Ricoh C2828 Function Manual

Ricoh C2828 Function Manual

Scanner reference
Hide thumbs Also See for C2828:
Table of Contents

Advertisement

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
1
Sending Scan Files by E-mail
2
Sending Scan Files to Folders
3
Sending Scan Files Using WSD
4
Storing Files Using the Scanner Function
5
Saving Scan Files on a Removable Memory Device
6
Delivering Scan Files
7
Scanning Originals with the Network TWAIN Scanner
8
Various Scan Settings
9
Scanner Features
10
Appendix

Operating Instructions

Scanner Reference

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh C2828

  • Page 1: Operating Instructions

    Operating Instructions Scanner Reference Sending Scan Files by E-mail Sending Scan Files to Folders Sending Scan Files Using WSD Storing Files Using the Scanner Function Saving Scan Files on a Removable Memory Device Delivering Scan Files Scanning Originals with the Network TWAIN Scanner Various Scan Settings Scanner Features Appendix...
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine..........................7 Notice..................................9 Important.................................9 How to Read This Manual..........................10 Symbols................................10 Note................................10 Laws and Regulations............................12 Legal Prohibition............................12 About the Scanner Functions...........................13 Display Panel..............................15 Simplified Display............................15 Confirmation Displays..........................16 1. Sending Scan Files by E-mail Before Sending Scan Files by E-mail......................21 Overview of Sending Scan Files by E-mail....................21 Preparation for Sending by E-mail......................22 Registering E-mail Addresses in the Address Book...................24...
  • Page 4 Simultaneous Storage and Sending by E-mail....................47 Security Settings to E-mails..........................48 Sending Encrypted E-mail...........................48 Sending E-mail with a Signature.........................49 Sending the URL by E-mail..........................51 2. Sending Scan Files to Folders Before Sending Files by Scan to Folder......................53 Overview of Sending Scan Files by Scan to Folder..................53 Preparation for Sending by Scan to Folder....................55 Registering Destination Folders in the Address Book................57 Scan to Folder Screen..........................58...
  • Page 5 4. Storing Files Using the Scanner Function Before Storing Files............................93 Overview of File Storage under the Scanner Function................93 Basic Procedure for Storing Scan Files......................95 Specifying File Information for a Stored File....................97 Specifying a User Name..........................97 Specifying a File Name..........................97 Specifying a Password..........................98 Displaying the List of Stored Files.........................100 List of Stored Files............................100 Searching the List of Stored Files......................101...
  • Page 6 Specifying the Sender...........................131 Selecting a Sender from the Sender List....................131 Selecting the Sender by Entering the Registration Number..............131 Selecting a Sender by Searching the Delivery Server's Destination List..........132 Entering the Subject of the E-mail to Be Transmitted via the Delivery Server..........135 Simultaneous Storage and Delivery......................136 7.
  • Page 7 Specifying the File Name..........................168 Security Settings for PDF Files........................170 Programs................................175 Registering Frequently Used Setting......................175 Recalling a Registered Content........................176 Changing a Registered Program......................176 Deleting a Program...........................177 Changing the Registered Program Name....................177 Registering the Default Values of the Scanner's Initial Display..............179 9. Scanner Features Accessing User Tools.............................181 Changing User Tools..........................181 Closing User Tools.............................182...
  • Page 8 INDEX ................................207...
  • Page 9: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 10 • Change the user name and password of the administrator using Web Image Monitor. For details, see "Setting Up the Machine", Security Reference. Be sure to read this manual when setting the enhanced security functions, or user and administrator authentication. PostScript 3 Supplement Explains how to set up and use PostScript 3.
  • Page 11: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products.
  • Page 12: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Machine. Indicates important safety notes.
  • Page 13 Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional. For details, please contact your local dealer. This machine comes in four models which vary in copy/print speed. To ascertain which model you have, see "Machine Types", About This Machine.
  • Page 14: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 15: About The Scanner Functions

