Connection (SSL)", press [On]. If you are not using SSL for SMTP connections, press [Off]. When "Use Secure Connection (SSL)" is set to [On], the port number is changed to 465. Press [OK]. Log out.
  • Page 425: Configuring S/Mime

    Configuring S/MIME Configuring S/MIME By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 426 5. Enhanced Network Security 2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the certificate is specified in the Address Book.) 3. Specify the encryption algorithm using Web Image Monitor. 4. Using the shared key, encrypt the e-mail message. 5.
  • Page 427: Attaching An Electronic Signature

    Configuring S/MIME Specifying the encryption algorithm Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [S/MIME] under "Security". Select the encryption algorithm from the drop-down menu next to "Encryption Algorithm" under "Encryption".
  • Page 428 5. Enhanced Network Security 3. Make settings for the electronic signature using Web Image Monitor. Configuration flow (certificate issued by a certificate authority) 1. Create the device certificate using Web Image Monitor. The application procedure for a created certificate depends on the certificate authority. Follow the procedure specified by the certificate authority.
  • Page 429: Specifying Checking Of The Certificate Valid Period

    Configuring S/MIME Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm" under "Signature". Select the method for attaching the electronic signature when sending e-mail from the scanner next to "When Sending Email by Scanner" under "Signature". Select the method for attaching the electronic signature when forwarding received fax messages next to "When Transferring by Fax"...
  • Page 430 5. Enhanced Network Security Operation mode Description Performance Priority Performing (b) and (c) are omitted. If it takes a long time to verify the validity period when the address is selected or when the [Start] key is pressed, the time taken can be shortened by selecting "Performance Priority".
  • Page 431: Configuring Pdfs With Electronic Signatures

    Configuring PDFs with Electronic Signatures Configuring PDFs with Electronic Signatures This machine can create PDFs with electronic signatures. PDFs with electronic signatures certify the creator of the PDF document and the date and time of creation. Tampering is also prevented as documents that have been tampered with can be detected.
  • Page 432: Configuring Ipsec

    5. Enhanced Network Security Configuring IPsec For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine uses automatic key exchange to configure the pre-shared key for both parties. Using the auto exchange setting, you can renew the shared key exchange settings within a specified validity period, and achieve higher transmission security.
  • Page 433: Encryption Key Auto Exchange Settings

    Configuring IPsec • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 434: Ipsec Settings

    5. Enhanced Network Security When IPsec is enabled, set 1 has the highest priority and 4 has the lowest. You can use this priority system to target IP addresses more securely. For example, set the broadest IP range at the lowest priority (4), and then set specific IP addresses at a higher priority level (3 and higher).
  • Page 435 Configuring IPsec Security level Security level features Select this level if you want to encrypt the data packets as well as authenticate the transmission partner and prevent Authentication and Low Level unauthorized packet tampering. Packet encryption helps Encryption prevent eavesdropping attacks. This level provides less security than "Authentication and High Level Encryption".
  • Page 436 5. Enhanced Network Security Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption HMAC-SHA1-96/ HMAC-SHA1-96/ HMAC- HMAC- Phase 2 SHA256-128/ HMAC-SHA256-128/ SHA256-128/ Authentication HMAC- HMAC-SHA384-192/ HMAC- Algorithm SHA384-192/ HMAC-SHA512-256 SHA384-192/ HMAC- HMAC-SHA512-256 SHA512-256 Phase 2 Encryption Cleartext (NULL 3DES/AES-128/ AES-128/AES-192/...
  • Page 437 Configuring IPsec Setting Description Setting value The IPsec transmission partner's IPv4 or IPv6 address. Specify the address of the IPsec transmission partner. If you are not setting an Remote Address You can also specify an address range, enter 32 after address range.
  • Page 438 5. Enhanced Network Security Setting Description Setting value • PSK • Certificate If you specify "PSK", you must then set the PSK text (using Specify the method for ASCII characters). authenticating transmission If you are using "PSK", specify Authentication Method partners.
  • Page 439 Configuring IPsec Setting Description Setting value Specify the security protocol to be used in Phase 2. To apply both encryption and • ESP Phase 2 authentication to sent data, • AH specify "ESP" or "ESP+AH". Security Protocol • ESP+AH To apply authentication data only, specify "AH".
  • Page 440: Encryption Key Auto Exchange Settings Configuration Flow

    5. Enhanced Network Security Encryption Key Auto Exchange Settings Configuration Flow <Machine> <PC> Set the Security Level on Set the same items on the Web Image Monitor machine Install the device certificate Install the device certificate only when using certificates only when using certificates Activate IPsec settings Activate IPsec settings...
  • Page 441 Configuring IPsec Make encryption key auto exchange settings in [Settings 1]. If you want to make multiple settings, select the settings number and add settings. Click [OK]. Select [Active] for "IPsec" in "IPsec". Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS transmission.
  • Page 442 5. Enhanced Network Security On the [Start] menu, click [Control Panel], click [System and Security], and then click [Administrative Tools]. Under Windows 8, hover the mouse pointer over the top- or bottom-right corner of the screen, and then click [Settings], [Control Panel], [System and Security], and then [Administrative Tools]. If you are using Windows XP, on the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then click [Administrative Tools].
  • Page 443 Configuring IPsec In [Name], enter an IP Filter name, and then click [Add]. The IP Filter Wizard appears. Click [Next]. If required, enter a description of the IP filter, and then click [Next]. For Windows XP, go to Step 22. Select "My IP Address"...
  • Page 444: Telnet Setting Commands

    5. Enhanced Network Security Select the filter action that was just created, and then click [Next]. If you set "Encryption Key Auto Exchange Settings" to "Authentication and High Level Encryption", select the IP filter action that was just created, click [Edit], and then check "Use session key perfect forward secrecy (PFS)"...
  • Page 445 Configuring IPsec Displays the following IPsec settings information: • IPsec settings values • Encryption key auto exchange settings, IKE setting 1-4 values • Encryption key auto exchange settings, IKE default setting values Display current settings portions msh> ipsec -p • Displays IPsec settings information in portions. ipsec exclude To display or specify protocols excluded by IPsec, use the "ipsec exclude"...
  • Page 446 5. Enhanced Network Security • To set the local or remote address values, specify masklen by entering [/] and an integer 0-32 when settings an IPv4 address. When setting an IPv6 address, specify masklen by entering [/] and an integer 0-128. •...
  • Page 447 Configuring IPsec Tunnel end point setting msh> ipsec ike {1|2|3|4|default} tunneladdr "beginning IP address" "ending IP address" • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address. • Not specifying either the beginning or ending address displays the current setting. IKE partner authentication method setting msh>...
  • Page 448 5. Enhanced Network Security ISAKMP SA (phase 1) validity period setting msh> ipsec ike {1|2|3|4|default} ph1 lifetime "validity period" • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity period. • Enter the validity period (in seconds) from 300 to 172800. •...
  • Page 449 Configuring IPsec Reset setting values msh> ipsec ike {1|2|3|4|default|all} clear • Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying [all] resets all of the settings, including default.
  • Page 450: Configuring Ieee 802.1X Authentication

    5. Enhanced Network Security Configuring IEEE 802.1X Authentication IEEE 802.1X is an authentication function that can be used with both wired and wireless networks. Authentication is performed by the authentication server (RADIUS server). You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures.
  • Page 451: Selecting The Device Certificate

    Configuring IEEE 802.1X Authentication Selecting the Device Certificate Select the certificate to use under IEEE 802.1X from among the device certificates created and installed in advance on the machine. For details about creating and installing a device certificate, see page 124 "Protecting the Communication Path via a Device Certificate".
  • Page 452 5. Enhanced Network Security • Click [Change] in "Phase 2 User Name", and then enter the user name set in the RADIUS server. • Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in "Phase 2 Method". Certain methods might not be available, depending on the RADIUS server you want to use. •...
  • Page 453: Setting Items Of Ieee 802.1X For Wireless Lan

    Configuring IEEE 802.1X Authentication • If there is a problem with settings, you might not be able to communicate with the machine. In such a case, access [Print List] in [Interface Settings] on the control panel, and then print the network summary to check the status.
  • Page 454 5. Enhanced Network Security PEAP • Click [Change] in "Password", and then enter the password set in the RADIUS server. If [TLS] is selected for "Phase 2 Method", you do not need to specify a password. • Click [Change] on "Phase 2 User Name", and then enter the user name set in the RADIUS server.
  • Page 455: Snmpv3 Encryption

    SNMPv3 Encryption SNMPv3 Encryption When using SmartDeviceMonitor for Admin/Device Manager NX Lite or another application that communicates via SNMPv3, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Log in as the network administrator from the control panel. Press [System Settings].
  • Page 456: Encrypting Transmitted Passwords

    5. Enhanced Network Security Encrypting Transmitted Passwords Configuring the driver encryption key and password encryption for IPP authentication enables communication with encrypted passwords as well as increasing the security against password cracking. In order to further enhance security, we recommend using IPsec, SNMPv3 and SSL/TLS all together. Also, encrypt the login password for administrator authentication and user authentication.
  • Page 457: Specifying An Ipp Authentication Password

    Encrypting Transmitted Passwords Press [Extended Security]. For "Driver Encryption Key", press [Change]. Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers.
  • Page 458 5. Enhanced Network Security Log in as the network administrator from Web Image Monitor. Point to [Device Management], and then click [Configuration]. Click [IPP Authentication] under "Security". Select [DIGEST] from the "Authentication" list. Enter the user name in the "User Name" box. Enter the password in the "Password"...
  • Page 459: Kerberos Authentication Encryption Setting

    Kerberos Authentication Encryption Setting Kerberos Authentication Encryption Setting You can specify encrypted transmission between the machine and the key distribution center (KDC) server when Kerberos authentication is enabled. Using Kerberos authentication with Windows or LDAP authentication, LDAP search, etc., ensures safe communication.
  • Page 460 5. Enhanced Network Security Log out.
  • Page 461: Preventing The Leaking Of Documents

    6. Preventing the Leaking of Documents This chapter explains how to protect document data stored in the machine or printed using the machine. Managing Folders This section explains how to manage the folders in Document Server: how to delete folders, change their passwords, and unlock them when locked.
  • Page 462: Changing The Password Of A Folder

    6. Preventing the Leaking of Documents Press [Edit Folder]. Select the folder. Press [Delete]. If a password entry screen appears, enter the password of the folder, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Delete].
  • Page 463: Unlocking Folders

    Managing Folders Press [Edit Folder]. Select the folder. Press [Change Password]. If a password entry screen appears, enter the password of the folder, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Enter the new password for the folder, and then press [OK].
  • Page 464 6. Preventing the Leaking of Documents Press [Edit Folder]. Select the folder. icon appears next to a folder locked by the Enhance File Protection function. Press [Unlock]. icon changes to the icon. Press [Unlock]. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 465: Managing Stored Files

    Managing Stored Files Managing Stored Files This section describes how to specify access permissions for stored files. You can specify who is allowed to access stored scan files and files stored in Document Server. This can prevent activities such as printing or sending of stored files by unauthorized users. You can also specify which users can change or delete stored files.
  • Page 466: Configuring Access Permission For Each Stored File

    6. Preventing the Leaking of Documents Configuring Access Permission for Each Stored File This can be specified by the file administrator or owner. Specify the users and their access permissions for each stored file. • If files become inaccessible, reset their access permission as the owner. This can also be done by the file administrator.
  • Page 467 Managing Stored Files Select the file. Press [Change File Info.]. Press [Change Access Priv.]. Press [Program/Change/Delete]. Press [New Program].
  • Page 468: Changing The Owner Of A Document

    6. Preventing the Leaking of Documents Select the users or groups to whom you want to assign access permission. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit]. Select the user to whom you want to assign access permission, and then select the permission.
  • Page 469: Configuring Access Permission For Each User For Stored Files

    Managing Stored Files Only the file administrator can change the owner of a document. Log in as the file administrator from the control panel. Press the [User Tools/Counter] key to close the User Tools menu. If the message "You do not have the privileges to use this function." appears, press [Exit]. Press the [Home] key on the control panel, and press the [Document Server] icon on the [Home] screen.
  • Page 470 6. Preventing the Leaking of Documents Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users / Groups". Press [New Program]. Select the users or groups to register. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 471: Specifying Passwords For Stored Files

    Managing Stored Files Specifying Passwords for Stored Files This can be specified by the file administrator or owner. The file administrator or the owner logs in from the control panel. Press the [User Tools/Counter] key to close the User Tools menu. If the message "You do not have the privileges to use this function."...
  • Page 472: Unlocking Stored Files

    6. Preventing the Leaking of Documents Press [Change File Info.]. Press [Change Password]. Enter the new password for the stored file, and then press [OK]. You can use 4 to 8 numbers as the password for the stored file. Re-enter the password for confirmation, and then press [OK]. icon appears next to a stored file protected by password.
  • Page 473 Managing Stored Files Press [Change File Info.]. Press [Unlock Files]. Press [Yes]. icon changes to the icon. Press [OK]. Log out.
  • Page 474: Managing Locked Print Files

    6. Preventing the Leaking of Documents Managing Locked Print Files Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function.
  • Page 475 Managing Locked Print Files Press [Locked Print Job]. Select the file. Press [Delete]. If a password entry screen appears, enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes].
  • Page 476: Changing The Password Of A Locked Print File

    6. Preventing the Leaking of Documents • You can configure this machine to delete stored files automatically by setting the "Auto Delete Temporary Print Jobs" option to [On]. For details about "Auto Delete Temporary Print Jobs", see "Data Management", Print. •...
  • Page 477: Unlocking A Locked Print File

    Managing Locked Print Files If a password entry screen appears, enter the password for the stored file, and then press [OK]. The password entry screen will not appear if the file administrator is logged in. Enter the new password for the stored file, and then press [OK]. Re-enter the password for confirmation, and then press [OK].
  • Page 478 6. Preventing the Leaking of Documents Press [Yes]. icon disappears. Log out. • This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.
  • Page 479: Unauthorized Copy Prevention / Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Unauthorized Copy Prevention / Data Security for Copying The copier, Document Server, and printer functions let you embed a pattern in a printed copy to discourage or prevent unauthorized copying. If the Unauthorized Copy Prevention function is enabled, embedded text patterns (for instance, a warning message such as "No Copying") are displayed when documents are copied illegally.
  • Page 480: Enabling Pattern Printing

    6. Preventing the Leaking of Documents Enabling Pattern Printing You can enable embedded pattern printing to discourage or prevent unauthorized copying. Enabling embedded pattern printing in the Copier/Document Server functions Log in as the machine administrator from the control panel. Press [System Settings].
  • Page 481: Enabling Detect Data Security For Copying

    Unauthorized Copy Prevention / Data Security for Copying Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Unauthorized Copy Prevention Printing: Printer]. Press [Change] for "Unauthorized Copy Prevention Setting". Press [On], and then press [OK]. Press [Change] for "Compulsory Unauthorized Copy Prevention". Specify whether or not to make printing of the embedded pattern mandatory.
  • Page 482 6. Preventing the Leaking of Documents Press [System Settings]. Press [Administrator Tools]. Press [ Next] three times. Press [Detect Data Security for Copying]. Press [On]. If you do not want to specify "Detect Data Security for Copying", select [Off]. Press [OK]. Log out.
  • Page 483: Printing User Information On Paper

    Printing User Information on Paper Printing User Information on Paper The start time of the print job, information on the person who prints it (name or login user name), machine number and machine's IP address can be compulsorily embedded on printed sheets. This function is called Compulsory Security Stamp.
  • Page 484 6. Preventing the Leaking of Documents • Machine ID The numbers displayed as the "Serial No. of Machine" in [Inquiry] will be printed. • Machine IP Address The machine's IP address will be printed. If there are both IPv4 and IPv6 addresses, the IPv4 address will be printed.
  • Page 485: Enforced Storage Of Documents To Be Printed On A Printer

    Enforced Storage of Documents to be Printed on a Printer Enforced Storage of Documents to be Printed on a Printer By making it compulsory to keep jobs in the machine before printing them, you can prevent information leakage due to users failing to collect prints or leaving prints unattended. The following print jobs are subject to compulsory storage.
  • Page 486 6. Preventing the Leaking of Documents...
  • Page 487: Managing The Machine

    7. Managing the Machine This chapter describes the functions for enhancing the security of the machine and operating the machine effectively. Managing Log Files Collecting the logs stored in this machine allows you to track detailed data on access to the machine, user identities, usage of the machine's various functions, and error histories.
  • Page 488: Using Web Image Monitor To Manage Log Files

    7. Managing the Machine Using Web Image Monitor to Manage Log Files You can specify the types of log to store in the machine and the log collection level. You can also encrypt, bulk delete, or download log files. Logs That Can Be Managed Using Web Image Monitor The following tables explain the items in the job log and access log that the machine creates when you enable log collection using Web Image Monitor.
  • Page 489 Using Web Image Monitor to Manage Log Files Job Log Item Log Type Attribute Content Scanner: Stored File Scanner: Stored File Details of scan files stored in Document Server Downloading Downloading and downloaded using Web Image Monitor, DeskTopBinder or Desk Top Editor For Production.
  • Page 490 7. Managing the Machine Job Log Item Log Type Attribute Content Printer: Stored File Printer: Stored File Details of Stored Print files printed from the Printing Printing control panel or Web Image Monitor. Printer: Document Printer: Document Details of files stored in Document Server Server Sending Server Sending when "Job Type:"...
  • Page 491 Using Web Image Monitor to Manage Log Files Access log information items Access Log Item Log Type Attribute Content Login Login Times of login and identity of logged in users. Logout Logout Times of logout and identity of logged out users.
  • Page 492 7. Managing the Machine Access Log Item Log Type Attribute Content Firmware: Structure Firmware: Structure Details of checks for changes to firmware module structure made at times such as when the machine was switched on. Machine Data Machine Data Details of changes made to encryption keys Encryption Key Encryption Key using "Machine Data Encryption Key...
  • Page 493 Using Web Image Monitor to Manage Log Files Access Log Item Log Type Attribute Content Counter Clear Result: Counter Clear Result: Log of when the counters for all users are All Users All Users cleared. Import Device Setting Import Device Setting Log of when a device setting information file is Information Information...
  • Page 494: Attributes Of Logs You Can Download

    7. Managing the Machine Attributes of Logs You Can Download If you use Web Image Monitor to download logs, a CSV file containing the information items shown in the following table is produced. Note that a blank field indicates an item is not featured in a log. File output format •...
  • Page 495 Using Web Image Monitor to Manage Log Files Common items (Job log and Access log) Start Date/Time Indicates the start date and time of an operation or event. End Date/Time Indicates the end date and time of an operation or event. Log Type Details of the log type.
  • Page 496 7. Managing the Machine Value Content Completed The operation or event completed successfully on a job log entry. Failed The operation or event was unsuccessful on a job log entry. Succeeded The operation or event completed successfully on an access log entry.
  • Page 497 Using Web Image Monitor to Manage Log Files Value Content Write Error to Remote Machine An error occurred in writing to an output destination. Specified File: Incompatible The specified file is incompatible. Specified File: Format Error A format error occurred with the specified file. Specified File: Not Exist The specified file cannot be found.
  • Page 498 7. Managing the Machine Value Content Exceed Max. Stored File (File The storage capacity of documents on Document Server is Storage) exceeded. Hard Disk Full (File Storage The hard disk capacity on Document Server is exceeded. Memory) Exceeded Max. Email Size The limit to e-mail size is exceeded.
  • Page 499 Using Web Image Monitor to Manage Log Files Value Content Specifying Line Error An error occurred in the line specified. Authentication Failed (Access Device authentication failed. Restricted) Exceeded Print Volume Use The logged in user exceeds their paper usage limit. Limitation No Privilege The user does not have permission to access a document or...
  • Page 500 7. Managing the Machine Value Content Invalid Device/Destination's Both the destination certificate and the device certificate are Certificate invalid. User Entry ID Indicates the user's entry ID. This is a hexadecimal ID that identifies users who performed job or access log-related operations. Value Content 0x00000000...
  • Page 501 Using Web Image Monitor to Manage Log Files Access log information items Access Log Type Indicates the type of access. Value Content Authentication User authentication access Stored File Stored file access System System access Network Attack Detection/ Network attack or encrypted communication access Encrypted Communication Firmware Firmware verification access...
  • Page 502 7. Managing the Machine Value Content Control Panel The login was performed through the control panel. via Network The login was performed remotely through a network computer. Others The login was performed through another method. Login User Type Indicates the type of login user. Value Content User...
  • Page 503 Using Web Image Monitor to Manage Log Files Address Book Operation Mode Indicates the method applied for changing the data registered in the Address Book. Address Book Change Item Indicates which item in the Address Book is changed. Address Book Change Request IP Address Indicates the IP address type (IPv4/IPv6) of the user using the Address Book.
  • Page 504 7. Managing the Machine Value Content Program (Copier) Program (Copier) Program (Scanner) Program (Scanner) Program (Document Server) Program (Document Server) Browser Features Browser Features Web Image Monitor Setting Web Image Monitor Setting Web Service Settings Web Service Settings System/Copier SP System/Copier SP Scanner SP Scanner SP...
  • Page 505 Using Web Image Monitor to Manage Log Files File Location Region of all file deletion. "Document Server" indicates a deletion of all files from the machine's hard disk. Collect Job Logs Indicates the status of the job log collection setting. Value Content Active...
  • Page 506 7. Managing the Machine Value Content Inactive Log transfer setting is disabled. Not Changed No changes have been made to the log transfer setting. Encrypt Logs Indicates the status of the log encryption setting. Value Content Active Log encryption setting is enabled. Inactive Log encryption setting is disabled.
  • Page 507 Using Web Image Monitor to Manage Log Files Value Content Cleartext Communication Encryption is disabled. Machine Port No. Indicates the machine's port number. Protocol Destination protocol. "Unknown" indicates the destination's protocol could not be identified. IP Address Destination IP address. Port No.
  • Page 508 7. Managing the Machine Communication Start/End Indicates the times at which the communication started and ended. Network Attack Status Indicates the machine's status when network attacks occur. Value Content Violation Detected An attack on the network was detected. Recovered from Violation The network recovered from an attack.
  • Page 509 Using Web Image Monitor to Manage Log Files Value Content Attack from Other than Control Attack by means other than an unauthorized operation using Panel the machine's control panel Login User Name used for Network Attack Identifies the login user name that the network attack was performed by. Add/Update/Delete Firmware Indicates the method used to add, update, or delete the machine's firmware.
  • Page 510 7. Managing the Machine Value Content Clear NVRAM The NVRAM was cleared. Start Updating Machine Data An encryption key update was started. Encryption Key Finish Updating Machine Data An encryption key update was finished. Encryption Key Machine Data Encryption Key Type Identifies the type of the encryption key.
  • Page 511 Using Web Image Monitor to Manage Log Files Attribute Description Lockout Whether the lockout is active (Active) or inactive (Inactive) is recorded. Number of Attempts before The number of times a user may enter a login password is Lockout recorded. Lockout Release Timer Whether the lockout release timer is active (Active) or inactive (Inactive) is recorded.
  • Page 512 7. Managing the Machine Attribute Description Encryption Key Auto The security level is recorded. Exchange: Setting1-4, Default: When [Authentication Only] is selected, "Authentication Only" Security Level is recorded. When [Authentication and Low Level Encryption] is selected, "Authentication and Low Level Encryption" is recorded. When [Authentication and High Level Encryption] is selected, "Authentication and High Level Encryption"...
  • Page 513 Using Web Image Monitor to Manage Log Files HDD Format Partition Indicates the initial status of each hard disk partition. Access Result Indicates the results of logged operations. Value Content Completed An operation completed successfully. Failed An operation completed unsuccessfully. Job log (source) Source Indicates the source of the job file.
  • Page 514 7. Managing the Machine Folder Name Indicates the name of the folder in which the file has been stored. Print File Name Name of "Printer" files. Job log (target) Printing stored faxes from the Fax screen before transmission will not be recorded in the job log. Target Type of the job target.
  • Page 515 Using Web Image Monitor to Manage Log Files Folder Name Indicates the name of the folder in which you have stored the file. Eco-friendly log information items Start Date/Time The event start date and time is recorded. End Date/Time The event end date and time is recorded. Log Type The type of eco-friendly log is recorded.
  • Page 516 7. Managing the Machine Log ID Identifies the ID that is assigned to the log. This is a hexadecimal ID that identifies the log. Power Mode The power status of the machine (after state transition) is logged. Value Content Standby Standby status Low Power Low power status...
  • Page 517: Specifying Log Collect Settings

    Using Web Image Monitor to Manage Log Files Large size means A3 (11 × 17 inches) or larger. Paper Usage (2 Sided: Small Size) Indicates the number of two-sided prints per hour on small paper. Small size means smaller than A3 (11 × 17 inches). Detected Power The power consumption status of the machine is measured and registered in the log while the machine is being used.
  • Page 518: Specifying Log Encryption

    7. Managing the Machine • HDD Format • All Logs Deletion • Log Setting Change • Log Collection Item Change If "Access Log Collect Level" is set to [Level 2], all access logs are collected. Eco-friendly Log Collect Level If "Eco-friendly Log Collect Level" is set to [Level 1], eco-friendly logs are not collected. If "Eco-friendly Log Collect Level"...
  • Page 519: Downloading Logs

    Using Web Image Monitor to Manage Log Files Point to [Device Management], and then click [Configuration]. Click [Logs] under "Device Settings". Select [Active] in the [Encrypt Logs] area under "Common Settings for All Logs". To disable log encryption, select [Inactive]. Click [OK].
  • Page 520: Number Of Logs That Can Be Kept On The Machine

    7. Managing the Machine • Downloaded log files use UTF-8 character encoding. To view a log file, open it using an application that supports UTF-8. • For details about the items contained in the logs, see page 204 "Attributes of Logs You Can Download".
  • Page 521: Notes On Operation When The Number Of Log Entries Reaches Maximum

    Using Web Image Monitor to Manage Log Files • During log downloads, do not perform operations that will create log entries, as logs that are in the process of downloading cannot be updated with new entries. • Batch deletion of logs can be performed from the control panel or through Web Image Monitor. Notes on Operation When the Number of Log Entries Reaches Maximum If the number of logs that can be stored on the machine exceeds the specified maximum limit, old logs are overwritten by new logs.
  • Page 522 7. Managing the Machine 4. Downloaded logs If logs are downloaded during overwriting CJD007 1. Access log 2. Job log 3. Download 4. Downloaded logs 5. Overwriting 6. Deleted by overwriting To determine whether or not overwriting occurred while the logs were downloading, check the message in the last line of the downloaded logs.
  • Page 523: Printer Job Logs

    Using Web Image Monitor to Manage Log Files Printer Job Logs Print Log entries are made before the login entry is made in the Access Log. Details of series of jobs (including reception, processing, and output of the jobs' data) are combined into single entries.
  • Page 524: Deleting All Logs

    7. Managing the Machine 9. Information about the outputting of the print job is recorded as an entry in the Job Log (using the same ID). 10. Authentication (logout) data is recorded as an entry in the Access Log. Deleting All Logs Use the following procedure to delete all logs stored in the machine.
  • Page 525: Managing Logs From The Machine

    Managing Logs from the Machine Managing Logs from the Machine You can specify settings such as whether or not to transfer logs to the log collection server and whether or not to delete all logs. Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer from the machine to the log collection server.
  • Page 526: Managing Logs From The Log Collection Server

    7. Managing the Machine Managing Logs from the Log Collection Server For details about using the log collection server to manage Log Files, see the manual supplied with the log collection server.
  • Page 527: Configuring The Home Screen For Individual Users

    Configuring the Home Screen for Individual Users Configuring the Home Screen for Individual Users This allows each user to use their own home screen. When a user logs in, their personalized home screen is displayed. Log in as the machine administrator from the control panel. Press [System Settings].
  • Page 528 7. Managing the Machine • When Menu Protect has been set to [Level 1] or [Level 2], have the administrator create any necessary programs. • Only the icons of functions an administrator has permitted to be used are displayed. • When a user is deleted from the Address Book, that user's home screen information is also deleted. •...
  • Page 529: Configuring The Browser Functions

    Configuring the Browser Functions Configuring the Browser Functions Precautions for Using the Browser Function The communication between the MFP and the server via a Web browser is exposed to the risk of unauthorized viewing and modification. Because of this, it is recommended to install the site certificates issued for the Web sites the MFP is allowed to browse and enable the machine's Site Certificate Check function in advance.
  • Page 530 7. Managing the Machine Press [Browser Default Settings]. Press the setting you want to change, and change the setting. Press [OK]. Log out. Home Screen by User Specify the URL of your home screen. Cache File Specify whether or not to use cache files. When using cache files, specify a size within a range between 1024 and 10240 KB.
  • Page 531: Preventing Setting Changes Using The Browser

    Configuring the Browser Functions User Agent Specify the user agent. Default: [deviceBrowser] Default HTTP Request Method Specify the type of HTTP request method. Default: [GET] Screen Settings Specify whether or not to display the URL bar and the horizontal scroll bar. •...
  • Page 532: Checking The Usage Status Of The Browser Functions

    7. Managing the Machine Home Screen by User Default: [Allow] Bookmarks by User Default: [Allow] Use Proxy Server Default: [Allow] Keep the History by User Default: [Allow] Screen Settings by User Default: [Allow] Checking the Usage Status of the Browser Functions The following logs can be used to check how the browser functions have been used.
  • Page 533 Configuring the Browser Functions *1 The connected Web site contains non-encrypted data.
  • Page 534: Managing Device Information

    7. Managing the Machine Managing Device Information • Keep SD cards or USB flash memory devices out of reach of children. If a child accidentally swallows an SD card or USB flash memory device, consult a doctor immediately. The machine's device information can be set by an administrator with privileges to manage everything — devices, users, networks and files.
  • Page 535: Exporting Device Information

    Managing Device Information • Counters • EFI printer unit settings • Settings that can only be specified via Web Image Monitor or Web Service (for example, Bonjour, SSDP setting) • The file format for exports is CSV. • The device configuration of the machine importing the device setting information file must be the same as that of the machine, which exported the device setting information file.
  • Page 536: Importing Device Information

    7. Managing the Machine Press [Administrator Tools]. Press [ Next] four times. Press [Device Setting Information: Export (Memry Strge Devc)]. Set the export conditions. • Specify whether to [Include] or [Exclude] the "Device Unique Information". "Device Unique Information" includes the IP address, host name, fax number, etc. •...
  • Page 537: Troubleshooting

    Managing Device Information Insert an SD card into the media slot on the side of the control panel. For details about inserting the SD card, see "Inserting/Removing a Memory Storage Device", Getting Started. Log in from the control panel as an administrator with all privileges. Press [System Settings].
  • Page 538 7. Managing the Machine Example of a log file "1.0.0" "ExecType", "Date", "SerialNo",PnP", "Model", "Destination","IP","Host","Storage","FileNam e","FileID","TotalItem","NumOfOkItem","ResultCode","ResultName","Identifier" "IMPORT" "20XX-07-05T15:29:16+09:00" "3C35-7M0014" "Brand Name" "Product Name" "0" "10" "10.250.155.125" "RNP00267332582D" "SD" "20XX07051519563C35-710220.csv" "20XX07051519563C35-710220" " 0" " 0" " 2" "INVALID REQUEST" "TargetID","ModuleID","PrefID","Item","NgCode","NgName" CJD023 If you cannot solve the problem or do not know how to solve it after checking the code, write down the error log entry, and then contact your service representative.
  • Page 539 Managing Device Information ResultCode Cause Solutions 10 (LOG ERROR) Failed to write the log Contact your service representative. file. The hard disk is faulty. 20 (PART FAILED) Failed to import some The reason for the failure is logged in settings. "NgName".
  • Page 540: Managing Eco-Friendly Counter

    7. Managing the Machine Managing Eco-friendly Counter When user authentication is being used, information on the eco-friendly counter is displayed at login. The eco-friendly counter displays the ratio of use of color, duplex and combine printing to the total number of printed sheets. How much toner and paper are being saved is indicated by the eco-friendly index.
  • Page 541: Clearing A Machine's Eco-Friendly Counter

    Managing Eco-friendly Counter Default: [Fixed Message 1] Display Information Screen Specify whether or not to display the information screen at user login. Default: [Off] Display Time Specify the timing for displaying the information screen. Default: [Every Time Login] Clearing a Machine's Eco-friendly Counter A machine's eco-friendly counter can be cleared.
  • Page 542: Managing The Address Book

    7. Managing the Machine Managing the Address Book Specifying Auto Deletion of Address Book Data Specify how the machine handles a request for auto registration after the registered data in the address book has reached the limit. If you set this to [On], new user accounts are added by automatically deleting old user accounts. Accounts that have not been used for the longest time are deleted first.
  • Page 543: Specifying The Extended Security Functions

    Specifying the Extended Security Functions Specifying the Extended Security Functions In addition to providing basic security through user authentication and each administrator's specified limits to access the machine, security can also be increased by encrypting transmitted data and data in the Address Book.
  • Page 544 7. Managing the Machine If [Simple Encryption] is specified, all jobs that pass user authentication are accepted. If [DES] is specified, jobs encrypted with DES or AES are accepted. If [AES] is specified, jobs encrypted with AES are accepted. If you select [AES] or [DES], specify the encryption settings using the printer driver. For details about specifying the printer driver, see the printer driver Help.
  • Page 545 Specifying the Extended Security Functions Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner) This can be specified by the user administrator. The available fax and scanner destinations are limited to the destinations registered in the Address Book. A user cannot directly enter the destinations for transmission. If "Restrict Use of Destinations (Scanner)"...
  • Page 546 7. Managing the Machine For details, see "Reception Functions", Fax. Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 547 Specifying the Extended Security Functions The administrator can confirm if the updated structure change is permissible or not by checking the firmware version displayed on the control panel screen. If the firmware structure change is not permissible, contact your service representative before logging in. When "Change Firmware Structure"...
  • Page 548 7. Managing the Machine Specify the time to limit repeated access by a user. Use the number keys to enter the time between "0" and "60", and then press [ ]. Default: [15] • Managed User Host Limit Specify the number of user accounts to manage under "Security Setting for Access Violation".
  • Page 549 Specifying the Extended Security Functions • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values. Device Access Violation This can be specified by the machine administrator.
  • Page 550 7. Managing the Machine • Depending on the values of the settings for [Max. Allowed No. of Access] and [Measurement Time], you may frequently receive violation detection e-mail. • If violation detection e-mail is received frequently, check the content and review the setting values.
  • Page 551: Other Security Functions

    Other Security Functions Other Security Functions This is an explanation of the settings for preventing leakage of information. It also explains the functions that are restricted when user authentication is used. Fax Function Not displaying destinations and senders in reports and lists This can be specified by the machine administrator.
  • Page 552: Scanner Function

    7. Managing the Machine Scanner Function Print & Delete Scanner Journal When user authentication is enabled, "Print & Delete Scanner Journal" is automatically set to [Do not Print: Disable Send] in order to prevent personal information in transmission/delivery history from being automatically printed. In this case, the scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries.
  • Page 553: Restricting A Customer Engineer Operation

    Restricting a Customer Engineer Operation Restricting a Customer Engineer Operation You can restrict the customer engineer's access to the service mode. Service mode is used by a customer engineer for inspection or repair. If you set "Service Mode Lock" to [On], service mode cannot be used unless the machine administrator logs on to the machine and cancels the service mode lock to allow a customer engineer to operate the machine for inspection and repair.
  • Page 554: Additional Information For Enhanced Security

    7. Managing the Machine Additional Information for Enhanced Security This section explains the settings that you can configure to enhance the machine's security. Settings You Can Configure Using the Control Panel Use the control panel to configure the security settings shown in the following table. System Settings Item Setting...
  • Page 555 Additional Information for Enhanced Security Item Setting Administrator Extended Security Prohibit Tools Settings by SNMPv1, v2 See page 253 "Specifying the Extended Security Functions". Administrator Extended Security Driver Tools Encryption Key:Encryption See page 253 "Specifying the Extended Strength Security Functions". Administrator Extended Security Access Privilege...
  • Page 556: Settings You Can Configure Using Web Image Monitor

    7. Managing the Machine Scanner Features Item Setting Initial Settings Menu Protect Level 2 See page 76 "Specifying Menu Protect". Facsimile Features Item Setting Reception Stored Reception File User Select [On], and then specify the users or Settings Setting groups who can perform operations on the received documents.
  • Page 557 Additional Information for Enhanced Security Category Item Setting Security User Lockout Release Timer Set to [Active] or [Inactive]. Lockout Policy When setting to [Active], set the Lockout release timer to 60 minutes or more. For details, see page 68 "User Lockout Function". Security User Lock Out User for When setting "Lockout Release Timer"...
  • Page 558: Settings You Can Configure When Ipsec Is Available/Unavailable

    7. Managing the Machine Settings You Can Configure When IPsec Is Available/Unavailable All communication to and from machines on which IPsec is enabled is encrypted. If your network supports IPsec, we recommend you enable it. Settings you can configure when IPsec is available If IPsec is available, configure the settings shown in the following table to enhance the security of the data traveling on your network.
  • Page 559 Additional Information for Enhanced Security • You can set "IPsec" and "Permit SSL/TLS Communication" using Web Image Monitor. Securing data when IPsec is unavailable The following procedures make user data more secure when IPsec is unavailable. Administrators must inform users to carry out these procedures. •...
  • Page 560 7. Managing the Machine • For details about specifying the IPsec setting via Web Image Monitor, see page 142 "Configuring IPsec".
  • Page 561: Troubleshooting

    8. Troubleshooting This chapter describes what to do if the machine does not function properly. If a Message is Displayed This section explains how to deal with problems if a message appears on the screen during user authentication. If a message not shown below is displayed, follow the message to resolve the problem. "You do not have the privileges to use this function."...
  • Page 562 8. Troubleshooting "Failed to obtain URL." The machine is connected to the server, but the UA service is not responding properly. • Make sure the UA service is specified correctly. "Failed to obtain URL." SSL is not specified correctly on the server. •...
  • Page 563: If An Error Code Is Displayed

    If an Error Code is Displayed If an Error Code is Displayed When authentication fails, the message "Authentication has failed." appears with an error code. The following lists provide solutions for each error code. If the error code that appears is not on the lists, write down the error code and contact your service representative.
  • Page 564: Windows Authentication