    About the Scanner Functions This section describes functions you can use in the scanner mode. You can use the scanner functions to send scan files to computers, scan originals from a computer using the TWAIN driver, or store scan files on the machine's hard disk. For details about each function, see respective chapters.
  • Page 16 • When the Copy Data Security Unit is installed, if you scan an original that was printed using the data security for copying function, the machine beeps and an entirely gray page is sent or stored. You can use the log file to check who scanned the confidential original. For details about the data security for copying function, consult the administrator.
  • Page 17: Display Panel

    Display Panel This section explains the simplified display and three confirmation screens: Check Modes, Preview, and Scanned Files Status. In this manual you can find explanations about the E-mail screen, Scan to Folder screen, screen, WSD scanner screen, list of stored files screen, and the network delivery scanner screen. For details about each of these screens, see "E-mail Screen", "Scan to Folder Screen", "WSD Scanner Screen", "List of Stored Files", and "Network Delivery Scanner Screen"...
  • Page 18: Confirmation Displays

    Example of Simplified Display BAP001S 1. [Key Colour] Press to increase screen contrast by changing the color of the keys. This is available only for the simplified display. • To return to the initial screen, press the [Simplified Display] key again. •...
  • Page 19 Check Modes BAP002S 1. Original Displays Scan Settings, Original Feed Type, and other scanning settings. 2. Transmission function icon Displays the icon of the transmission function in use. 3. Sender and Destination Displays the sender and transmission or delivery destinations. The ( ) symbol indicates a group destination.
  • Page 20 Preview BAP003S 1. [Zoom Out] and [Zoom In] Press to reduce or enlarge the displayed preview. 2. [ ][ ][ ][ ] Press to shift the displayed area. 3. [Cancel Sending] Press to close a preview and interrupt a transmission. 4.
  • Page 21 • Preview is not available if you select High Compression PDF as the file type. • Preview might not be displayed if scanning failed or the image file is corrupted. If this is the case, scan the original again. • p.103 "Checking a Stored File Selected from the List" Scanned Files Status This section explains items that are displayed and how to display the Scanned Files Status screen.
  • Page 22 2. Transmission function icon Displays the icon of the transmission function used. The ( ) symbol indicates a destination that can receive encrypted e-mail. 3. Destination Displays the transmission destination. If you have selected multiple destinations, the first selected destination is displayed. Other destinations appear as "+ X"...
  • Page 23: Sending Scan Files By E-Mail

    1. Sending Scan Files by E-mail Before Sending Scan Files by E-mail This section explains the necessary preparations and the procedure for sending scan files by e-mail. Overview of Sending Scan Files by E-mail This section describes the process for sending scan files by e-mail. ZZZ801S 1.
  • Page 24: Preparation For Sending By E-Mail

    1. Sending Scan Files by E-mail Preparation for Sending by E-mail To send scanned files by e-mail, you must first perform the following: • Check the machine is properly connected to the network • Configure the network settings in [System Settings] •...
  • Page 25 Before Sending Scan Files by E-mail Press the [Interface Settings] tab. Press [Machine IPv4 Address] to specify the machine's IPv4 address. To specify a static IPv4 address for this machine, press [Specify], and then enter the IPv4 address and subnet mask. To obtain an IPv4 address from a DHCP server automatically, press [Auto-Obtain (DHCP)].
  • Page 26: Registering E-Mail Addresses In The Address Book

    1. Sending Scan Files by E-mail Configuring the necessary settings in [Scanner Features] Using [Scanner Features], you can make or change various settings related to the scanner function, such as compressing scan data or printing the scanner journal. Configure the scanner settings according to your environment and how you will be using the machine.
  • Page 27: E-Mail Screen