    8. Troubleshooting B0206-002 : Case 1 A login user name or password error occurred. • Make sure the login user name and password are entered correctly and then log in. B0206-002 : Case 2 The user attempted authentication from an application on the "System Settings" screen, where only the administrator has authentication ability.
  • Page 565 If an Error Code is Displayed Make sure that the encryption key is correctly specified on the driver. W0105-000 A login user name was not specified but a DeskTopBinder operation was performed. • Set the DeskTopBinder login user name correctly. W0206-002 The user attempted authentication from an application on the "System Settings"...
  • Page 566 8. Troubleshooting • Make sure the account has been added to user group. • Make sure the user group name registered on the machine and the group name on the DC (domain controller) are exactly the same. The DC is case sensitive. •...
  • Page 567 If an Error Code is Displayed • Make sure that connection to the authentication server is possible. • Use the "Ping Command" in "Interface Settings" to check the connection. W0406-107 : Case 2 A login name or password error occurred. •...
  • Page 568 8. Troubleshooting • The KDC and machine timing do not match. Authentication will fail if the difference between the KDC and machine timing is more than 5 minutes. Make sure the timing matches. • Kerberos authentication will fail if the realm name is specified in lower-case letters. Make sure the realm name is specified in capital letters.
  • Page 569: Ldap Authentication

    If an Error Code is Displayed LDAP Authentication L0103-000 A TWAIN operation occurred during authentication. • Make sure no other user is logged in to the machine, and then try again. L0104-000 Failed to encrypt password. • A password error occurred. Make sure the password is entered correctly.
  • Page 570 8. Troubleshooting L0306-018 The LDAP server is not correctly configured. • Make sure that a connection test is successful with the current LDAP server configuration. L0307-001 An authentication error occurred because the Address Book is being used at another location. •...
  • Page 571 If an Error Code is Displayed L0406-202 / L0406-203 : Case 2 A login user name or password error occurred. • Make sure the login user name and password are entered correctly. • Make sure a usable login name is registered on the machine. Authentication will fail in the following cases: If the login user name contains a space, colon (:), or quotation mark (").
  • Page 572: Integration Server Authentication

    8. Troubleshooting • If the authentication server has just been changed, delete the old name on the server. L0606-004 Authentication failed because the user name contains language that cannot be used by general users. • Do not use "other", "admin", "supervisor" or "HIDE*" in general user accounts. L0607-001 An authentication error occurred because the Address Book is being used at another location.
  • Page 573 If an Error Code is Displayed I0206-002 A user attempted authentication from an application on the "System Settings" screen, where only the administrator has authentication ability. • Only the administrator has login privileges on this screen. • Log in as a general user from the application's login screen. I0206-003 An authentication error occurred because the user name contains a space, colon (:), or quotation mark (").
  • Page 574 8. Troubleshooting I0409-000 Authentication timed out because the server did not respond. • Contact the server or network administrator. • If the situation does not return to normal, contact your service representative. I0511-000 The authentication server login name is the same as a user name already registered on the machine. (Names are distinguished by the unique attribute specified in the LDAP authentication settings.) •...
  • Page 575: If The Machine Cannot Be Operated

    If the Machine Cannot Be Operated If the Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide the instructions on how to deal with them. Condition Cause Solution Cannot perform the following: User authentication has been Confirm the user name and rejected.
  • Page 576 8. Troubleshooting Condition Cause Solution After starting "User "Driver Encryption Set "Driver Encryption Management Tool" or "Address Key:Encryption Strength" is not Key:Encryption Strength" to Management Tool" in set correctly. Alternatively, [Simple Encryption]. SmartDeviceMonitor for "SSL/TLS" has been enabled Alternatively, enable "SSL/TLS", Admin/Device Manager NX although the required certificate install the server certificate in the...
  • Page 577 If the Machine Cannot Be Operated Condition Cause Solution Cannot connect to the The ScanRouter delivery Update to the latest version of ScanRouter delivery software. software may not be supported the ScanRouter delivery by the machine. software. Cannot access the machine ScanRouter EX Professional V2 ScanRouter EX Professional V2 using ScanRouter EX...
  • Page 578 8. Troubleshooting Condition Cause Solution Cannot send e-mail from the The following are possible • Install a user certificate scanner. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 579 If the Machine Cannot Be Operated Condition Cause Solution Cannot transfer faxed The following are possible • Install a user certificate documents. causes: (destination certificate). Similarly: • The validity period of the You can install a user user certificate (destination certificate (destination •...
  • Page 580 8. Troubleshooting Condition Cause Solution User authentication is disabled, User authentication might have Re-enable user authentication, yet destinations specified using been disabled without "All and select [All Users] as the the machine do not appear. Users" being selected for access permission setting of the "Protect Destination".
  • Page 581 9. List of Operation Privileges for Settings This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled. How to Read Understanding headers • User The user administrator has privileges for this operation. •...
  • Page 582: System Settings

    9. List of Operation Privileges for Settings System Settings When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [General Features] Settings User Mach N/W File Unset [Program / Change / Delete User Text] [Panel Key Sound] [Warm-up Beeper] [Copy Count Display]...
  • Page 583 System Settings Settings User Mach N/W File Unset [Half Fold Position] [Letter Fold-out Position] [Letter Fold-in Position] [Double Parallel Fold Position] [Gate Fold Position] [Tray Paper Settings] Settings User Mach N/W File Unset [Paper Tray Priority: Copier] [Paper Tray Priority: Facsimile] [Paper Tray Priority: Printer] [Tray Paper Size: Tray 1-4] [Printer Bypass Paper Size]...
  • Page 584 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Low Power Mode Timer] [System Auto Reset Timer] [Copier / Document Server Auto Reset Timer] [Facsimile Auto Reset Timer] [Printer Auto Reset Timer] [Scanner Auto Reset Timer] [Set Date] [Set Time] [Auto Logout Timer]...
  • Page 585 System Settings Settings User Mach N/W File Unset [WINS Configuration] [Effective Protocol] [NCP Delivery Protocol] [NW Frame Type] [SMB Computer Name] [SMB Work Group] [Ethernet Speed] [LAN Type] [Ping Command] – – – [Permit SNMPv3 Communication] [Permit SSL / TLS Communication] [Host Name] [Machine Name] [IEEE 802.1X Authentication for Ethernet]...
  • Page 586 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Signal Control] [Wireless LAN] Settings User Mach N/W File Unset [Communication Mode] [SSID Setting] [Ad-hoc Channel] [Security Method] [Wireless LAN Easy Setup] – – – – [Wireless LAN Signal] [Restore Factory Defaults] –...
  • Page 587 System Settings Settings User Mach N/W File Unset [E-mail Communication Port] [E-mail Reception Interval] [Max. Reception E-mail Size] [E-mail Storage in Server] [Default User Name / Password (Send)] [Program / Change / Delete E-mail Message] [Auto Specify Sender Name] [Fax E-mail Account] [Scanner Resend Interval Time] [Number of Scanner Resends] *3 The primary and secondary delivery server addresses are read-only.
  • Page 588 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Auto Delete User in Address Book] – – – – [Delete All Data in Address Book] – – – – [Display / Print Counter] [Display / Clear / Print Counter per User] –...
  • Page 589 System Settings Settings User Mach N/W File Unset • [Driver Encryption Key] – – – – • [Driver Encryption Key:Encryption Strength] • [Restrict Display of User Information] • [Encrypt User Custom Settings & Address Book] • [Enhance File Protection] • [Restrict Use of Destinations (Fax)] •...
  • Page 590 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Capture Priority] – – – [Capture: Delete All Unsent Files] – – – – [Capture: Ownership] – – – [Capture: Public Priority] – – – [Capture: Owner Defaults] –...
  • Page 591 System Settings Settings User Mach N/W File Unset [Program / Change / Delete Remote – – – – Machine] [Program / Delete Device Certificate] – – – – – [Device Setting Information: Export (Memry – – – – – – Strge Devc)] [Device Setting Information: Import (Memry –...
  • Page 592 9. List of Operation Privileges for Settings Edit Home When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Edit Home] Settings User Mach N/W File Unset [Move Icon] [Delete Icon] [Add Icon] –...
  • Page 593 Copier / Document Server Features Copier / Document Server Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Features] Settings User Mach N/W File Lv.1 Lv.2 [Auto Image Density Priority] [Original Type Priority] [Original Photo Type Priority] [Original Type Display]...
  • Page 594 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Reproduction Ratio] [Reduce/Enlarge Ratio Priority] [Ratio for Create Margin] [Edit] Settings User Mach N/W File Lv.1 Lv.2 [Front Margin: Left / Right] [Back Margin: Left / Right] [Front Margin: Top / Bottom] [Back Margin: Top / Bottom] [1 Sided...
  • Page 595 Copier / Document Server Features [Stamp] [Background Numbering] Settings User Mach N/W File Lv.1 Lv.2 [Size] [Density] [Stamp Color] [Preset Stamp] Settings User Mach N/W File Lv.1 Lv.2 [Stamp Language] [Stamp Priority] [Stamp Format]: COPY [Stamp Format]: URGENT [Stamp Format]: PRIORITY [Stamp Format]: For Your Info.
  • Page 596 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Stamp Color]: For Your Info. [Stamp Color]: PRELIMINARY [Stamp Color]: For Internal Use Only [Stamp Color]: CONFIDENTIAL [Stamp Color]: DRAFT *1 Only adjustments to print position can be set. The print position itself cannot be configured. [User Stamp] Settings User...
  • Page 597 Copier / Document Server Features Settings User Mach N/W File Lv.1 Lv.2 [Size] [Duplex Back Page Stamping Position] [Page Numbering in Combine] [Stamp on Designating Slip Sheet] [Stamp Position:P1,P2...] [Stamp Position:1/5,2/5...] [Stamp Position:-1-,-2-...] [Stamp Position:P.1,P.2...] [Stamp Position:1,2...] [Stamp Position:1-1,1-2...] [Superimpose] [Stamp Color] [Page Numbering Initial Letter] *3 Only adjustments to print position can be set.
  • Page 598 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Change Job Serial No. for First Job] [Input / Output] Settings User Mach N/W File Lv.1 Lv.2 [Switch to Batch] [SADF Auto Reset] [Rotate Sort: Auto Paper Continue] [Copy Eject Face Method in Glass Mode] [Copy Eject Face Method in Bypass Mode] [Memory Full Auto Scan Restart]...
  • Page 599 Copier / Document Server Features Settings User Mach N/W File Lv.1 Lv.2 [Color Sensitivity] [A.C.S. Sensitivity] [A.C.S. Priority] [Inkjet Output Type] [Administrator Tools] Settings User Mach N/W File Lv.1 Lv.2 [Menu Protect]...
  • Page 600: Facsimile Features

    9. List of Operation Privileges for Settings Facsimile Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Quick Operation Key 1-3] [Switch Title] [Search Destination] [Communication Page Count] [Adjust Sound Volume]...
  • Page 601 Facsimile Features [Reception Settings] Settings User Mach N/W File Lv.1 Lv.2 [Reception File Settings] [Switch Reception Mode] [Program Special Sender] – – – – – [Program Special Sender: Print List] – – – – – [Stored Reception File User Setting] [SMTP RX File Delivery Settings] [2 Sided Print] [Checkered Mark]...
  • Page 602 9. List of Operation Privileges for Settings Settings User Mach N/W File Lv.1 Lv.2 [Select Dial / Push Phone] [Program Fax Information] [Enable H.323] [Enable SIP] [H.323 Settings] [SIP Settings] [Program / Change / Delete Gateway] [Menu Protect] [E-mail Setting] [Folder Setting] [File Type to Transfer] [Security for E-mail TX Results]...
  • Page 603: Printer Functions

    Printer Functions Printer Functions This section lists the printer function items that appear if [Printer] on the Home screen is pressed. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. Printer Functions Settings User Mach N/W...
  • Page 604: Printer Features

    9. List of Operation Privileges for Settings Printer Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [List / Test Print] Settings User Mach N/W File Lv.1 Lv.2 [Multiple Lists] – –...
  • Page 605 Printer Features Settings User Mach N/W File Lv.1 Lv.2 [Store and Skip Errored Job] [Memory Overflow] [Auto Cancel Conf. for PDL Error Job] [Auto Cancel for Print Job(s) on Error] [Job Separation] [Rotate Sort: Auto Paper Continue] [Rotate by 180 Degrees] [Print Compressed Data] [Duplex] [Copies]...
  • Page 606 9. List of Operation Privileges for Settings [Host Interface] Settings User Mach N/W File Lv.1 Lv.2 [I/O Buffer] [I/O Timeout] [PCL Menu] Settings User Mach N/W File Lv.1 Lv.2 [Orientation] [Form Lines] [Font Source] [Font Number] [Point Size] [Font Pitch] [Symbol Set] [Courier Font] [Extend A4 Width]...
  • Page 607 Printer Features Settings User Mach N/W File Lv.1 Lv.2 [Toner Saving] [Color Setting] [Color Profile] [Process Color Model] [Orientation Auto Detect] [Gray Reproduction] [PDF Menu] Settings User Mach N/W File Lv.1 Lv.2 [Change PDF Password] [PDF Group Password] [Reverse Order Printing] [Resolution] [Toner Saving] [Color Setting]...
  • Page 608: Scanner Features

    9. List of Operation Privileges for Settings Scanner Features When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1 Lv.2 [Switch Title] [Update Delivery Server Destination List] –...
  • Page 609 Scanner Features Settings User Mach N/W File Lv.1 Lv.2 [Blank Page Detect] [Reproduction Ratio] [Program / Change / Delete Scan Size] [Send Settings] Settings User Mach N/W File Lv.1 Lv.2 [Compression (Black & White)] [Compression Method (Black & White)] [Compression (Gray Scale / Full Color)] [Compression Method for High Compression PDF] [High Compression PDF Level]...
  • Page 610 9. List of Operation Privileges for Settings Browser Features When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Browser Default Settings] [Settings per Users] [View Logs]...
  • Page 611 Extended Feature Settings Extended Feature Settings [Extended Feature Settings] Settings User Mach N/W File Unset [Startup Setting] [Install] [Uninstall] [Extended Feature Info] [Administrator Tools] – – – – – [Add.Program Startup Setting] [Install Add.Program] [Uninstall Add.Program] [Add.Program Info]...
  • Page 612 9. List of Operation Privileges for Settings Maintenance When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Maintenance] Settings User Mach N/W File Unset [Auto Color Calibration] – – – – [Color Registration] –...
  • Page 613 Web Image Monitor: Display Eco-friendly Counter Web Image Monitor: Display Eco-friendly Counter These settings are in [Status/Information]. Each user can only view his or her own counter. Settings User Mach File Unset [Download] – – – – – [Device Total Counter] –...
  • Page 614 9. List of Operation Privileges for Settings Web Image Monitor: Job These settings are in [Status/Information]. Users can only change jobs they themselves executed. [Job List] Settings User Mach N/W File Unset [Current/Waiting Jobs]: [Change Order] – – – – –...
  • Page 615 Web Image Monitor: Job Settings User Mach N/W File Unset [Fax Remote Send History] – – – [Scanner Remote Send History] – – – *1 Can be viewed when using user code authentication for the user authentication method.
  • Page 616 9. List of Operation Privileges for Settings Web Image Monitor: Device Settings These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [System] Settings User Mach N/W File...
  • Page 617 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Slip Sheet Tray] [Designation Sheet 1-7 Tray] [Separation Sheet Tray] [Function Key Allocation/Function Priority] Settings User Mach N/W File Unset [Function Key Allocation] [Function Priority] [Paper] Settings User Mach N/W File Unset [Tray 1-4]...
  • Page 618 9. List of Operation Privileges for Settings [Timer] Settings User Mach N/W File Unset [Sleep Mode Timer] [Low Power Mode Timer] [System Auto Reset Timer] [Copier/Document Server Auto Reset Timer] [Facsimile Auto Reset Timer] [Scanner Auto Reset Timer] [Printer Auto Reset Timer] [Auto Logout Timer] [Fusing Unit Off Mode On/Off] [Weekly Timer]...
  • Page 619 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Download] – – – – – [Email] Settings User Mach N/W File Unset [Administrator Email Address] – – – [Signature] – – – [Reception Protocol] – – – [Email Reception Interval] –...
  • Page 620 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [POP3 Reception Port No.] – – – [IMAP4 Reception Port No.] – – – [Fax Email Address] – – – [Receive Fax Email] – – – – [Fax Email User Name] –...
  • Page 621 Web Image Monitor: Device Settings [File Transfer] Settings User Mach N/W File Unset [SMB User Name] – – – – [SMB Password] – – – – [FTP User Name] – – – – [FTP Password] – – – – [NCP User Name] –...
  • Page 622 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Machine Administrator Authentication] [Available Settings for Machine Administrator] [Network Administrator Authentication] [Available Settings for Network Administrator] [File Administrator Authentication] [Available Settings for File Administrator] [Program/Change Administrator] Settings User Mach N/W File...
  • Page 623 Web Image Monitor: Device Settings [LDAP Server] Settings User Mach N/W File Unset [LDAP Search] – – – – [Program] – – – – [Change] – – – – [Delete] – – – – [Firmware Update] Settings User Mach N/W File Unset [Update]...
  • Page 624 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Count Period (Days)] [Administrator Message] [Compulsory Security Stamp] Settings User Mach N/W File Unset [Copier] [Document Server] [Facsimile] [Printer] [Unauthorized Copy Prevention: Copier] Settings User Mach N/W File Unset [Compulsory Unauthorized Copy Prevention]...
  • Page 625 Web Image Monitor: Device Settings Settings User Mach N/W File Unset [Compulsory Unauthorized Copy Prevention] [Unauthorized Copy Prevention Type] [Mask Type for Pattern/Density/Effect] [Prevention Text Settings]...
  • Page 626 9. List of Operation Privileges for Settings Web Image Monitor: Printer These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Basic Settings] Settings User Mach N/W File Lv.1...
  • Page 627 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 [Letterhead Setting] [Tray Setting Priority] [Paper Confirmation for Bypass Tray] [Store and Skip Errored Job] [Edge to Edge Print] [Default Printer Language] [Tray Switching] [List/Test Print Lock] [Extended Auto Tray Switching] [Virtual Printer] [Restrict Direct Print Jobs] [Initial screen switch setting]...
  • Page 628 9. List of Operation Privileges for Settings [PDF Temporary Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Temporary Password] – – – – [PDF Group Password] Settings User Mach N/W File Lv.1 Lv.2 [PDF Group Password] – – – –...
  • Page 629 Web Image Monitor: Printer Settings User Mach N/W File Lv.1 Lv.2 [Letterhead Setting] [Edge to Edge Print] [PCL Menu] [PS Menu] [PDF Menu] [RHPP Settings] [Permissions for Printer Language to Operate File System] Settings User Mach N/W File Lv.1 Lv.2 [PJL] [PDF, PostScript]...
  • Page 630: Web Image Monitor: Fax

    9. List of Operation Privileges for Settings Web Image Monitor: Fax These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [Initial Settings] Settings User Mach N/W File Lv.1...
  • Page 631 Web Image Monitor: Fax Settings User Mach N/W File Lv.1 Lv.2 [Memory Lock Reception] – – – – – [Reception File Settings] Settings User Mach N/W File Lv.1 Lv.2 [Output Mode Switch Timer] – – – – – [Prohibit Auto Print] –...
  • Page 632 9. List of Operation Privileges for Settings Web Image Monitor: Scanner These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the "Menu Protect" setting. [General Settings] Settings User Mach N/W File Lv.1...
  • Page 633 Web Image Monitor: Scanner Settings User Mach N/W File Lv.1 Lv.2 [High Compression PDF Level] [Compression Method for High Compression PDF] [Max. Email Size] [Divide & Send Email] [Insert Additional Email Info] [No. of Digits for Single Page Files] [Stored File Email Method] [Default Email Subject] *1 When [Network Management] in [Administrator Authentication Management] is set to [Off], user privilege becomes R/W.
  • Page 634 9. List of Operation Privileges for Settings [Default Settings for Simplified Screens on Device] Settings User Mach N/W File Lv.1 Lv.2 [Scan Settings] – – – [Send File Type] – – –...
  • Page 635 Web Image Monitor: Interface Web Image Monitor: Interface These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Interface Settings] Settings User Mach N/W File Unset [LAN Type]...
  • Page 636 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Security Method] [WEP Settings] [WPA2 Settings]...
  • Page 637 Web Image Monitor: Network Web Image Monitor: Network These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [IPv4] Settings User Mach N/W File Unset [IPv4] [Host Name]...
  • Page 638 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Stateless Address] [Manual Configuration Address] [DHCPv6] [DHCPv6 Address] [DDNS] [LLMNR] [Details] [NetWare] Settings User Mach N/W File Unset [NetWare] [NetWare Print Settings] [NCP Delivery] [SMB] Settings User Mach N/W File Unset...
  • Page 639 Web Image Monitor: Network [SNMP] Settings User Mach N/W File Unset [SNMP] – – – – – [Protocol] – – – – – [SNMPv1,v2 Setting] – – – – – [Community] – – – – – [SNMPv3] Settings User Mach N/W File Unset [SNMP]...
  • Page 640 9. List of Operation Privileges for Settings Settings User Mach N/W File Unset [Local Hostname] [Details] [Print Order Priority] [System Log] Settings User Mach N/W File Unset [System Log] –...
  • Page 641 Web Image Monitor: Security Web Image Monitor: Security These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Network Security] – – – – – [Access Control] – – – – – [IPP Authentication] – – – –...
  • Page 642 9. List of Operation Privileges for Settings Web Image Monitor: @Remote These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Setup RC Gate] – – – – – [Update RC Gate Firmware] – – – – –...
  • Page 643 Web Image Monitor: Webpage Web Image Monitor: Webpage These settings are in [Configuration] in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". [Webpage] Settings User Mach N/W File Unset [Webpage Language] [Web Image Monitor Auto Logout]...
  • Page 644 9. List of Operation Privileges for Settings Web Image Monitor: Extended Feature Settings These settings are in [Configuration] in [Device Management]. Settings User Mach File Unset [Startup Setting] – – – – – [Extended Feature Info] [Install] – – – –...
  • Page 645 Web Image Monitor: Address Book Web Image Monitor: Address Book These settings are in [Device Management]. Settings User Mach File Unset [Add User] – – – [Change] – – – [Delete] – – – [Add Group] – – – [Data Carry-over Setting for Address Book –...
  • Page 646 9. List of Operation Privileges for Settings Web Image Monitor: Reset Printer Job These settings are in [Device Management]. Settings User Mach File Unset [Reset Current Job] – – – – – [Reset All Jobs] – – – – –...
  • Page 647 Web Image Monitor: Reset the Machine Web Image Monitor: Reset the Machine These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Reset the Machine] –...
  • Page 648 9. List of Operation Privileges for Settings Web Image Monitor: Device Home Management These settings are in [Device Management]. When administrator authentication is set, the restrictions to user operations differ depending on the configurations in "Available Settings". Settings User Mach File Unset [Edit Icons]...
  • Page 649 Web Image Monitor: Screen Monitoring Web Image Monitor: Screen Monitoring These settings are in [Device Management]. Settings User Mach File Unset [Display Device's Screen] – – – – –...
  • Page 650 9. List of Operation Privileges for Settings Web Image Monitor: Customize Screen per User Users can change only their own settings. Settings User Mach File Unset [Edit Icons] – – – – – [Restore Default Icon Display] – – – –...
  • Page 651 Web Image Monitor: Document Server Web Image Monitor: Document Server These settings are in [Print Job/Stored File]. What users can do with stored files depends on their access privileges. For details, see page 364 "List of Operation Privileges for Stored Files". Settings User Mach...
  • Page 652: Web Image Monitor: Fax Received File

    9. List of Operation Privileges for Settings Web Image Monitor: Fax Received File These settings are in [Print Job/Stored File]. Settings User Mach File Unset [Print] – – – – [Delete] – – – – [Download] – – – – Edit detailed information] –...
  • Page 653 Web Image Monitor: Printer: Print Jobs Web Image Monitor: Printer: Print Jobs These settings are in [Print Job/Stored File]. Users can use the printer documents stored themselves or stored when user authentication is off. The printer documents stored by other users are not displayed. Settings User Mach...
  • Page 654 9. List of Operation Privileges for Settings List of Operation Privileges for Stored Files Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 655 List of Operation Privileges for Stored Files Settings Read Edit Full Owner File [Print Specified Page] – *1 The owner can change operation privileges.
  • Page 656 9. List of Operation Privileges for Settings List of Operation Privileges for Address Books Understanding headers • Read Users configured for read privileges. • Edit Users configured for editing privileges. • E/D Users configured for edit/delete privileges. • Full Users configured for full control privileges. •...
  • Page 657 List of Operation Privileges for Address Books Settings Read Edit Full Entry User [Login User Name] – – – – [Login Password] – – – – [SMTP Authentication] – – – – [Folder Authentication] – [LDAP Authentication] – – – –...
  • Page 658 9. List of Operation Privileges for Settings Settings Read Edit Full Entry User [Select Line] [Adv. Features] [International TX Mode] [Fax Header] [Label Insertion] [E-mail] Settings Read Edit Full Entry User [E-mail Address] [Use E-mail Address for] [Send via SMTP Server] [Folder] Settings Read...
  • Page 659 List of Operation Privileges for Address Books Settings Read Edit Full Entry User [Search] – [Switch Title] • When either or both of [Restrict Adding of User Destinations (Fax)] or [Restrict Adding of User Destinations (Scanner)] of [Extended Security] are set to [On], regardless of the user's operation privileges, access to the Address Book is rescinded from any user other than the user administrator.
  • Page 660 9. List of Operation Privileges for Settings Trademarks Adobe, Acrobat, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Mac OS and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. LINUX is a registered trademark of Linus Torvalds.
  • Page 661 Trademarks ® ® Microsoft Windows 7 Professional ® ® Microsoft Windows 7 Ultimate ® ® Microsoft Windows 7 Enterprise • The product names of Windows 8 are as follows: ® ® Microsoft Windows ® ® Microsoft Windows 8 Pro ® ®...
  • Page 662 9. List of Operation Privileges for Settings...
  • Page 663 INDEX Error code............Error message............Access Control............. ESP Protocol............Access permission for stored files...... Extended security functions........ Address Book access permission......Administrator............Administrator privileges........Firmware validity..........Administrator registration........AH Protocol..........142, 143 IEEE 802.1X............AH Protocol + ESP Protocol....... 142, 143 device certificate.............
  • Page 664 Password for stored files........Windows authentication........Password lockout function........Password Policy........... PDFs with electronic signatures......Print from Media............ Print volume use............. Printer job authentication........Remote Service............ Restrict Adding of User Destinations (Fax)..Restrict Adding of User Destinations (Scanner) Restrict Display of User Information....Restrict Use of Destinations (Fax).......
  • Page 665 MEMO...
  • Page 666 MEMO D136-7676...
  • Page 668 D136-7676 © 2013...
  • Page 669 Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 671 TABLE OF CONTENTS 1. Introduction Start Installer................................3 Software and Utilities Included on the CD-ROM.....................5 Printer Drivers..............................5 TWAIN Driver..............................7 LAN-Fax Driver...............................8 Font Manager..............................9 For Mac OS X Users............................10 2. Installing the Printer Driver Confirming the Connection Method....................... 11 Network Connection........................... 11 Local Connection............................
  • Page 672 Configuring Option Settings for the Facsimile................... 49 5. Troubleshooting Messages Displayed When Installing the Printer Driver................51 If USB Connection Fails........................... 53 6. Installing the Printer Driver Under Mac OS X Installing the PPD Files............................55 Registering the Printer............................56 USB Connection............................56 Network Connection...........................
  • Page 673: Introduction

    1. Introduction This chapter explains the software included on the supplied CD-ROM. Start Installer To connect this machine to a client computer and use its printer, scanner, and fax functions, the software included on the provided CD-ROM must be installed on the client computer. The installer starts automatically when you insert the provided CD-ROM into the CD-ROM drive of a client computer running under Windows or Windows Server.
  • Page 674 1. Introduction Browse This CD-ROM Browses the contents of this CD-ROM. Exit Quits Installer. • Manage Printers permission is required to install the driver. Log on as an Administrators group member. • Auto Run might not work automatically with certain OS settings. If this is the case, double-click "Setup.exe", located on the CD-ROM root directory, or click [Run SETUP.EXE] in the [AutoPlay] dialog box.
  • Page 675: Software And Utilities Included On The Cd-Rom

    Software and Utilities Included on the CD-ROM Software and Utilities Included on the CD-ROM This section explains the software and utilities CD-ROM provided with this machine. • For the latest information on the corresponding operating system, see "Readme.txt" file in the DRIVERS folder.
  • Page 676 1. Introduction *6 Microsoft Windows Server 2003 Standard Edition/Microsoft Windows Server 2003 Enterprise Edition/ Microsoft Windows Server 2003 R2 Standard Edition/Microsoft Windows Server 2003 R2 Enterprise Edition *7 Microsoft Windows Server 2008 Standard/Microsoft Windows Server 2008 Enterprise/Microsoft Windows Server 2008 R2 Standard/Microsoft Windows Server 2008 R2 Enterprise *8 Microsoft Windows Server 2012 Foundation/Microsoft Windows Server 2012 Essentials/Microsoft Windows Server 2012 Standard *9 Mac OS X 10.5 or later...
  • Page 677: Twain Driver

    Software and Utilities Included on the CD-ROM Printer Language Supported languages PCL 5c PCL 6 PostScript 3 PPD (Mac OS X) Danish Finnish Hungarian Czech Polish Portuguese Russian Catalan Turkish Brazilian Portuguese Greek : Supported : Supported, but the printer language is displayed in English *1 The PCL 5c printer driver does not support Brazilian Portuguese and Greek.
  • Page 678: Lan-Fax Driver

    1. Introduction PC/AT-compatible machines that support the following operating system properly • Operating system Windows XP/Vista/7/8 Windows Server 2003/2003 R2/2008/2008 R2/2012 *1 TWAIN scanner runs on a 64-bit operating system, but is not compatible with 64-bit applications. Use it with 32-bit applications. •...
  • Page 679: Font Manager

    Software and Utilities Included on the CD-ROM • For details about installing the driver, see page 45 "Installing the LAN-Fax Driver". Font Manager For installing new screen fonts, or organizing and managing fonts already in the system. For details about Font Manager, see the manual on the CD-ROM. File path The software is included in the following folder on the CD-ROM: \FONTMAN\DISK1...
  • Page 680: For Mac Os X Users

    1. Introduction For Mac OS X Users If you are using Mac OS X, the following limitations apply to each function: • When using the scanner function, the TWAIN driver cannot be used. • When using the fax function, the LAN-Fax driver cannot be used. •...
  • Page 681: Installing The Printer Driver

    2. Installing the Printer Driver This chapter explains how to install and configure the printer drivers for use on the Windows operating system. Installing procedures on Windows 7 is shown as an example except where indicated. Confirming the Connection Method This machine supports network and local connection.
  • Page 682 2. Installing the Printer Driver Windows 8, Windows Server 2012 Connection Method Available Ports • Ethernet • Standard TCP/IP port • Wireless LAN • IPP port • LPR port • WSD port • For details about how to install the printer driver for each type of port, see page 16 "Installing the Printer Driver for the Selected Port".
  • Page 683: Local Connection

    Confirming the Connection Method • For details about how to install the printer driver to print server, see page 25 "Using as a Network Printer". Local Connection Local connections can be established via USB, parallel and Bluetooth connections. • For details about how to install the printer driver for each method of connections, see page 29 "Installing the Printer Driver for a Local Connection".
  • Page 684: Quick Install

    2. Installing the Printer Driver Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set. •...
  • Page 685 Quick Install 1. On the Charm Bar, click [Search], and then click [Computer]. 2. Double-click the CD-ROM drive in which the provided CD-ROM is set, and then click "Setup.exe".
  • Page 686: Installing The Printer Driver For A Network Connection

    2. Installing the Printer Driver Installing the Printer Driver for a Network Connection This section describes the installation procedure of the printer drivers for network connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 687 Click [Next]. Enter the machine name or IP address, and then click [Next]. When the device type selection appears, select "RICOH Network Printer C model". Click [Finish]. Select the [Printer Name:] check box of the machine model you want to use.
  • Page 688 2. Installing the Printer Driver 2. Double-click the CD-ROM drive in which the provided CD-ROM is set, and then click "Setup.exe". Using the IPP port • To print via IPP-SSL, use the SmartDeviceMonitor for Client port. • Installation of the certificate is especially necessary for users who want to print via IPP-SSL from Windows Vista/7/8 or Windows Server 2008/2008 R2/2012.
  • Page 689 Installing the Printer Driver for a Network Connection • PCL 5c 32-bit driver D:\X86\DRIVERS\PCL5C\XP_VISTA\(Language)\DISK1 64-bit driver D:\X64\DRIVERS\PCL5C\X64\(Language)\DISK1 • PCL 6 32-bit driver D:\X86\DRIVERS\PCL6\XP_VISTA\MUI\DISK1 64-bit driver D:\X64\DRIVERS\PCL6\X64\MUI\DISK1 • PostScript 3 32-bit driver D:\X86\DRIVERS\PS\XP_VISTA\MUI\DISK1 64-bit driver D:\X64\DRIVERS\PS\X64\MUI\DISK1 For details about the languages supported in the printer drivers, see page 6 "Supported languages".
  • Page 690 2. Installing the Printer Driver The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. If installing the PostScript 3 printer driver, proceed to step 7. Select a printer driver you want to use, and then click [Next].
  • Page 691 Installing the Printer Driver for a Network Connection Click [Locate and install driver software (recommended)]. Click [Browse my computer for driver software (advanced)]. Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click [Close]. Click [Browse...], and then specify the location of the INF file.
  • Page 692 2. Installing the Printer Driver On the [Start] menu, click [Devices and Printers]. If you are using a computer that is running Windows 8 or Windows Server 2012, click [Search] on the Charm Bar, and then click [Control Panel]. When the [Control Panel] window appears, click [View devices and printers].
  • Page 693 Installing the Printer Driver for a Network Connection • To stop installation of the selected driver, click [Cancel] before the installation is complete. When re-installing the WSD Port, right-click the machine's icon in the [Network] window, and then click [Uninstall]. Using the SmartDeviceMonitor for Client port To use this function, you must first download SmartDeviceMonitor for Client from the manufacturer's Web site and install it on your computer.
  • Page 694 2. Installing the Printer Driver https://192.168.15.16/printer You can enter "http://machine's IP address/ipp" as the machine's address. Enter a name for identifying the machine in the [IPP Port Name] box. Use a name different from the one of any existing ports. If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port name.
  • Page 695: Using As A Network Printer

    Installing the Printer Driver for a Network Connection Right-click the icon of the machine you want to use, and then click [Printer properties]. Click the [Ports] tab, and then click [Configure Port]. The [Port Configuration:] window appears. • User, proxy, and timeout settings can be configured for IPP. •...
  • Page 696 2. Installing the Printer Driver Select [Specify a new port], and then click [Next]. Select [Network Printer], and then click [Next]. Double-click the computer name you want to use as a print server in the [Browse for Printer] window. Select the machine you want to use, and then click [OK]. Select the [Printer Name:] check box of the machine model you want to use.
  • Page 697 Installing the Printer Driver for a Network Connection The software license agreement appears in the [License Agreement] dialog box. After reading the agreement, click [I accept the agreement.], and then click [Next]. If installing the PostScript 3 printer driver, proceed to step 7. Select a printer driver you want to use, and then click [Next].
  • Page 698 2. Installing the Printer Driver Banner Page Do not use NetWare to configure banner page. Follow the procedure below to disable banner page according to the operating system used: • Clear the [Enable banner] check box on the [NetWare Settings] tab in the printer properties dialog box.
  • Page 699: Installing The Printer Driver For A Local Connection

    Installing the Printer Driver for a Local Connection Installing the Printer Driver for a Local Connection This section describes the installation procedure of the printer drivers for USB, parallel, or Bluetooth connection. • Manage Printers permission is required to install the driver. Log on as an Administrators group member.
  • Page 700 2. Installing the Printer Driver Connect the machine and computer using the USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Select [No, not this time], and then click [Next]. Click [Install from a list or specific location [Advanced]], and then click [Next].
  • Page 701 Installing the Printer Driver for a Local Connection Check that the power of the machine is off. Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. In the [Found New Hardware] window, click [Locate and install driver software (recommended)].
  • Page 702 2. Installing the Printer Driver Connect the machine and computer using a USB cable. Connect the USB cable firmly. Turn on the power of the machine. Found New Hardware Wizard starts, and USB Printing Support is installed automatically. Click [Devices and Printers] from the [Start] menu. If you are using a computer that is running Windows 8 or Windows Server 2012, click [Search] on the Charm Bar, and then click [Control Panel].
  • Page 703: Parallel Connection

    Installing the Printer Driver for a Local Connection Click [Close]. If the printer driver has already been installed and plug and play is enabled, the icon of the printer connected to the "USB001" port is added to the [Printers], [Printers and Faxes], or [Devices and Printers] window.
  • Page 704: Bluetooth Connection

    2. Installing the Printer Driver 1. On the Charm Bar, click [Search], and then click [Computer]. 2. Double-click the CD-ROM drive in which the provided CD-ROM is set, and then click "Setup.exe". Bluetooth Connection • The Bluetooth unit and the wireless LAN unit cannot be used simultaneously. Supported profiles and restrictions Supported Profiles •...
  • Page 705 Installing the Printer Driver for a Local Connection • To connect to a Bluetooth printer, your computer must have a Bluetooth device installed. Make sure a Bluetooth device is installed on your computer. Windows XP, Windows Server 2003/2003 R2 Quit all applications. (Do not close this manual.) On the [Start] menu, click [Printers and Faxes].
  • Page 706 2. Installing the Printer Driver In the [Add Printer] window, select [Add a network, wireless or Bluetooth printer], and then click [Next]. The computer begins searching for available Bluetooth devices. From the list of discovered devices, select the machine you want to use, and then click [Next].
  • Page 707 Installing the Printer Driver for a Local Connection To share the printer, configure the necessary settings, and then click [Next]. If you want to print a test page, click [Print a test page] on the "Test Print" page. Otherwise, click [Finish]. •...
  • Page 708: Configuring Option Settings For The Printer

    2. Installing the Printer Driver Configuring Option Settings for the Printer When bidirectional communication works correctly, your computer obtains information about option, paper size and paper feed direction settings from the machine automatically. Bidirectional communication also allows you to monitor machine status. When bidirectional communication is disabled, you have to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 709: If Bidirectional Communication Is Disabled

    Configuring Option Settings for the Printer • The PCL 5c printer driver supports bidirectional communication. You can update the printer status manually. If Bidirectional Communication is Disabled This section describes how to set up option, paper size and paper feed direction settings on your computer manually.
  • Page 710 2. Installing the Printer Driver • For details about making option settings for the machine using a Mac OS X, see page 58 "Configuring Option Settings for the Printer Under Mac OS X".
  • Page 711: Installing Font Manager