    Before Sending Scan Files by E-mail Press [Address Book Management]. Press [New Program], and then enter necessary information. You can register the e-mail address in groups. • For details about registering e-mail addresses in the address book, see "Registering Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
  • Page 28 1. Sending Scan Files by E-mail 1. Destination field The specified destination appears. If more than one destination has been specified, press [ ] or [ ] to scroll through the destinations. 2. E-mail / Folder Press these tabs to switch between the E-mail screen and Scan to Folder screen. Switch the screen also when sending the same files by both e-mail and Scan to Folder.
  • Page 29: Basic Procedure For Sending Scan Files By E-Mail

    Basic Procedure for Sending Scan Files by E-mail Basic Procedure for Sending Scan Files by E-mail This section explains the basic procedure for sending scan files by e-mail. Make sure that no previous settings remain. If a previous setting remains, press the [Clear Modes] key. If the network delivery scanner screen or Scan to Folder screen appears, switch to the E- mail screen.
  • Page 30 1. Sending Scan Files by E-mail Specify the destination. You can specify multiple destinations. For details, see "Specifying E-mail Destinations". If necessary, press [Text] to enter the e-mail message. For details, see "Entering the E-mail Message" If necessary, press [Subject] to specify the e-mail subject. For details, see "Entering the E-mail Subject".
  • Page 31 Basic Procedure for Sending Scan Files by E-mail • To cancel scanning, press the [Clear/Stop] key. • You can also store a scan file and simultaneously send it by e-mail. For details, see "Simultaneous Storage and Sending by E-mail". • Applying security to e-mail can reduce transmission speed. •...
  • Page 32: Switching To The E-Mail Screen

    1. Sending Scan Files by E-mail Switching to the E-mail Screen This section explains how to switch the screen to the E-mail screen. If the Scan to Folder screen is being displayed, press [E-mail] to switch to the E-mail screen. If the network delivery scanner screen is being displayed, switch to the E-mail screen as follows: Press [Delivery Dest.].
  • Page 33: Specifying E-Mail Destinations

    Specifying E-mail Destinations Specifying E-mail Destinations This section explains how to specify e-mail destinations. You can specify e-mail destinations by any of the following methods: • Select the destination from the machine's address book • Enter the e-mail address directly •...
  • Page 34 1. Sending Scan Files by E-mail In the destination list, press the key including the destination name. The key of the selected destination is highlighted, and the destination appears in the destination field at the top of the screen. If the target destination does not appear, take one of the following steps: •...
  • Page 35 Specifying E-mail Destinations Press [OK]. Searching the machine's address book for the destination and selecting it This section explains how to search the machine's address book for the destination and select it. Press [Search Dest.]. To search by destination name, press [Name]. To search by e-mail address, press [E-mail Address].
  • Page 36: Entering An E-Mail Address Manually

    1. Sending Scan Files by E-mail Press [Start Search]. Destinations that match the search criteria are displayed. Select a destination. Select [To], [Cc], or [Bcc]. Press [OK]. • If [LDAP Search] is set to [On] in [System Settings], check that [Address Book] in the upper part on the screen has been selected before executing the search.
  • Page 37: Selecting Destinations By Searching An Ldap Server

    Specifying E-mail Destinations Press [Manual Entry]. The soft keyboard appears. Enter the e-mail address. Press [OK]. • Depending on the security settings, [Manual Entry] may not be displayed. • To change a registered destination e-mail address, press [Edit] to the left of the destination field to display the soft keyboard, use the soft keyboard to enter the new address, and then click [OK].
  • Page 38 1. Sending Scan Files by E-mail Press [Search Dest.]. Select the LDAP server that appears next to [Address Book]. Register the LDAP server in advance in [System Settings]. If authentication is required to access the selected server, the authentication screen appears. To authenticate, enter the user name and password.
  • Page 39 Specifying E-mail Destinations The illustrated screen is an example. The items that actually appear on the screen may differ. Press [Start Search]. Destinations that match the search criteria are displayed. Select the destination. Select [To], [Cc], or [Bcc]. Press [OK]. •...
  • Page 40: Registering A Directly-Entered Destination In The Address Book