    Installing Font Manager Installing Font Manager • Manage Printers permission is required to install Font Manager. Log on as an Administrators group member. • The operating systems compatible with Font Manager are Windows XP/Vista. Quit all applications. (Do not close this manual.) Insert the provided CD-ROM into the computer's CD-ROM drive.
  • Page 712 2. Installing the Printer Driver...
  • Page 713: Installing The Scanner Driver

    3. Installing the Scanner Driver This chapter explains how to install the TWAIN driver on a client computer. Installing procedures on Windows 7 is shown as an example except where indicated. Installing the TWAIN Driver To use the network TWAIN scanner, you must install the TWAIN driver on a client computer. Quit all applications.
  • Page 714: Installing A Twain-Compliant Application On The Same Client Computer

    3. Installing the Scanner Driver Installing a TWAIN-Compliant Application on the Same Client Computer To use this machine as a network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder, must be installed on the client computer. You can download DeskTopBinder from the manufacturer's Web site and then install it on the client computer.
  • Page 715: Installing The Facsimile Driver

    4. Installing the Facsimile Driver This chapter explains how to install and configure the LAN-Fax driver on a client computer. Installing procedures on Windows 7 is shown as an example except where indicated. Installing the LAN-Fax Driver Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps you edit LAN-Fax transmission destinations.
  • Page 716: Specifying The Port When Installing The Lan-Fax Driver

    4. Installing the Facsimile Driver Click [Continue]. The installation starts. Click [Finish]. • The [Auto Play] dialog box is displayed only for a few seconds under Windows 8 and Windows Server 2012. If the [AutoPlay] dialog box disappears, use the following procedure to replay the CD-ROM: 1.
  • Page 717 Installing the LAN-Fax Driver Procedure/description in the Procedure/description in the Items to be replaced printer driver LAN-Fax driver Select the check box of the The procedures in the [Install Select [Printer Name : <LAN- machine model you want to Printer Driver] dialog box Fax Generic>].
  • Page 718: Setting Lan-Fax Driver Properties

    4. Installing the Facsimile Driver Setting LAN-Fax Driver Properties • Manage Printers permission is required to set the properties for the LAN-Fax driver. Log on as an Administrators group member. • The method for selecting the LAN-Fax driver will vary according to your operating system. For details, see Windows Help.
  • Page 719: Configuring Option Settings For The Facsimile

    Setting LAN-Fax Driver Properties Configuring Option Settings for the Facsimile Open the printer windows. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Printers and Faxes]. • Windows Vista, Windows Server 2008: On the [Start] menu, select [Control Panel], and then click [Printers] in [Hardware and Sound] category.
  • Page 720 4. Installing the Facsimile Driver • Check Destination Select the check box to confirm the destinations before sending. IP-Fax To use IP-Fax, select the [Enable IP-Fax] check box, and then specify the protocol in [Valid protocol:]. • If the options on this machine are not configured as instructed, LAN-Fax functions may fail. •...
  • Page 721: Troubleshooting

    5. Troubleshooting This chapter provides solutions for driver installation and USB connection problems. Messages Displayed When Installing the Printer Driver This section describes what to do if a message appears when installing the printer driver. Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the printer driver using Add Printer Wizard.
  • Page 722 5. Troubleshooting For details about the languages supported in the printer drivers, see page 6 "Supported languages". Specify a port. • Available ports vary according to your Windows operating system or the type of interface. For details, see page 11 "Confirming the Connection Method".
  • Page 723: If Usb Connection Fails

    If USB Connection Fails If USB Connection Fails This section describes how to troubleshoot a problem related to USB connections. Problem Causes Solutions The machine is not The USB cable is not Disconnect the USB cable from the automatically recognized. connected properly.
  • Page 724 5. Troubleshooting...
  • Page 725: Installing The Printer Driver Under Mac Os

    6. Installing the Printer Driver Under Mac OS X This chapter explains how to install and configure the printer drivers for use on the Mac OS X operating system. Installing the PPD Files To print using the printer specific features under Mac OS X, install the PPD files. •...
  • Page 726: Registering The Printer

    6. Installing the Printer Driver Under Mac OS X Registering the Printer To use the machine, the printer must be registered in the printer list. Make sure the machine and computer are connected and turned on, and perform the following procedure.
  • Page 727: Network Connection

    Registering the Printer Network Connection Start System Preferences. Click [Print & Fax] or [Print & Scan]. Click the [ ] button. Click [Default]. Select the printer that has "Bonjour" indicated in the [Kind] column. If the printer name is not displayed, select the icon that corresponds to your network environment (TCP/IP, etc.).
  • Page 728 6. Installing the Printer Driver Under Mac OS X Configuring Option Settings for the Printer Under Mac OS X This section explains how to configure the printer driver. Start System Preferences. Click [Print & Fax] or [Print & Scan]. Select the printer you are using, and then click [Options & Supplies...]. Click [Driver], and then configure settings as needed.
  • Page 729: Appendix

    7. Appendix Updating or Deleting the Driver • Administrator permission is required to update or delete the driver in use. Log on as an Administrators group member. • For driver updates, select a driver that is compatible with the printer and driver type you are using. An error may result if you select a driver that is not compatible with the printer and driver type.
  • Page 730: Deleting The Driver

    7. Appendix Right-click the machine's icon, and then click [Printer properties]. Click the [Advanced] tab. Click [New Driver...], and then click [Next]. Click [Have Disk...]. Click [Browse...], and then select the driver location. Click [OK]. Select the machine model, and then click [Next]. The driver update starts.
  • Page 731 Updating or Deleting the Driver On the [File] menu, point to [Run as administrator], and then click [Server Properties...]. Click the [Drivers] tab. Select the driver you want to delete, and then click [Remove...]. Select [Remove driver and driver package.], and then click [OK]. Click [Yes].
  • Page 732 7. Appendix TWAIN driver Start uninstaller. • Windows XP, Windows Server 2003/2003 R2: On the [Start] menu, select [Control Panel], and then click [Add or Remove Programs]. • Windows Vista/7, Windows Server 2008/2008 R2: On the [Start] menu, select [Control Panel], and then click [Uninstall a program]. •...
  • Page 733: Trademarks

    Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 734 7. Appendix ® ® Microsoft Windows 8 Enterprise • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition • The product names of Windows Server 2003 R2 are as follows: ®...
  • Page 735: Index

    INDEX Network printer..........12, 25 Bidirectional communication........ BIP................Option settings.......... 38, 49, 58 Bluetooth..............Bluetooth printer............ Parallel connection..........PCL............5, 14, 16, 25 CD-ROM..............PostScript 3..........5, 16, 25 Confirming the connection method...... PPD................Connection fails............. Printer driver..........5, 16, 29 Printer port type.............
  • Page 736 MEMO...
  • Page 737 MEMO...
  • Page 738 MEMO D136-7604...
  • Page 740 D136-7604 © 2012...
  • Page 741 PCL 6/5c Printer Driver Installation Guide This manual assumes that you are familiar with general Windows procedures and practices. If you are not, see the documentation that comes with Windows for details. Before starting this installation, close all documents and applications. In a net- ❒...
  • Page 742 Installing the PCL 6/5c Printer Driver Auto Run starts the installer automatically when you load the CD-ROM in the CD-ROM drive. Two kinds of PCL printer drivers, PCL 6 and PCL 5c, are provided with this machine. We recommend PCL 6 as your first choice. TCP/IP requires the following: •...
  • Page 743: Setting Up Options

    Auto Run might not automatically work with certain OS settings. In this ❒ case, launch “Setup.exe” located on the CD-ROM root directory. [Auto Play] dialog box is displayed only for a few seconds under Win- ❒ dows 8 and Windows Server 2012. If the [Auto Play] dialog box disappears, use the following procedure to replay the CD-ROM: 1.
  • Page 744 Trademarks Microsoft , Windows , Windows Server , and Windows Vista are either regis- ® ® ® ® tered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. is a registered trademark of Hewlett-Packard Company. ® Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 745 • The product names of Windows Server 2008 R2 are as follows: Microsoft Windows Server 2008 R2 Standard ® ® Microsoft Windows Server 2008 R2 Enterprise ® ® • The product names of Windows Server 2012 are as follows: Microsoft Windows Server 2012 Foundation ®...
  • Page 746 Read This First Manuals Provided with This Machine Safety Information for This Machine Other Information for This Machine Appendix For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this machine and keep it handy for future reference.
  • Page 748 TABLE OF CONTENTS How to Read the Manuals..........................2 Symbols Used in the Manuals........................2 Disclaimer................................2 Notes................................3 Machine Types............................... 3 1. Manuals Provided with This Machine Manuals for This Machine..........................5 Manuals List..............................7 On-screen Operating Instructions........................9 Formats of the Operating Instructions......................9 Reading the HTML Manuals on the CD-ROM.....................9 Installing and Opening the HTML Manuals....................
  • Page 749: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 750: Notes

    Notes The manufacturer shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the manufacturer with your office products. For good output quality, the manufacturer recommends that you use genuine toner from the manufacturer.
  • Page 752: Manuals Provided With This Machine

    1. Manuals Provided with This Machine This chapter explains manuals for this machine. Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. •...
  • Page 753 1. Manuals Provided with This Machine Copy/ Document Server Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to specify the settings for originals. Print Describes how to print using the printer driver. It also describes the functions available for printing. Scan Describes how to scan paper data using this machine and how to send the scanned data to a computer and store the data.
  • Page 754: Manuals List

    Manuals for This Machine • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian. • The following software products are referred to using general names: Product name General name ScanRouter EX Professional the ScanRouter delivery software ScanRouterEX Enterprise *1 The ScanRouter EX Professional and ScanRouterEX Enterprise are no longer available for sale.
  • Page 755 1. Manuals Provided with This Machine Printed Manuals HTML Manuals PDF Manuals Manual Name Provided Provided Provided Security Guide Guide to Paper Driver Installation Guide • Driver Installation Guide and HTML manuals are available in English, German, French, Italian, Spanish, Dutch, and Russian.
  • Page 756: On-Screen Operating Instructions

    On-screen Operating Instructions On-screen Operating Instructions This chapter describes the on-screen operating instructions of this machine. The on-screen operating instructions are included in the supplied manual CD-ROM. Formats of the Operating Instructions The operating instructions of this machine are provided in the following formats: •...
  • Page 757: Installing And Opening The Html Manuals

    1. Manuals Provided with This Machine Installing and Opening the HTML Manuals This section describes how to install and open the HTML manuals on your computer. For your convenience, we recommend you install these manuals on your computer. Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK].
  • Page 758 On-screen Operating Instructions Insert the CD-ROM in the CD-ROM drive of your computer. Select a language, and then click [OK]. Click [Read PDF manuals]. Click the title of the manual you want to view. • To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your computer.
  • Page 759 1. Manuals Provided with This Machine...
  • Page 760: Safety Information For This Machine

    2. Safety Information for This Machine This chapter describes the safety precautions. Safety Information Safety During Operation In this manual, the following important symbols are used: Indicates a potentially hazardous situation which, if instructions are not followed, could result in death or serious injury.
  • Page 761 2. Safety Information for This Machine • Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur. • Do not place heavy objects on the machine. Doing so can cause the machine to topple over, possibly resulting in injury.
  • Page 762 Safety Information • Do not use power cords that are damaged, broken, or modified. Also, do not use power cords that have been trapped under heavy objects, pulled hard, or bent severely. Doing so could result in fire or electric shock. •...
  • Page 763 2. Safety Information for This Machine • Be sure to disconnect the power cord from the wall outlet at least once a year and check for the following: • The power cord's inner wires are exposed, broken, etc. • The power cord's coating has a crack or dent. •...
  • Page 764 Safety Information • Be sure to locate the machine as close as possible to a wall outlet. This will allow easy disconnection of the power cord in the event of an emergency. • If the machine emits smoke or odours, or if it behaves unusually, you must turn off its power immediately.
  • Page 765 2. Safety Information for This Machine • Contact your service representative if you need to lift the machine (such as when relocating it to another floor). Do not attempt to lift the machine without the assistance of your service representative. The machine will be damaged if it topples or is dropped, resulting in malfunction and risk of injury to users.
  • Page 766 Safety Information • The inside of the machine could be very hot. Do not touch the parts with a label indicating the "hot surface". Otherwise, an injury might occur. • When removing jammed paper, make sure not to trap or injure your fingers. •...
  • Page 767 2. Safety Information for This Machine • Do not use a vacuum cleaner to remove spilled toner (including used toner). Absorbed toner may cause a fire or explosion due to electrical contact flickering inside the vacuum cleaner. However, it is possible to use a vacuum cleaner that is explosion-proof and dust ignition-proof. If toner is spilled on the floor, remove the spilled toner slowly using a wet cloth, so that the toner is not scattered.
  • Page 768 Safety Information • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible. •...
  • Page 769: Safety Labels Of This Machine

    2. Safety Information for This Machine Safety Labels of This Machine This section explains the machine's safety information labels. Positions of WARNING and CAUTION labels This machine has labels for WARNING and CAUTION at the positions shown below. For safety, please follow the instructions and handle the machine as indicated.
  • Page 770 Safety Labels of This Machine Keep your hands clear of the parts a label indicates. Otherwise, you might trap your fingers and an injury might occur. This label indicates the weight of the unit. However, this label is meant for customer engineers and operators who have received training.
  • Page 771 2. Safety Information for This Machine Paper trays CUZ207 The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur. The inside of the machine could be very hot. Do not touch the parts which a label is put on. Otherwise, an injury might occur.
  • Page 772 Safety Labels of This Machine Finisher SR4090 or Booklet Finisher SR4100 CUZ203 During operation, rollers for transporting the paper revolve. Take care not to touch rollers during operation. Otherwise, an injury might occur. Keep your hands clear of the booklet finisher tray when pulling out or pushing in the finisher's staple unit, or removing paper jam.
  • Page 773 2. Safety Information for This Machine Multi-Folding Unit CUZ204 Do not touch the parts a label indicates. The inside of the Multi-Folding Unit could be very hot. Caution should be taken when removing misfed paper. Do not touch the parts a label indicates. The inside of the Multi-Folding Unit could be very hot. Caution should be taken when removing misfed paper.
  • Page 774: Power Switch Symbols

    Safety Labels of This Machine These labels indicate the weight of the unit and describe how to lift the unit. However, these labels are meant for customer engineers. Do not lift a unit that has these labels. Power Switch Symbols The meanings of the symbols for the switches on this machine are as follows: •...
  • Page 775 2. Safety Information for This Machine...
  • Page 776: Other Information For This Machine

    3. Other Information for This Machine This chapter describes laws and regulations related to this machine. Laws and Regulations Duplication and Printing Prohibited Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
  • Page 777 3. Other Information for This Machine protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
  • Page 778: Other Information

    Other Information Other Information ENERGY STAR Program ® ENERGY STAR Program Requirements for Imaging Equipment ® This company is a participant in the ENERGY STAR Program. This machine is compliant with the regulations specified by the ® ENERGY STAR Program. ®...
  • Page 779: Notes To Users In The State Of California (Notes To Users In Usa)

    3. Other Information for This Machine Sleep mode • If this machine remains idle for a specified period or when the [Energy Saver] key is pressed, it enters Sleep mode to further reduce its electrical consumption. • The default delay time the machine waits before entering Sleep mode is 60 minutes. This default time can be changed.
  • Page 780: Appendix

    4. Appendix This appendix describes trademarks and specifications for the machine. Specifications For specifications not described in this manual, see "Specifications", Maintenance and Specifications Warm-up time 300 seconds (23°C (73.4°F), rated voltage) First copy/print time • Type 1 • Full Color: 10 seconds •...
  • Page 781 4. Appendix Noise emission • Sound power level: Type 1 Type 2 Stand-by 52.5 dB (A) 57 dB (A) Copying 72 dB (A) 72 dB (A) • Sound pressure level: Type 1 Type 2 Stand-by 46.5 dB (A) 51 dB (A) Copying 66 dB (A) 66 dB (A)
  • Page 782: Trademarks

    Trademarks Trademarks Adobe, Acrobat, PostScript, PostScript 3, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Firefox is a registered trademark of the Mozilla Foundation. Macintosh and Safari are trademarks of Apple Inc., registered in the United States and other countries. Microsoft, Windows, Windows Server, Windows Vista, and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 783 4. Appendix • The product names of Windows Server 2003 R2 are as follows: ® ® Microsoft Windows Server 2003 R2 Standard Edition ® ® Microsoft Windows Server 2003 R2 Enterprise Edition • The product names of Windows Server 2008 are as follows: ®...
  • Page 784 © 2013...
  • Page 785 D138-7413...
  • Page 786 User Guide What You Can Do with This Machine Getting Started Copy Print Scan Document Server Web Image Monitor Adding Paper and Toner Troubleshooting For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. For safe and correct use, be sure to read the Safety Information in "Read This First"...
  • Page 787 Guide to the Names and Functions of the Machine's Control Panel Display panel [Energy Saver] key Displays keys for each function, operation status, Press to switch to and from Low Power mode or Sleep or messages. See "How to Use the Screens on mode.
  • Page 788 [Counter] key Number keys Press to check or print the counter value. See Use to enter the numbers for copies and data for the selected function. "Counter", Maintenance and Specifications [Language] key Function keys Press to change the language of the display. No functions are registered to the function keys See "Changing the Display Language", Getting as a factory default.
  • Page 789 Quick Reference Copy Guide Tips How to select a color mode... (Color Copying) Paper Size A Select a color mode. Paper Size You can check the paper size using the scale on the exposure glass. Auto Image Density Dark texture originals will be copied so that How to save paper...
  • Page 790 How to finish your document... Document Server (Basic Copying) (Basic Copying) Why use it... Staple • To store often used documents centrally A Press [Finishing]. and print on demand. B Press [Finisher]. • To reduce network load. C Select one of the stapling positions (Copies will be sorted automatically).
  • Page 791 Quick Reference Scanner Guide G Specify the destination(s). You can specify To use the scanner functions, several multiple destinations. settings must be made beforehand. For details about these settings, For scan to e-mail: see "Accessing User Tools", Connecting Before you select destination(s), make the Machine/ System Settings sure you have selected [To].
  • Page 792 How to save to the machine’s hard How to save to the machine’s hard disk... Registering an E-mail destination... disk... (Storing and Saving the Scanned Documents) (Registering Addresses and Users, Connecting the Machine/ System Settings A Press the {Home} key on the lower left of A Press the {User Tools} key.
  • Page 794 TABLE OF CONTENTS How to Read the Manuals..........................6 Symbols Used in the Manuals........................6 Model-Specific Information..........................7 Names of Major Features..........................8 1. What You Can Do with This Machine Reducing my Costs............................. 9 Converting Documents to Electronic Formats Easily..................10 Registering Destinations...........................11 Operating the Machine More Effectively......................
  • Page 795 When the Authentication Screen Is Displayed....................47 User Code Authentication Using the Control Panel.................. 47 Logging In Using the Control Panel......................47 Logging Out Using the Control Panel......................48 Placing Originals..............................49 Placing Originals on the Exposure Glass....................49 Placing Originals in the Auto Document Feeder..................49 3.
  • Page 796 Printing on Envelopes............................77 Configuring Envelope Settings Using the Control Panel................77 Printing on Envelopes Using the Printer Driver...................77 Saving and Printing Using the Document Server................... 79 Storing Documents in Document Server.....................79 Managing Documents Stored in Document Server...................80 5. Scan Basic Procedure When Using Scan to Folder....................81 Creating a Shared Folder on a Computer Running Windows/Confirming a Computer's Information..
  • Page 797 Loading Paper into the Bypass Tray......................111 Loading Tab Stock into the Bypass Tray....................112 Loading Paper into the Large Capacity Tray....................113 Loading Paper into the Wide Large Capacity Tray..................115 Loading Paper into the Interposer........................ 117 Loading Paper into the Twin Interposer....................... 119 Loading Orientation-fixed Paper or Two-sided Paper................
  • Page 798 When There Is a Problem Scanning or Storing Originals..............202 When the Home Screen Cannot Be Edited.....................203 When the Address Book Is Updated....................... 203 When Data Cannot Be Sent Due to a Problem with the Destination.............204 When the Machine Cannot Be Operated Due to a Problem with the User Certificate.......205 When Problems Occur While Logging In....................
  • Page 799: How To Read The Manuals

    How to Read the Manuals Symbols Used in the Manuals This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 800: Model-Specific Information

    Model-Specific Information This section explains how you can identify the region your machine belongs to. There is a label on the rear of the machine, located in the position shown below. The label contains details that identify the region your machine belongs to. Read the label. CUV122 The following information is region-specific.
  • Page 801: Names Of Major Features

    Names of Major Features In this manual, major features of the machine are referred to as follows: • Auto Document Feeder • LCIT RT4020 Large Capacity Tray (LCT) • LCIT RT4030 Wide Large Capacity Tray (Wide LCT) • Multi-Folding Unit FD4000 Multi-folding unit •...
  • Page 802: What You Can Do With This Machine

    1. What You Can Do with This Machine You can search for a description by what you want to do. Reducing my Costs BRL059S Printing multi-page documents on both sides of sheets (Duplex Copy) See "Duplex Copying", Copy/ Document Server Printing multi-page documents on a single sheet (Combine) See "Combined Copying", Copy/ Document Server Checking how much paper is saved ([Information] screen)
  • Page 803: Converting Documents To Electronic Formats Easily

    1. What You Can Do with This Machine Converting Documents to Electronic Formats Easily BQX138S Sending scan files See "Basic Procedure for Sending Scan Files by E-mail", Scan Sending the URL of the folder in which scan files are stored See "Sending the URL by E-mail", Scan Storing scan files in a shared folder See "Basic Procedure When Using Scan to Folder", Scan...
  • Page 804: Registering Destinations

    Registering Destinations Registering Destinations CAY062 Using the control panel to register destinations in the Address Book See "Registering a destination in the address book manually", Scan...
  • Page 805: Operating The Machine More Effectively

    1. What You Can Do with This Machine Operating the Machine More Effectively BQX139S Registering and using frequently-used settings (Program) See "Registering Functions in a Program", Convenient Functions Registering frequently-used settings as initial settings (Program as Defaults (Copier/Document Server/Scanner)) See "Changing the Default Functions of the Initial Screen", Convenient Functions Registering frequently-used printing settings to the printer driver See "Using One Click Presets", Print Changing the initial settings of the printer driver to frequently-used printing settings...
  • Page 806: Customizing The [Home] Screen

    Customizing the [Home] Screen Customizing the [Home] Screen The icons of each function are displayed on the [Home] screen. CUM002 • You can add shortcuts to often used programs or Web pages to the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons. •...
  • Page 807: Making Copies Using Various Functions

    1. What You Can Do with This Machine Making Copies Using Various Functions CJQ601 • You can make copies in full color. You can switch the color copy mode depending on the type of originals used and the desired finish. See "Copying in Color", Copy/ Document Server •...
  • Page 808 Making Copies Using Various Functions • The finisher allows you to sort, staple, and punch holes in your copies. See "Finishing", Copy/ Document Server...
  • Page 809: Printing Data Using Various Functions

    1. What You Can Do with This Machine Printing Data Using Various Functions CJQ614 • This machine supports network and local connections. • You can send PDF files directly to the machine for printing, without having to open a PDF application.
  • Page 810: Utilizing Stored Document

    Utilizing Stored Document Utilizing Stored Document You can store files scanned in copier, printer, or scanner mode on the machine's hard disk. Web Image Monitor allows you to use your computer to search for, view, print, delete, and send stored files via the network.
  • Page 811: Connecting Two Machines For Copying

    1. What You Can Do with This Machine Connecting Two Machines for Copying You can connect two machines together with copy connector. When you set up a copy job on one machine (the main machine), data is transferred to the other (the sub-machine) so that copies can be made on both machines simultaneously (Connect Copy).
  • Page 812: Using The Scanner In A Network Environment

    Using the Scanner in a Network Environment Using the Scanner in a Network Environment CJQ607 • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Basic Procedure for Sending Scan Files by E-mail", Scan •...
  • Page 813: Embedding Text Information In Scanned Files

    1. What You Can Do with This Machine Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document.
  • Page 814: Preventing Information Leakage (Security Functions)

    Preventing Information Leakage (Security Functions) Preventing Information Leakage (Security Functions) CJQ608 • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization.
  • Page 815: Centrally Controlling Scan Conditions And Distribution

    1. What You Can Do with This Machine Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data.
  • Page 816: Monitoring And Setting The Machine Using A Computer

    Monitoring and Setting the Machine Using a Computer Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. CJQ609 You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings.
  • Page 817: Preventing Unauthorized Copying

    1. What You Can Do with This Machine Preventing Unauthorized Copying You can print embedded patterns on printouts to prevent unauthorized copying. CUM003 • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages are grayed out in the copy.
  • Page 818: Getting Started

    2. Getting Started This chapter describes how to start using this machine. Guide to Names and Functions of Components • Do not obstruct the machine's vents. Doing so risks fire caused by overheated internal components. Front and left view CUV101 1.
  • Page 819 2. Getting Started 3. Control panel See "Guide to the Names and Functions of the Machine's Control Panel". 4. Front cover Open to change toner cartridges. 5. Drawer Pull out the drawer when a paper jam occurs. 6. Paper trays (Trays 1–3) Load paper here.
  • Page 820 Guide to Names and Functions of Components Front and right view CUV102 1. Attention light See page 28 "Guide to Functions of the Attention Light". 2. ADF's extender Pull this extender to support large paper. 3. Paper guides When loading paper in the bypass tray, align the paper guides flush against the paper. 4.
  • Page 821: Guide To Functions Of The Attention Light

    2. Getting Started 6. Vents Prevent overheating. Rear and left view CUV103 1. Vents Prevent overheating. Guide to Functions of the Attention Light This section introduces functions of the attention light. • Do not push or pull the attention light when installed to the machine. Doing so may result in damage or malfunction of the attention light or the machine.
  • Page 822 Guide to Names and Functions of Components CUV121 The attention light notifies the user by light when there is a paper jam or no paper is left. The colors of the lamp and their meanings are as follows: Lamp Status The bottom lamp lights blue.
  • Page 823 2. Getting Started Lamp Status The top lamp flashes yellow. Warning (Example) • Toner has nearly run out. • Waste toner bottle is nearly full. Read the message on the display panel, and then take appropriate action. For details, see "When Messages Appear", Troubleshooting...
  • Page 824: Guide To Functions Of The Machine's Options

    Guide to Functions of the Machine's Options Guide to Functions of the Machine's Options Guide to Functions of the Machine's External Options CUV104 1. Copy tray If you select this as the output tray, copied/printed paper is delivered here face down. 2.
  • Page 825 2. Getting Started 8. Buffer pass unit Cools copies or prints. 9. Twin interposer Inserts cover or slip sheets into copied or printed paper. To use the twin interposer, Finisher SR4110 is required. 10. Multi-folding unit The Multi-folding unit can apply the following folds: Half Fold, Letter Fold-out, Letter Fold-in, Double Parallel Fold, Gate Fold, and Z-fold.
  • Page 826: Changing The Display Language

    Changing the Display Language Changing the Display Language You can change the language used on the display. English is set as default. Press the [Language] key until the language you want to display appears. CUV112...
  • Page 827: How To Use The [Home] Screen

    2. Getting Started How to Use the [Home] Screen The icons of each function are displayed on the [Home] screen. You can add shortcuts to frequently used programs or Web pages to the [Home] screen. The icons of added shortcuts appear on the [Home] screen. The programs or Web pages can be recalled easily by pressing the shortcut icons.
  • Page 828: Adding Icons To The [Home] Screen

    How to Use the [Home] Screen 6. Shortcut icon You can add shortcuts to programs or Web pages to the [Home] screen. For details about how to register shortcuts, see page 35 "Adding Icons to the [Home] Screen". The program number appears on the bottom of the shortcut icon.
  • Page 829 2. Getting Started • You can change the position of icons. For details, see "Changing the Order of Icons on the [Home] Screen", Convenient Functions Adding icons to the [Home] screen using Web Image Monitor Start Web Image Monitor. For details, see "Using Web Image Monitor", Connecting the Machine/ System Settings Log in to Web Image Monitor as an administrator.
  • Page 830 How to Use the [Home] Screen Press [Edit Home]. Press [Add Icon]. Press the [Program] tab.
  • Page 831 2. Getting Started Make sure that [Copier Program] is selected. Select the program you want to add. Specify the position where [Blank] is displayed. Press [OK]. Press the [User Tools] key. • Press [ ] on the upper-right corner of the screen to check the position on the simple screen.
  • Page 832: Registering Functions In A Program

    Registering Functions in a Program Registering Functions in a Program Depending on the functions, the number of programs that can be registered is different. • Copier: 25 programs • Document Server: 25 programs • Scanner: 25 programs The following settings can be registered to programs: Copier: Color mode, original type, density, Special Original, paper tray, Store File (except for User Name, File Name, and Password), Auto Reduce / Enlarge, Create Margin, Finishing, Cover/Slip Sheet,...
  • Page 833 2. Getting Started Press the [Program] key. CUP001 Press [Program]. Press the program number you want to register. Enter the program name. Press [OK]. Press [Exit]. • You can enter up to 34 characters for a program name. • When a specified program is registered as the default, its values become the default settings, which are displayed without pressing the [Program] key, when modes are cleared or reset, and after the machine is turned on.
  • Page 834: Example Of Programs

    Registering Functions in a Program • Destinations can be registered to a program of the scanner mode only when [Include Destinations] is selected for [Program Setting for Destinations] in [Scanner Features]. For details about the setting, see "General Settings", Scan •...
  • Page 835 2. Getting Started Program name Program description Effect Stamping Specify [User Stamp] in [Edit / You can stamp the name of your corporate name Color]. company on copies of working or copy architectural drawings. Your company name needs to be pre- registered in the machine.
  • Page 836 Registering Functions in a Program Program name Program description Effect Unified-size scan In [Scan Settings], select [Mixed You can skip this procedure to unify Original Sizes] in [Scan Size] and the size when reprinting scanned specify the finished size of scanned data.
  • Page 837 2. Getting Started • Depending on your business details or the type of documents to be scanned, registering a program cannot be recommended.
  • Page 838: Turning On/Off The Power

    Turning On/Off the Power Turning On/Off the Power The main power switch is on the left side of the machine. When this switch is turned on, the main power turns on and the main power indicator on the right side of the control panel lights up. When this switch is turned off, the main power turns off and the main power indicator on the right side of the control panel goes out.
  • Page 839 2. Getting Started Open the main power switch cover, and then push the main power switch. The main power indicator goes out. The main power turns off automatically when the machine shuts down. If the screen on the control panel does not disappear, contact your service representative.
  • Page 840: When The Authentication Screen Is Displayed

    When the Authentication Screen Is Displayed When the Authentication Screen Is Displayed If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is active, the authentication screen appears on the display. The machine only becomes operable after entering your own Login User Name and Login Password. If User Code Authentication is active, you cannot use the machine until you enter the User Code.
  • Page 841: Logging Out Using The Control Panel

    2. Getting Started Press [Login]. Enter a Login User Name, and then press [OK]. Enter a Login Password, and then press [OK]. When the user is authenticated, the screen for the function you are using appears. Logging Out Using the Control Panel This section explains the procedure for logging out the machine when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 842: Placing Originals

    Placing Originals Placing Originals Placing Originals on the Exposure Glass • Keep your hands away from the hinges and exposure glass when lowering the ADF. Not doing so may result in an injury if your hands or fingers are pinched. •...
  • Page 843 2. Getting Started CVA058 1. Sensors Adjust the original guide to the original size. Place the aligned originals squarely face up in the ADF. Do not stack originals beyond the limit mark. The first page should be on the top. CVA059 1.
  • Page 844: Copy

    3. Copy This chapter describes frequently used copier functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Basic Procedure To make copies of originals, place them on the exposure glass or in the ADF. When placing the original on the exposure glass, start with the first page to be copied.
  • Page 845 3. Copy Press the [Start] key. When placing the original on the exposure glass, press the [ ] key after all originals are scanned. Some functions such as Batch mode may require that you press the [ ] key when placing originals in the ADF.
  • Page 846: Auto Reduce / Enlarge

    Auto Reduce / Enlarge Auto Reduce / Enlarge The machine automatically detects the original size and then selects an appropriate reproduction ratio based on the paper size you select. CKN008 • If you select a reproduction ratio after pressing [Auto Reduce / Enlarge], [Auto Reduce / Enlarge] is canceled and the image cannot be rotated automatically.
  • Page 847 3. Copy Press [Auto Reduce / Enlarge]. Select the paper size. Place the originals, and then press the [Start] key.
  • Page 848: Duplex Copying

    Duplex Copying Duplex Copying Copies two 1-sided pages or one 2-sided page onto a 2-sided page. During copying, the image is shifted to allow for the binding margin. CKN009 There are two types of Duplex. 1 Sided 2 Sided Copies two 1-sided pages on one 2-sided page. 2 Sided 2 Sided Copies one 2-sided page on one 2-sided page.
  • Page 849 3. Copy Original Original Placing originals Orientation Copy Orientation Top to Top Top to Bottom Press [Dup./Combine/Series]. Make sure that [Duplex] is selected. If [Duplex] is not selected, press [Duplex]. Select [1 Sided 2 Sided] or [2 Sided 2 Sided] according to how you want the document to be output.
  • Page 850: Specifying The Original And Copy Orientation

    Duplex Copying Select the original orientation, and then press [OK]. Press the [Start] key. Specifying the Original and Copy Orientation Select the orientation of the originals and copies if the original is two-sided or if you want to copy onto both sides of the paper.
  • Page 851 3. Copy Select [Top to Top] or [Top to Bottom] for [Original:] if the original is two-sided. Select [Top to Top] or [Top to Bottom] for [Copy:]. Press [OK].
  • Page 852: Combined Copying

    Combined Copying Combined Copying This mode can be used to select a reproduction ratio automatically and copy the originals onto a single sheet of copy paper. The machine selects a reproduction ratio between 25 and 400%. If the orientation of the original is different from that of the copy paper, the machine will automatically rotate the image by 90 degrees to make copies properly.
  • Page 853: One-Sided Combine

    3. Copy CKN010 • Originals read from right to left CKN017 One-Sided Combine Combine several pages onto one side of a sheet. CKN014 There are six types of One-Sided Combine. 1 Sided 2 Originals Combine 1 Side Copies two 1-sided originals to one side of a sheet. 1 Sided 4 Originals Combine 1 Side Copies four 1-sided originals to one side of a sheet.
  • Page 854: Two-Sided Combine

    Combined Copying 2 Sided 4 Pages Combine 1 Side Copies two 2-sided originals to one side of a sheet. 2 Sided 8 Pages Combine 1 Side Copies four 2-sided originals to one side of a sheet. Press [Dup./Combine/Series]. Press [Combine]. Select [1 Sided] or [2 Sided] for [Original:].
  • Page 855 3. Copy CKN074 There are six types of Two-Sided Combine. 1 Sided 4 Originals Combine 2 Sides Copies four 1-sided originals to one sheet with two pages per side. 1 Sided 8 Originals Combine 2 Sides Copies eight 1-sided originals to one sheet with four pages per side. 1 Sided 16 Originals Combine 2 Sides Copies 16 1-sided originals to one sheet with eight pages per side.
  • Page 856 Combined Copying Select [1 Sided] or [2 Sided] for [Original:]. Press [Combine 2 Sides]. Press [Orientation]. Select [Top to Top] or [Top to Bottom] for [Original:] and/or [Copy:], and then press [OK]. Select the number of originals to combine. Press [OK]. Select the paper size.
  • Page 857: Copying Onto Custom Size Paper From The Bypass Tray

    3. Copy Copying onto Custom Size Paper from the Bypass Tray Paper that has a horizontal length of 139.7–487.7 mm (5.50–19.20 inches) and a vertical length of 90.0–330.2 mm (3.55–13.00 inches) can be fed in from the bypass tray. Note however that the limitation on the horizontal and vertical length range will vary depending on which options are installed.
  • Page 858: Copying Onto Envelopes

    Copying onto Envelopes Copying onto Envelopes This section describes how to copy onto regular size and custom size envelopes. Place the original on the exposure glass and place the envelope in the bypass tray or paper tray. Specify the thickness of the paper according to the weight of the envelopes you are printing on. For details about the relationship between paper weight and paper thickness and the sizes of envelopes that can be used, see page 124 "Recommended Paper Sizes and Types".
  • Page 859: Copying Onto Envelopes From The Paper Tray

    3. Copy Load the envelopes face up in the bypass tray. The bypass tray ( ) is automatically selected. Press the [ ] key. Press [Paper Size]. Specify the envelope size, and then press [OK] twice. Place the originals, and then press the [Start] key. Copying onto Envelopes from the Paper Tray Before using this function, specify the paper size and type under [Tray Paper Settings].
  • Page 860: Sort

    Sort Sort The machine assembles copies as sets in sequential order. • You cannot use the bypass tray with Rotate Sort. Sort/Shift Sort Copies are assembled as sets in sequential order. To use Shift Sort, a finisher is required. Each time the copies of one set or a job are delivered, the next copy is shifted to separate each set or job.
  • Page 861: Changing The Number Of Sets

    3. Copy Press [Finishing]. Press [Finisher]. Select [Sort] or [Rotate Sort], and then press [OK]. Enter the number of copy sets using the number keys. Place the originals. To confirm the type of finishing, press the [Sample Copy] key. Press the [Start] key. Changing the Number of Sets You can change the number of copy sets during copying.
  • Page 862 Sort Enter the number of copy sets with the number keys. Press [Continue]. Copying starts again.
  • Page 863: Storing Data In The Document Server

    3. Copy Storing Data in the Document Server The Document Server enables you to store documents being read with the copy feature on the hard disk of this machine. Thus you can print them later applying necessary conditions. You can check the stored documents on the Document Server screen. For details about the Document Server, see page 97 "Storing Data".
  • Page 864: Print

    4. Print This chapter describes frequently used printer functions and operations. For the information not included in this chapter, see Print on the supplied CD-ROM. Quick Install You can install the printer drivers easily from the CD-ROM provided with this machine. Using Quick Install, the PCL 6 printer driver is installed under network environment, and the Standard TCP/IP port will be set.
  • Page 865: Displaying The Printer Driver Properties

    4. Print Displaying the Printer Driver Properties This section explains how to open the printer driver properties from [Devices and Printers]. • Manage Printers permission is required to change the printer settings. Log on as an Administrators group member. • You cannot change the machine default settings for individual users. Settings made in the printer properties dialog box are applied to all users.
  • Page 866: Standard Printing