    1. Sending Scan Files by E-mail • [Include one Word]: The names which contain an entered character or characters are targeted. For example, to search for "ABC", enter "A", "B", or "C". • [Exclude Words]: The names which do not contain an entered character or characters are targeted.
  • Page 41 Specifying E-mail Destinations Press [Names], and then specify the name and other information to be registered. For details about specifying the information to be registered, see "Registering Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide. Press [OK]. •...
  • Page 42: Specifying The E-Mail Sender

    1. Sending Scan Files by E-mail Specifying the E-mail Sender This section explains how to specify the e-mail sender. To send e-mail, you must specify the name of the sender. You can specify the e-mail sender by any of the following methods: •...
  • Page 43: Using A Registration Number To Specify A Sender Name

    Specifying the E-mail Sender Using a Registration Number to Specify a Sender Name Select the sender using the registration numbers specified by users in the machine's address book. Press [Sender Name]. Press [Registration No.]. Using the number keys, enter the five-digit registration number assigned to the required destination.
  • Page 44 1. Sending Scan Files by E-mail To search by user name, press [Name]. To search by e-mail address, press [E-mail Address]. The soft keyboard appears. You can also search by combining [Name] and [E-mail Address]. Enter the beginning of the sender's name you want to search for. To search by e-mail address, enter the beginning of the address.
  • Page 45 Specifying the E-mail Sender For example, to search for "ABC", enter "C". • [Exact Match]: The names which correspond to an entered character or characters are targeted. For example, to search for "ABC", enter "ABC". • [Include one Word]: The names which contain an entered character or characters are targeted.
  • Page 46: Entering The E-Mail Subject

    1. Sending Scan Files by E-mail Entering the E-mail Subject When sending a scan file by e-mail, you can enter a subject line for the e-mail. Press [Subject]. Enter the subject. To enter characters, press [Text Entry]. To enter symbols, press [Symbol Entry]. To add predefined User Text registered on this machine, press [User Text].
  • Page 47: Entering The E-Mail Message

    Entering the E-mail Message Entering the E-mail Message This section explains how to enter the e-mail message. The message can be created in the following ways: • Select the registered e-mail message from the list • Enter the message directly •...
  • Page 48: Manual Entry Of A Message

    1. Sending Scan Files by E-mail Manual Entry of a Message You can enter the message manually. Press [Text]. Press [Manual Entry]. The soft keyboard appears. Enter the message. Press [OK] twice.
  • Page 49: Simultaneous Storage And Sending By E-Mail

    Simultaneous Storage and Sending by E-mail Simultaneous Storage and Sending by E-mail This section explains how to store a file and simultaneously send it by e-mail. Press [Store File]. Select [Store to HDD + Send]. If necessary, specify the stored file's information, such as [User Name], [File Name], and [Password].
  • Page 50: Security Settings To E-Mails

    1. Sending Scan Files by E-mail Security Settings to E-mails This section explains the procedure for applying security (encryption and a signature) to e-mail. Applying security (encryption and a signature) to e-mail helps prevent spoofing and information leakage. • S/MIME is used to set security. For details about security settings, consult your network administrator. •...
  • Page 51: Sending E-Mail With A Signature

    Security Settings to E-mails Press [OK]. • Encrypting e-mail will increase its size. • When you specify a destination denoted by the symbol (which indicates that e-mail sent to this destination is always encrypted) encrypted e-mail will be sent regardless of the setting specified in [Security].
  • Page 52 1. Sending Scan Files by E-mail A signature can be applied to each transmission if you select [Signature] in [Security]. • If [Do not Use Signatures] is selected: Pressing [Security] will not display [Signature]. • If [Use Signatures] is selected: A signature is always applied to scan files that are sent by e-mail.
  • Page 53: Sending The Url By E-Mail