    Standard Printing Standard Printing • The default setting is 2 sided printing. If you want to print on only one side, select [Off] for the 2 sided printing setting. • If you send a print job via USB 2.0 while the machine is in Low Power mode or Sleep mode, an error message might appear when the print job is complete.
  • Page 867: Printing On Both Sides Of Sheets

    4. Print Printing on Both Sides of Sheets This section explains how to print on both sides of each page using the printer driver. • The types of paper that can be printed on both sides are as follows: • Plain, Recycled, Letterhead, Preprinted, Prepunched, Yellow, Green, Blue, Ivory, Orange, Pink, Red, Gray, Coated (Glossy), Coated (Matted) When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click...
  • Page 868: Combining Multiple Pages Into Single Page

    Combining Multiple Pages into Single Page Combining Multiple Pages into Single Page This section explains how to print multiple pages onto a single sheet. The combine printing function allows you to economize on paper by printing multiple sheets at reduced size onto a single sheet. When Using the PCL 6 Printer Driver Click the WordPad menu button in the upper left corner of the window, and then click [Print].
  • Page 869 4. Print 4 Pages per Sheet Right, then Down Down, then Right Left, then Down Down, then Left...
  • Page 870: Printing On Envelopes

    Printing on Envelopes Printing on Envelopes Configure the paper settings appropriately using both the printer driver and the control panel. Configuring Envelope Settings Using the Control Panel Load envelopes in the paper tray. Press the [Tray Paper Settings] key. CVK003 Select the paper tray in which the envelopes are loaded.
  • Page 871 4. Print In the "Input Tray:" list, select the paper tray where the envelopes are loaded. In the "Paper Type:" list, select [Envelope]. Change any other print settings if necessary. Click [OK]. Start printing from the application's [Print] dialog box.
  • Page 872: Saving And Printing Using The Document Server

    Saving and Printing Using the Document Server Saving and Printing Using the Document Server The Document Server enables you to store documents on the machine's hard disk, and allows you to edit and print them as necessary. • Applications with their own drivers, such as PageMaker, do not support this function. •...
  • Page 873: Managing Documents Stored In Document Server

    4. Print Specify the folder number to store the document in the "Folder Number" box. When "0" is specified in the "Folder Number:" box, documents will be saved in the Shared folder. If the folder is protected by a password, enter the password in the "Folder Password:" box.
  • Page 874: Scan

    5. Scan This chapter describes frequently used scanner functions and operations. For the information not included in this chapter, see Scan on the supplied CD-ROM. Basic Procedure When Using Scan to Folder • Before performing this procedure, refer to "Preparation for Sending by Scan to Folder", Scan and confirm the details of the destination computer.
  • Page 875: Creating A Shared Folder On A Computer Running Windows/Confirming A Computer's Information

    5. Scan If necessary, specify the scan settings according to the original to be scanned. Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. •...
  • Page 876 Basic Procedure When Using Scan to Folder Confirm the user name. The user name is displayed under [USERNAME]. Step 2: Creating a shared folder on a computer running Microsoft Windows Create a shared destination folder in Windows and enable sharing. In the following procedure, a computer which is running under Windows 7 Ultimate and participating in a domain is used as an example.
  • Page 877: Registering An Smb Folder

    5. Scan Step 3: Specifying access privileges for the created shared folder If you want to specify access privileges for the created folder to allow other users or groups to access the folder, configure the folder as follows: Right-click the folder created in step 2, and then click [Properties]. On the [Security] tab, click [Edit...].
  • Page 878 Basic Procedure When Using Scan to Folder The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title.
  • Page 879 5. Scan Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [OK]. Press [Exit]. Press the [User Tools] key. Locating the SMB folder manually Press [Change] under "Path".
  • Page 880: Deleting An Smb Registered Folder

    Basic Procedure When Using Scan to Folder Select the computer name of the destination computer. Shared folders under it appear. You can press [Up One Level] to switch between levels. Select the folder you want to register. Press [OK]. Deleting an SMB Registered Folder Press the [User Tools] key.
  • Page 881: Entering The Path To The Destination Manually

    5. Scan Entering the Path to the Destination Manually Press [Manual Entry]. Press [SMB]. Press [Manual Entry] on the right side of the path field. Enter the path for the folder. In the following example path, the shared folder name is "user" and the computer name is "desk01": \\desk01\user Press [OK].
  • Page 882: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E- mail Press the [Home] key on the lower left of the control panel, and press the [Scanner] icon on the [Home] screen. CUV108 Make sure that no previous settings remain. If a previous setting remains, press the [Reset] key.
  • Page 883: Registering An E-Mail Destination

    5. Scan Example: Scanning the document in color/duplex mode, and saving as a PDF file. • Press [Scan Settings], and then press [Full Color: Text / Photo] in the [Original Type] tab. • Press [Original Feed Type], and then press [2 Sided Original]. •...
  • Page 884: Deleting An E-Mail Destination

    Basic Procedure for Sending Scan Files by E-mail • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title. You can select [Frequent] and one more key for each title. Press [E-mail].
  • Page 885: Entering An E-Mail Address Manually

    5. Scan Press [E-mail]. Press [Change] under "E-mail Address". Press [Delete All], and then press [OK]. Press [OK]. Press [Exit]. Press the [User Tools] key. Entering an E-mail Address Manually Press [Manual Entry]. Enter the e-mail address. Press [OK].
  • Page 886: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files • You can specify a password for each stored file. Files that are not password-protected can be accessed by other users on the same local area network using DeskTopBinder. We recommend that you protect stored files from unauthorized access by specifying passwords.
  • Page 887: Checking A Stored File Selected From The List

    5. Scan Press [User Name], and then select a user name. To specify an unregistered user name, press [Manual Entry], and then enter the name. After specifying a user name, press [OK]. • File Name Press [File Name], enter a file name, and then press [OK]. •...
  • Page 888: Specifying The File Type

    Specifying the File Type Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a memory storage device.
  • Page 889: Specifying Scan Settings

    5. Scan Specifying Scan Settings Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. Press [OK].
  • Page 890: Document Server

    6. Document Server This chapter describes frequently used Document Server functions and operations. For the information not included in this chapter, see Copy/ Document Server on the supplied CD-ROM. Storing Data This section describes the procedure for storing documents on the Document Server. •...
  • Page 891 6. Document Server Press the [Home] key on the bottom left of the control panel, and press the [Document Server] icon on the [Home] screen. CUV108 Press [To Scanning Screen]. Press [Target Fldr. to Store]. Specify a folder in which to store the document, and then press [OK]. Press [User Name].
  • Page 892: Printing Stored Documents

    Printing Stored Documents Printing Stored Documents Prints stored documents on the Document Server. The items you can specify on the printing screen are as follows: • Paper tray • The number of prints • [Finishing] ([Output], [Finisher], [Folding Unit]) • [Cover/Slip Sheet] ([Front Cover], [Back Cover], [Designate/Chapter], [Slip Sheet]) •...
  • Page 893 6. Document Server...
  • Page 894: Web Image Monitor

    7. Web Image Monitor This chapter describes frequently used Web Image Monitor functions and operations. For the information not included in this chapter, see Connecting the Machine/ System Settings on the supplied CD-ROM or Web Image Monitor Help. Displaying Top Page This section explains the Top Page and how to display Web Image Monitor.
  • Page 895 7. Web Image Monitor 3. Refresh/Help (Refresh): Click at the upper right in the work area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire browser screen. (Help): Use Help to view or download Help file contents. 4.
  • Page 896: Adding Paper And Toner

    8. Adding Paper and Toner This chapter describes how to load paper into the paper tray and recommended paper sizes and types. Precautions for Loading Paper • When loading paper, take care not to trap or injure your fingers. • Do not stack paper over the limit mark. •...
  • Page 897 8. Adding Paper and Toner Loosen the stack by riffling the sheets. CVA068 Holding its shorter ends, flex the stack back and forth to create space between the sheets. Repeat this several times. CVA069 CVA070...
  • Page 898 Precautions for Loading Paper Make sure there is space between the sheets. CVA071...
  • Page 899: Loading Paper Into Tray 1

    8. Adding Paper and Toner Loading Paper into Tray 1 (mainly Europe and Asia) Tray 1 can hold A4 paper only. If you want to print on 8 × 11 from Tray 1, contact your service representative. (mainly North America) Tray 1 can hold 8 ×...
  • Page 900 Loading Paper into Tray 1 • Left half of the tray pulled out CVA003 Carefully push the paper tray fully in. • You can load paper even if Tray 1 is in use. It is okay to pull out the left half of the tray while Tray 1 is in use.
  • Page 901: Loading Paper Into The A3/11 × 17 Tray Unit

    8. Adding Paper and Toner Loading Paper into the A3/11 × 17 Tray Unit (mainly Europe and Asia) A3/11 × 17 tray unit can hold A3 paper only. If you want to print on A4 , B4 JIS , 11 × 17 , ×...
  • Page 902: Loading Paper Into Trays 2 And 3

    Loading Paper into Trays 2 and 3 Loading Paper into Trays 2 and 3 Each paper tray is loaded in the same way. In the following example procedure, paper is loaded into Tray 2. • Check the paper edges are aligned at the right side. •...
  • Page 903: Loading Tab Stock Into Trays 2 And 3

    8. Adding Paper and Toner • Various sizes of paper can be loaded in Trays 2 and 3 by adjusting the positions of side fences and end fence. For details, see "Changing the Paper Size in Trays 2 and 3", Paper Specifications and Adding Paper •...
  • Page 904: Loading Paper Into The Bypass Tray

    Loading Paper into the Bypass Tray Loading Paper into the Bypass Tray Use the bypass tray to use OHP transparencies, adhesive labels, translucent paper, and paper that cannot be loaded in the paper trays. • The maximum number of sheets you can load at the same time depends on paper type. Do not stack paper over the limit mark.
  • Page 905: Loading Tab Stock Into The Bypass Tray

    8. Adding Paper and Toner • When loading thick paper, thin paper, OHP transparencies, or translucent paper, specify the paper size and the paper type. • Letterhead paper must be loaded in a specific orientation. For details, see page 121 "Loading Orientation-fixed Paper or Two-sided Paper".
  • Page 906: Loading Paper Into The Large Capacity Tray

    Loading Paper into the Large Capacity Tray Loading Paper into the Large Capacity Tray (mainly Europe and Asia) The LCT can hold A4 paper only. If you want to print on 8 × 11 or B5 JIS from the LCT, contact your service representative.
  • Page 907 8. Adding Paper and Toner CVA025 Load paper by repeating steps 2 and 3. Close the top cover of the LCT.
  • Page 908: Loading Paper Into The Wide Large Capacity Tray

    Loading Paper into the Wide Large Capacity Tray Loading Paper into the Wide Large Capacity Tray • Check that the paper edges are aligned with the left side. Check that paper in the paper tray is not being used, and then pull the tray carefully out until it stops.
  • Page 909 8. Adding Paper and Toner • You can load envelopes in the wide LCT. When loading envelopes, place them in the correct orientation. For details, see page 138 "Envelopes".
  • Page 910: Loading Paper Into The Interposer

    Loading Paper into the Interposer Loading Paper into the Interposer • Do not place anything on top of or leave documents on the sensor. This may lead to the paper size not being correctly scanned or paper jams. • When using the Z-fold function, the paper in the interposer must be of the same size as the prints after they have been folded.
  • Page 911 8. Adding Paper and Toner Interposer...
  • Page 912: Loading Paper Into The Twin Interposer

    Loading Paper into the Twin Interposer Loading Paper into the Twin Interposer • Do not place anything on top of or leave documents on the sensor. This may lead to the paper size not being correctly scanned or paper jams. While pressing the release lever, align the side fences with the paper size to be loaded.
  • Page 913 8. Adding Paper and Toner • To load the paper in the twin interposer, align the orientation of originals in the ADF as shown below. Twin interposer...
  • Page 914: Loading Orientation-Fixed Paper Or Two-Sided Paper

    Loading Orientation-fixed Paper or Two-sided Paper Loading Orientation-fixed Paper or Two-sided Paper Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or copied paper) might not be printed correctly, depending on how the originals and paper are placed. Settings for the User Tools •...
  • Page 915 8. Adding Paper and Toner Original orientation Exposure glass Unreadable • Copy orientation • Scanner • Paper orientation • Copier mode Bypass tray or Copy side Tray 1 Trays 2–3 wide LCT One-sided Two-sided • Printer mode Bypass tray or Print side Tray 1 Trays 2–3...
  • Page 916 Loading Orientation-fixed Paper or Two-sided Paper • In copier mode: • For details about how to make two-sided copies, see page 55 "Duplex Copying". • In printer mode: • To print on letterhead paper when [Auto Detect] is specified for [Letterhead Setting], you must specify [Letterhead] as the paper type in the printer driver's settings.
  • Page 917: Recommended Paper Sizes And Types

    8. Adding Paper and Toner Recommended Paper Sizes and Types This section describes recommended paper sizes and types. • If you use paper that curls, either because it is too dry or too damp, a staple clogging or paper jam may occur.
  • Page 918 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 52.3–256.0 g/m (14.0 lb. 1000 sheets Bond–141.0 lb. Index) Paper Weight 1–Paper , B4 JIS , 11 × 17 , 8 Weight 7 × 14 , 8 ×...
  • Page 919 8. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52.3–256.0 g/m (14.0 lb. Select the paper size using the 550 sheets Bond–141.0 lb. Index) Tray Paper Settings menu: Paper Weight 1–Paper Weight 7 A5 , 11 × 17 , 8 ×...
  • Page 920 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity Envelopes Select the paper size using the • : 50 sheets Tray Paper Settings menu: C5 Env • : 25 sheets *1 For details about how to load custom size paper, contact your service representative. *2 The tab sheet holder is required.
  • Page 921 8. Adding Paper and Toner Paper type and weight Paper size Paper capacity 52.3–300.0 g/m (14.0 lb. • 250 sheets Bond–165.0 lb. Index) • Paper Weight 5: 100 Paper Weight 1–Paper sheets 11 × 17 , 8 × 14 , 8 ×...
  • Page 922 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity Tab stock A4 , 8 × 14 , 8 × 11 50 sheets 163.0 g/m (90.0 lb. Index), 199.0 g/m (110.0 lb. Index) *1, *3 Envelopes 25 sheets ×...
  • Page 923 8. Adding Paper and Toner Extension unit Paper type and weight Paper size Paper capacity 52.3–216.0 g/m (14.0 lb. 2500 sheets Bond–79.9 lb. Cover) Paper Weight 1–Paper Weight 6 × 11 52.3–216.0 g/m (14.0 lb. 2500 sheets Bond–79.9 lb. Cover) Paper Weight 1–Paper A4 , B4 JIS , B5 JIS , 8 ×...
  • Page 924 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 52.3–300.0 g/m (14.0 lb. Select the paper size using the 2000 sheets Bond–165.0 lb. Index) Tray Paper Settings menu: Paper Weight 1–Paper Weight 8 , B5 JIS , B6 JIS ×...
  • Page 925 8. Adding Paper and Toner Paper type and weight Paper size Paper capacity Label paper (adhesive labels) , B4 JIS 20 sheet Tab stock A4 , 8 × 14 , 8 × 11 1000 sheets 163.0 g/m (90.0 lb. Index), 199.0 g/m (110.0 lb.
  • Page 926 Recommended Paper Sizes and Types Paper type and weight Paper size Paper capacity 64.0–216.0 g/m (17.1 lb. 200 sheets Bond–79.9 lb. Cover) Paper Weight 1–Paper 11 × 17 , 8 × 11 Weight 6 × 13 , 8 × 13 , 12 × 18 ×...
  • Page 927 8. Adding Paper and Toner Paper type and weight Paper size Paper capacity 64.0–216.0 g/m (17.1 lb. Select the paper size using the 240 sheets × 2 Bond–79.9 lb. Cover) Tray Paper Settings menu: Paper Weight 1–Paper Weight 6 B5 JIS , 8 ×...
  • Page 928 Recommended Paper Sizes and Types Paper Thickness Paper Metric Bond paper Cover paper Index paper Thickness Paper Weight 52.3–65.9 14.0–17.9 lb. 19.0–24.0 lb. 29.0–36.0 lb. Bond Cover Index 66.0–80.9 18.0–21.9 lb. 24.1–29.9 lb. 36.1–44.9 lb. Paper Weight 2 Bond Cover Index 81.0–100.9 22.0–27.0 lb.
  • Page 929 8. Adding Paper and Toner • When loading thick paper of 127.5–300.0 g/m (47.0 lb. Cover–165.0 lb. Index), see page 137 "Thick Paper". • When loading envelopes, see page 138 "Envelopes". • When copying or printing onto letterhead paper, the paper placing orientation is different depending on which function you are using.
  • Page 930: Thick Paper

    Recommended Paper Sizes and Types • When loading coated paper or glossy paper, always fan the paper before using it. • If a paper jam occurs or if the machine makes a strange noise when feeding stacks of coated paper, feed the coated paper one sheet at a time. Thick Paper This section gives you various details about and recommendations concerning thick paper.
  • Page 931: Envelopes

    8. Adding Paper and Toner Envelopes This section gives you various details about and recommendations concerning envelopes. • Do not use window envelopes. • Fan the envelopes before loading them. Otherwise, the envelopes may stick together because of the glue on them. If fanning does not prevent them sticking together, load them one by one. Note that some types of envelopes cannot be used with this machine.
  • Page 932 Recommended Paper Sizes and Types Orientation of Exposure glass Trays 2–3 Bypass tray, wide LCT envelopes Side-opening envelopes • Flaps: closed • Flaps: closed • Flaps: closed • Bottom side of • Bottom side of • Bottom side of envelopes: toward envelopes: toward envelopes: toward the front of the...
  • Page 933 8. Adding Paper and Toner Types of envelopes Trays 2–3 Bypass tray, wide LCT Side-opening envelopes • Flaps: closed • Flaps: closed • Bottom side of envelopes: • Bottom side of envelopes: toward the back of the toward the back of the machine machine •...
  • Page 934 Recommended Paper Sizes and Types • Check the envelopes are not damp. • High temperature and high humidity conditions can reduce print quality and cause envelopes to become creased. • Depending on the environment, copying or printing on envelopes may wrinkle them even if they are recommended.
  • Page 935: Registering A Custom Paper

    8. Adding Paper and Toner Registering a Custom Paper You can register up to 100 custom papers. Check the product name, size, and type of your paper before registering it. Check that the size and type of your paper are compatible with the paper tray that you want to use. Tray compatibility depends on the paper's size and type.
  • Page 936: Registering A Paper Whose Paper Name Is Not Displayed In The Paper Library

    Registering a Custom Paper Press [Yes]. Press [Exit] twice. Press the [Paper Setting] key. You can also close the [Tray Paper Settings] screen by pressing [Exit]. • You can check and change the settings of the registered custom paper such as the paper size setting on the [Edit Custom Paper] screen.
  • Page 937 8. Adding Paper and Toner Press the [Paper Setting] key. CVK003 Press [Edit Custom Paper]. Press [Recall from Paper Library]. Select the most appropriate combination of type and weight for your paper. The list of paper types appears on the first and following pages in the paper library. Press [ Previous] or [ Next] to scroll through the list to find the paper that you want to select.
  • Page 938 Registering a Custom Paper Manually Specifying a Paper's Type and Weight Press the [Paper Setting] key. CVK003 Press [Edit Custom Paper]. Select a number that is [ Not Programd.]. Press [ Previous] or [ Next] to scroll through the list. Press [Change] for [Paper Name].
  • Page 939: Registering A New Custom Paper By Modifying An Existing Paper