    Sending the URL by E-mail Sending the URL by E-mail This section explains how to send the URL of a scanned file by e-mail. Use this function if network restrictions prevent you sending attachments by email. • Depending on your e-mail application, a phishing warning might appear after you receive an e-mail message.
  • Page 54 1. Sending Scan Files by E-mail • Depending on the environment, even if you click the URL in the file sent by e-mail, the browser may not start and you may not be able to view the file. If this happens, click the same URL again, or manually enter the URL in the browser's address bar.
  • Page 55: Sending Scan Files To Folders

    2. Sending Scan Files to Folders Before Sending Files by Scan to Folder This section describes the preparations and procedure for sending files by Scan to Folder. Overview of Sending Scan Files by Scan to Folder This section describes the process for sending scan files by Scan to Folder. Sending files to shared folders ZZZ802S 1.
  • Page 56 2. Sending Scan Files to Folders Sending files to an FTP server ZZZ803S 1. This machine You can send scan files to FTP server folders. To send scan files to FTP server folders, use the FTP protocol. 2. FTP server The FTP server is a server that provides file transfer services among computers on the same network.
  • Page 57: Preparation For Sending By Scan To Folder

    Before Sending Files by Scan to Folder 2. NetWare server You can use this server to share files over the network via NetWare. By sending image data to the server, files can be stored on the server. 3. Client computer To download files, a computer must be running the NetWare client and be logged onto the server.
  • Page 58 2. Sending Scan Files to Folders Press the [User Tools/Counter] key, and then press [System Settings]. The System Settings screen appears. Press the [Interface Settings] tab. Press [Machine IPv4 Address] to specify the machine's IPv4 address. To specify a static IPv4 address for this machine, press [Specify], and then enter the IPv4 address and subnet mask.
  • Page 59: Registering Destination Folders In The Address Book

    Before Sending Files by Scan to Folder This section explains how to display the Scanner Features screen. For details about the settings on this screen, see "Scanner Features". Press the [User Tools/Counter] key, and then press [Scanner Features]. The Scanner Features screen appears. Press the [General Settings], [Scan Settings], [Send Settings], or [Initial Settings] tabs and configure the relevant settings on those tabs.
  • Page 60: Scan To Folder Screen

    2. Sending Scan Files to Folders • For details about registering the address of a destination folder in the address book, see "Registering Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide. • You can register entries in the address book using Web Image Monitor or SmartDeviceMonitor for Admin.
  • Page 61 Before Sending Files by Scan to Folder 4. [Manual Entry] To specify destinations not registered in the address book, press this button to display the soft keyboard, and then enter the address of the destination folder. 5. [Reg. No.] Press to specify a destination using a five-digit registration number. 6.
  • Page 62: Basic Procedure When Using Scan To Folder

    2. Sending Scan Files to Folders Basic Procedure When Using Scan to Folder This section describes the basic procedure involved in using Scan to Folder. Make sure that no previous settings remain. If a previous setting remains, press the [Clear Modes] key. If the network delivery scanner screen or E-mail screen appears, switch to the Scan to Folder screen.
  • Page 63 Basic Procedure When Using Scan to Folder Specify the destination. You can specify multiple destinations. For details, see "Specifying Scan to Folder Destinations". Press the [Start] key. If you are scanning batches, place the next originals. • If you have selected more than one destination, you can press [ ] or [ ] next to the destination field to scroll through the destinations.
  • Page 64: Switching To The Scan To Folder Screen

    2. Sending Scan Files to Folders Switching to the Scan to Folder Screen This section explains how to switch to the Scan to Folder screen. If the E-mail screen is being displayed, press the [Folder] tab to switch to the Scan to Folder screen. If the network delivery scanner screen is being displayed, switch to the Scan to Folder screen as follows: Press [Delivery Dest.].
  • Page 65: Specifying Scan To Folder Destinations