    8. Adding Paper and Toner Press the [Paper Setting] key. You can also close the [Tray Paper Settings] screen by pressing [Exit]. • If you want to use glossy paper, select [Glossy] for [Coated Paper Type]. If you want to use matte paper (including silk, dull, and satin paper), select [Matted] for [Coated Paper Type].
  • Page 940 Registering a Custom Paper Press the [Paper Setting] key. CVK003 Press [Edit Custom Paper]. Select a number that is [ Not Programd.]. Press [ Previous] or [ Next] to scroll through the list. Press [Use Another Custom Paper's Settings]. Select the custom paper whose settings you want to modify. Press [OK].
  • Page 941: Adding Toner

    8. Adding Paper and Toner Adding Toner This section explains precautions when adding toner, how to send scanned documents when the toner has run out, and how to dispose of used toner. • Do not incinerate toner (new or used) or toner containers. Doing so risks burns. Toner will ignite on contact with naked flame.
  • Page 942 Adding Toner • If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor if necessary. • When removing jammed paper or replacing toner, avoid getting toner (new or used) on your clothing. If toner comes into contact with your clothing, wash the stained area with cold water. Hot water will set the toner into the fabric and make removing the stain impossible.
  • Page 943: Sending Scanned Documents When Toner Has Run Out

    8. Adding Paper and Toner • For details about how to check contact number where you can order supplies, see "Inquiry", Maintenance and Specifications Sending Scanned Documents When Toner Has Run Out When the machine has run out of toner, the indicator on the display lights. Note that even if there is no toner left, you can still send scanned documents.
  • Page 944: Menu Items And Functions

    Menu Items and Functions Menu Items and Functions All items in Adjustment Settings for Operators appear regardless of which of the machine's optional components are installed. If you change the settings of options that are not installed, the changes will have no effect.
  • Page 945 8. Adding Paper and Toner Item Description 0401 Adjust Punch Position Adjust the vertical position of the punch holes when using Across Feed Direction Finisher SR4090 or Booklet Finisher SR4100. 0402 Adjust Punch Position With Adjust the horizontal position of the punch holes when Feed Direction using Finisher SR4090 or Booklet Finisher SR4100.
  • Page 946: Troubleshooting

    9. Troubleshooting This chapter describes basic troubleshooting procedures. When a Status Icon Is Displayed This section describes the status icons displayed when the machine requires the user to remove misfed paper, to add paper, or to perform other procedures. Status Icon Status : Paper Misfeed icon Appears when a paper misfeed occurs.
  • Page 947 9. Troubleshooting Status Icon Status : Waste Staple Full icon Appears when the waste staple receptacle is full. For details about removing staple waste, see "Removing Staple Waste", Troubleshooting : Service Call icon Appears when the machine is malfunctioning or requires maintenance.
  • Page 948: When The Indicator Lamp For The [Check Status] Key Is Lit Or Flashing

    When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing When the Indicator Lamp for the [Check Status] Key Is Lit or Flashing If the indicator lamp for the [Check Status] key lights up or flashes, press the [Check Status] key to display the [Check Status] screen.
  • Page 949 9. Troubleshooting Problem Causes Solutions Documents and reports do The paper output tray is full. Remove the prints from the tray. not print out. Documents and reports do There is no paper left. Load paper. For details about loading not print out. paper, see "Loading Paper", Paper Specifications and Adding Paper An error has occurred.
  • Page 950: When The Machine Makes A Beeping Sound

    When the Machine Makes a Beeping Sound When the Machine Makes a Beeping Sound The following table describes the meaning of the various beep patterns that the machine produces to alert users about left originals and other machine conditions. Beep pattern Meaning Causes Single short beep...
  • Page 951: When You Have Problems Operating The Machine

    9. Troubleshooting When You Have Problems Operating the Machine Problem Causes Solutions When the machine is turned Functions other than the Wait a little longer. on, the only icon that copier function are not yet appears on the home screen ready.
  • Page 952 When You Have Problems Operating the Machine Problem Causes Solutions The power turns off The Weekly Timer setting is Change the Weekly Timer setting. For automatically. set to [Main Power Off]. details about the Weekly Timer setting, see "Timer Settings", Connecting the Machine/ System Settings The user code entry screen is Users are restricted by User...
  • Page 953 9. Troubleshooting Problem Causes Solutions Misfeeds occur frequently. Using curled paper often • Take the stiffness out of the paper causes misfeeds, soiled with your hands to straighten out paper edges, or slipped the curl. positions while performing • Load the paper up side down so staple or stack printing.
  • Page 954 When You Have Problems Operating the Machine Problem Causes Solutions Misfeeds occur frequently. Paper of undetectable size • Remove misfed paper. For details has been loaded. about removing jammed paper, see "Removing Jammed Paper", Troubleshooting • If you load a paper size that is not selected automatically, you need to specify the paper size with the control panel.
  • Page 955 9. Troubleshooting Problem Causes Solutions When printing to envelopes, The envelopes are curled. Make sure you fully flatten curled the envelopes may be fed in envelopes before you load them. Do together, or the envelopes not stack envelopes over the specified may not be fed.
  • Page 956 When You Have Problems Operating the Machine Problem Causes Solutions Cannot use Web Image When print volume limits are • For details about specifying print Monitor to print documents specified, users cannot print volume limits, see Security Guide stored in Document Server. beyond their print volume limit.
  • Page 957: When Multiple Functions Cannot Be Executed Simultaneously

    9. Troubleshooting Fold Problem Causes Solutions Wrinkling occurs when gate Wrinkling can occur if gate When applying gate fold, letter fold-in, fold, letter fold-in, or letter fold, letter fold-in, or letter or letter fold-out to paper larger than fold-out is applied. fold-out is applied to B4 JIS A4, we recommend you enable image , A3 , 8...
  • Page 958 When You Have Problems Operating the Machine For details about Function Compatibility, see "Function Compatibility", Troubleshooting...
  • Page 959: Messages Displayed When Using The Copy/Document Server Function

    9. Troubleshooting Messages Displayed When Using the Copy/ Document Server Function • If you cannot make copies as you want because of the paper type, paper size or paper capacity problems, use recommended paper. For details about recommended paper, see page 124 "Recommended Paper Sizes and Types".
  • Page 960 Messages Displayed When Using the Copy/Document Server Function Message Causes Solutions "Cannot display preview of The image data may have Press [Exit] to display the preview this page." been corrupted. screen without a thumbnail. If the selected document contains several pages, press [Switch] on the "Display Page"...
  • Page 961 9. Troubleshooting Message Causes Solutions "File being stored exceeded The scanned originals have Press [Exit], and then store again with max. number of pages per too many pages to store as an appropriate number of pages. file. Copying will be one document.
  • Page 962: When Using The Connect Copy Function

    Messages Displayed When Using the Copy/Document Server Function Message Causes Solutions "Stapling capacity The number of sheets per set Check the stapler capacity. For details exceeded." is over the staple capacity. about the stapler capacity, see "Specifications for Finisher SR4090", "Specifications for Booklet Finisher SR4100", or "Specifications for Finisher SR4110", Maintenance and...
  • Page 963 9. Troubleshooting Message Causes Solutions "Cannot print from the sub- The sub-machine's User Press the [User Tools] key to close the machine. Check the status of Tools menu is open. User Tools menu. the sub-machine." "Cannot print from the sub- The sub-machine has Continue copying using the main machine.
  • Page 964: Messages Displayed When Using The Printer Function

    Messages Displayed When Using the Printer Function Messages Displayed When Using the Printer Function This section describes the principal messages that appear on the display panel, error logs or reports. If other messages appear, follow their instructions. Messages Displayed on the Control Panel When Using the Printer Function •...
  • Page 965 9. Troubleshooting Message Causes Solutions "Load following paper in n. The printer driver settings are Check that the printer driver settings To cancel job, press [Job incorrect or the tray does not are correct, and then load paper of Reset]." contain paper of the size the size selected in the printer driver selected in the printer driver.
  • Page 966 Messages Displayed When Using the Printer Function Message Causes Solutions "Printer font error." An error has occurred in the Contact your service representative. font settings. "Problems with the wireless The machine has detected a Check that the Bluetooth unit is card.
  • Page 967: Messages Printed On The Error Logs Or Reports When Using The Printer Function

    9. Troubleshooting Message Causes Solutions "Unable to access the • An error occurred Save the file to a different memory specified memory storage when the machine storage device, and then try to print device." accessed the memory again. storage device or a file stored on the memory storage device.
  • Page 968 Messages Displayed When Using the Printer Function Message Causes Solutions "An error occurred while The [Enter User Text:] field On the printer driver's [Detailed processing an Unauthorized on the [Unauthorized Copy Settings] tab, click [Effects] in "Menu:". Copy Prevention job. The Prevention for Pattern Select [Unauthorized Copy job was cancelled."...
  • Page 969 9. Troubleshooting Message Causes Solutions "The selected paper type is Job reset is automatically Specify the correct paper type, and not supported. This job has performed if the specified then print the file again. been cancelled." paper type is incorrect. "Z-fold error."...
  • Page 970 Messages Displayed When Using the Printer Function Message Causes Solutions "Exceeded max. pages. The number of pages Reduce the number of pages to print. Collate is incomplete." exceeds the maximum number of sheets that you can use Collate with. "Exceeded the maximum The maximum number of For details about the maximum number of number of multi-sheet fold...
  • Page 971 9. Troubleshooting When documents cannot be stored in the Document Server Message Causes Solutions "Cannot store data of this The paper size exceeded Reduce the paper size of the file that size." the capacity of the you want to send to a size that the Document Server.
  • Page 972 Messages Displayed When Using the Printer Function Message Causes Solutions "The print job has been The hard disk became full Delete the files stored in the Document cancelled because capture after a file was stored. Server or reduce the file size to be sent. file(s) could not be stored: Exceeded max.
  • Page 973 9. Troubleshooting Message Causes Solutions "HDD is full. (Auto)" The hard disk became full Delete unneeded files stored in the while using the error job machine. store function to store Alternatively, reduce the data size of Normal Print jobs as Hold the Temporary Print file and/or the Print files.
  • Page 974 Messages Displayed When Using the Printer Function Message Causes Solutions "You do not have a privilege The entered login user name Check that the user name and to use this function. This job or login password is not password are correct. has been cancelled."...
  • Page 975 9. Troubleshooting Message Causes Solutions "98: Error" The machine could not Turn off the power, and then back on access Hard disk correctly. again. If the message appears frequently, contact your service representative. "99: Error" This data cannot be printed. Check that the data is valid.
  • Page 976 Messages Displayed When Using the Printer Function Message Causes Solutions "Exceeded max. number of While printing a Sample Delete unneeded files stored in the files to print for temporary / Print, Locked Print, Hold machine. stored jobs." Print, or Stored Print file, the maximum file capacity was exceeded.
  • Page 977 9. Troubleshooting Message Causes Solutions "Insufficient Memory" A memory allocation error PCL 6 occurred. Select a lower resolution on the printer driver. For details about how to change the resolution setting, see the printer driver Help. On the printer driver's [Detailed Settings] tab, click [Print Quality] in "Menu:", and then select [Raster] in the "Vector/Raster:"...
  • Page 978: Messages Displayed When Using The Scanner Function

    Messages Displayed When Using the Scanner Function Messages Displayed When Using the Scanner Function Messages Displayed on the Control Panel When Using the Scanner Function This section describes likely causes of and possible solutions for the error messages that appear on the control panel.
  • Page 979 9. Troubleshooting Message Causes Solutions "Exceeded max. number of The maximum enterable Check the maximum number of alphanumeric characters." number of alphanumeric characters which can be entered, and characters has been then enter it again. For details about exceeded. the maximum enterable number of characters, see "Values of Various Set Items for Transmission/Storage / Delivery Function", Scan...
  • Page 980 Messages Displayed When Using the Scanner Function Message Causes Solutions "The program is recalled. The program contains a For details about how to set Cannot recall the destination for which the permissions, see Security Guide destination(s) for which currently logged-in user access privileges are does not have permission to required."...
  • Page 981 9. Troubleshooting Message Causes Solutions "Exceeded max. data The scanned data exceeded Specify the scan size and resolution capacity." maximum data capacity. again. Note that it may not be possible to scan very large originals at a high "Check scanning resolution, resolution.
  • Page 982 Messages Displayed When Using the Scanner Function Message Causes Solutions "Not all of the image will be Using [Specify Reproduction Specify a large size in [Specify Size], scanned." Ratio] to scale down a large and then try to scan the original again. document may cause part of If displaying the entire image is not the image to be lost.
  • Page 983 9. Troubleshooting Message Causes Solutions "Memory is full. Scanning Because there is not enough Specify whether to use the data or not. has been cancelled. Press free hard disk space in the [Send] to send the scanned machine for delivering or data, or press [Cancel] to sending by e-mail while delete."...
  • Page 984 Messages Displayed When Using the Scanner Function Message Causes Solutions "Transmission has failed. Transmission has failed. Allocate sufficient space. Insufficient memory in the There was not enough free destination hard disk. To space on the hard disk of the check the current status, SMTP server, FTP server, or press [Scanned Files client computer at the...
  • Page 985 9. Troubleshooting Message Causes Solutions "Some of selected files are You cannot delete a file Cancel transmission ("Waiting..." status currently in use. They could which is waiting to be cleared) or the DeskTopBinder setting, not be deleted." transmitted ("Waiting..." and then delete the file. status displayed) or whose information is being changed with...
  • Page 986 Messages Displayed When Using the Scanner Function When the WSD scanner function cannot be used Message Causes Solutions "Cannot communicate with WSD (Device) protocol or For details about how to enable or PC. Contact the WSD (Scanner) protocol is disable the WSD protocol, see Security administrator."...
  • Page 987 9. Troubleshooting When documents cannot be stored on a memory storage device Message Causes Solutions "Cannot write on the The memory storage device • Replace the memory storage memory storage device is full and scan data cannot device. because remaining free be saved.
  • Page 988: Messages Displayed On The Client Computer

    Messages Displayed When Using the Scanner Function Message Causes Solutions "Memory is full. Press [Write] The scan could not be Select whether or not to save the to write the current scanned completed because there scanned document to the memory data to the memory storage was insufficient hard disk storage device.
  • Page 989 9. Troubleshooting Message Causes Solutions "Cannot specify any more The maximum number of The maximum number of scanning scanning area." registerable scan areas has areas that can be stored is 100. Delete been exceeded. unneeded scanning areas. "Clear Misfeed(s) in ADF." A paper misfeed has •...
  • Page 990 Messages Displayed When Using the Scanner Function Message Causes Solutions "Insufficient memory. Reduce Scanner memory is • Reset the scan size. the scanning area." insufficient. • Lower the resolution. • Set with no compression. For details about the settings, see TWAIN driver Help.
  • Page 991 9. Troubleshooting Message Causes Solutions "Scanner is in use for other A function of the machine • Wait for a while, and then function. Please wait." other than the Scanner reconnect. function is being used such • Cancel the job that is being as the Copier function.
  • Page 992 Messages Displayed When Using the Scanner Function Message Causes Solutions "Cannot find "XXX" scanner The machine is not • Check that the previously used used for the previous scan. connected to the network scanner is connected to the "YYY" will be used instead." correctly.
  • Page 993 9. Troubleshooting Message Causes Solutions "Scanner is not available. Network communication is • Check whether the machine's host Check the scanner not available because the name is specified in the Network connection status." machine's IP address could Connection Tool. For the WIA not be obtained from the driver, check the [Network host name.
  • Page 994: When Other Messages Appear

    When Other Messages Appear When Other Messages Appear Message Causes Solutions "Cannot connect with the • The wireless LAN Turn off the power, and then confirm wireless card. Turn the main board was not inserted the wireless LAN board is inserted power switch off, then check when the machine was correctly.
  • Page 995: When There Is A Problem Scanning Or Storing Originals

    9. Troubleshooting Message Causes Solutions "Self checking..." The machine is performing The machine may perform periodic image adjustment maintenance during operations. The operations. frequency and duration of maintenance depends on the humidity, temperature, and printing factors such as number of prints, paper size, and paper type.
  • Page 996: When The Home Screen Cannot Be Edited

    When Other Messages Appear When the Home Screen Cannot Be Edited Message Causes Solutions "The image data size is not The image data size is not For details about file size for shortcut valid. See the manual for valid. image, see "Displaying the Image on required data."...
  • Page 997: When Data Cannot Be Sent Due To A Problem With The Destination

    9. Troubleshooting Message Causes Solutions "Updating the destination The destination list is being Wait until the message disappears. Do list... Please wait. Specified updated from the network not turn off the power while this destination(s) or sender's using Web Image Monitor. message is displayed.
  • Page 998: When The Machine Cannot Be Operated Due To A Problem With The User Certificate

    When Other Messages Appear When the Machine Cannot Be Operated Due to a Problem with the User Certificate Message Causes Solutions "The destination cannot be The user certificate A new user certificate must be installed. selected because its (destination certificate) has For details about the user certificate encryption certificate is not expired.
  • Page 999: When Problems Occur While Logging In

    9. Troubleshooting Message Causes Solutions "XXX cannot be YYY The device certificate (PDF A new device certificate (PDF with because the Digital with digital signature or digital signature or PDF/A with digital Signature's device certificate PDF/A with digital signature) must be installed. For details is not currently valid."...
  • Page 1000: When The User Lacks Privileges To Perform An Operation

    When Other Messages Appear When the User Lacks Privileges to Perform an Operation Message Causes Solutions "You do not have the The logged in user name For details about how to set privileges to use this does not have permission for permissions, see Security Guide function."...
  • Page 1001 9. Troubleshooting...
  • Page 1002 INDEX Decurler unit............8, 31 Destination............. 88, 204 2 Sided Print............Display language..........Distributed scan management......Document Server.... 10, 17, 35, 70, 79, 80, 97 A3/11 × 17 tray unit........31, 108 Drawer..............Address Book..........11, 203 DSM............... Address Book Management......... Duplex..............
  • Page 1003 Loading orientation-fixed paper......Printer driver............Loading paper............. Problem............158, 202 Loading two-sided paper........Program............12, 39 Locked Print............Logging in............Quick Install............Logging in to the machine........Logging out the machine........Lower front cover........... Reducing my Costs..........Region A..............Region B..............Magazine..............
  • Page 1004 Two-sided paper..........Unauthorized copy prevention......Used toner............User certificate............. User code authentication........Vents............... Web Image Monitor........23, 101 Wide large capacity tray....... 8, 115 Wide LCT............8, 31 WSD scanner............
  • Page 1005 MEMO D138-7403...
  • Page 1006 © 2013...
  • Page 1007 D138-7403...
  • Page 1008 Operating Instructions Security Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine.
  • Page 1010 TABLE OF CONTENTS Functions That Require Options.........................9 Main Software Names............................10 1. Getting Started Before Configuring the Security Function Settings..................11 Before Using This Machine..........................12 Administrators and Users..........................13 Administrators..............................14 Configuring Administrator Authentication......................15 Specifying Administrator Privileges......................16 Registering and Changing Administrators....................18 Using Web Image Monitor to Configure Administrator Authentication..........20 Administrator Login Method..........................22 Logging in Using the Control Panel......................22 Logging in Using Web Image Monitor......................23...

This manual is also suitable for:

Mp c8002 seriesMp c6502spMp c8002sp

Table of Contents