    Specifying Scan to Folder Destinations Specifying Scan to Folder Destinations This section explains how to specify Scan to Folder destinations. You can send a file by Scan to Folder by any of the following methods: • Select a destination registered in the machine's address book •...
  • Page 66 2. Sending Scan Files to Folders If the target destination does not appear, take one of the following steps: • Display the destination by selecting its initial letter from the title • Display the destination by pressing [ ] or [ ] •...
  • Page 67 Specifying Scan to Folder Destinations Searching the machine's address book for the destination and selecting it This section explains how to search the machine's address book for the destination and select it. Press [Search Dest.]. To search by destination name, press [Name]. To search by path, press [Folder Name].
  • Page 68 2. Sending Scan Files to Folders The illustrated screen is an example. The items that actually appear on the screen may differ. Press [Start Search]. Destinations that match the search criterion are displayed. Select the destination folder. Press [OK]. • Search criteria that appear in [Advanced Search], such as [Name], [E-mail Address], and [Folder Name], are registered in the machine's address book.
  • Page 69: Sending Files To A Shared Network Folder

    Specifying Scan to Folder Destinations Sending Files to a Shared Network Folder This section explains how to specify the destination when sending files to a shared network folder. • The shared folder must have been created on the client computer in advance. For details about creating shared folders, see Windows Help.
  • Page 70 2. Sending Scan Files to Folders Depending on the destination setting, enter the user name for logging on to the client computer. Press [Manual Entry] to the right of the user name field to display the soft keyboard. Depending on the destination setting, enter the password for logging on to the client computer.
  • Page 71 Specifying Scan to Folder Destinations Press [Manual Entry]. Press [SMB]. Press [Browse Network] under the path name field. Domains or workgroups on the network appear. Select the domain or workgroup in which the destination folder is located. Select the client computer that has the destination folder. If you cannot find the computer you are looking for, press [Up One Level] and browse that level.
  • Page 72: Sending Files To An Ftp Server

    2. Sending Scan Files to Folders • Computer and shared folder names containing more than 12 characters cannot be displayed. • Up to 100 computers or shared folders can be displayed. • The machine may fail to transfer the file if you do not have the write privileges for the shared folder or there is not enough free hard disk space.
  • Page 73: Sending Files To Netware Server

    Specifying Scan to Folder Destinations Enter the path for the folder. The following is an example of a path where the folder name is "user" and the subfolder name is "lib": user\lib. Press [OK]. Enter the user name according to the setting at the destination. Press [Manual Entry] to the right of the user name field to display the soft keyboard.
  • Page 74 2. Sending Scan Files to Folders You can send a file to NetWare server by any of the following methods: • Enter the destination path of the Netware server directly • Specify the path by browsing to the destination on the Netware server Entering the path of the NetWare server directly You can enter the path of the NetWare server.
  • Page 75 Specifying Scan to Folder Destinations If you set the connection type to [Bindery], the NetWare server name is "server", the volume name is "volume", and the folder name is "folder", the path will be "\\server\volume\folder". Press [OK]. Enter the user name for logging on to the NDS tree or NetWare Bindery server. Press [Manual Entry] to the right of the user name field.
  • Page 76 2. Sending Scan Files to Folders Select the connection type. Press [NDS] to specify a folder in the NDS tree. Press [Bindery] to specify a folder on the NetWare Bindery server. Press [Browse Network] under the path name field. If you selected [NDS] under [Connection Type], the NDS tree list appears. If you selected [Bindery] under [Connection Type], the NetWare Bindery server list appears.
  • Page 77: Registering The Path To The Selected Destination In The Address Book

    Specifying Scan to Folder Destinations • p.75 "Registering the Path to the Selected Destination in the Address Book" Registering the Path to the Selected Destination in the Address Book This section explains how to register folder paths you have entered manually or specified by browsing the network to the machine's address book.
  • Page 78: Simultaneous Storage And Sending By Scan To Folder

    2. Sending Scan Files to Folders Simultaneous Storage and Sending by Scan to Folder This section explains how to store a file and simultaneously send it by Scan to Folder. Press [Store File]. Make sure that [Store to HDD + Send] is selected. If necessary, specify the stored file's information, such as [User Name], [File Name], and [Password].
  • Page 79: Sending Scan Files Using Wsd

    3. Sending Scan Files Using WSD Before Sending Scan Files Using WSD This section explains the preparation and procedure for sending scan files using Web Services on Devices (WSD). If your computer has a WSD-compliant operating system such as Windows Vista, it can receive scan files sent using WSD.
  • Page 80: Preparation For Sending Files Using Wsd

    3. Sending Scan Files Using WSD 1. This machine From this machine you can send scan files to WSD-compliant client computers. 2. Client computers (WSD-compliant) WSD-compliant computers receive the sent scan files via the network. Preparation for Sending Files Using WSD To send scanned files using WSD, you must first perform the following: •...
  • Page 81 Before Sending Scan Files Using WSD The System Settings screen appears. Press the [Interface Settings] tab. Press [Machine IPv4 Address] to specify the machine's IPv4 address. To specify a static IPv4 address for this machine, press [Specify], and then enter the IPv4 address and subnet mask.
  • Page 82: Wsd Scanner Screen

    3. Sending Scan Files Using WSD Enter your login user name and password in the [Login User Name] and [Login Password] boxes respectively, and then click [Login]. Consult your administrator if you require a login user name and password. On the menu in the left frame, click [Configuration]. Under [Scanner], click [Initial Settings].
  • Page 83 Before Sending Scan Files Using WSD The function items displayed serve as selector keys. You can select or specify an item by pressing it. When you select or specify an item on the display panel, it is highlighted like [ ].
  • Page 84: Basic Procedure For Sending Scan Files Using Wsd

    3. Sending Scan Files Using WSD Basic Procedure for Sending Scan Files Using This section explains the basic procedure for sending scan files using WSD. • If the message "Updating the destination list has failed. Try again?" appears, press [OK]. The destination list will then be updated.
  • Page 85: • P.85 "Switching To The Wsd Scanner Screen

    Basic Procedure for Sending Scan Files Using WSD If necessary, press [Original Feed Type] to configure the stamp and original orientation settings. For details, see "Setting of Original Feed Type". Specify the destination. For details, see "Specifying the Destination Client Computer". Press the [Start] key.
  • Page 86 3. Sending Scan Files Using WSD • p.91 "Creating a New Scan Profile"...
  • Page 87 Switching to the WSD Scanner Screen Switching to the WSD Scanner Screen This section explains how to switch from the screen that is currently displayed to the WSD scanner screen. When the E-mail screen, Scan to Folder screen, or network delivery screen is displayed, you can use the following procedure to switch to the WSD scanner screen.
  • Page 88: Specifying The Destination Client Computer

    3. Sending Scan Files Using WSD Specifying the Destination Client Computer This section explains how to specify a destination client computer for the scan files you are sending by WSD. You can specify the destination computer using either of the following methods: •...
  • Page 89: Searching For A Destination Client Computer

    Specifying the Destination Client Computer • Scan to "Computer Name" • Scan for Print to "Computer Name" • Scan for E-mail to "Computer Name" • Scan for Fax to "Computer Name" • Scan for OCR to "Computer Name" (Scan for OCR to "Computer Name" might not be available depending on the destination client computer.) •...
  • Page 90 3. Sending Scan Files Using WSD Press [Name]. The soft keyboard appears. Enter the search characters, and then press [OK]. If necessary, press [Advanced Search] to specify the detailed search criteria. You can specify up to three names and three search criteria. You can specify [Beginning Word] or [End Word] as the matching criterion.
  • Page 91 Specifying the Destination Client Computer • [Exclude Words]: The names which do not contain an entered character or characters are targeted. For example, to search for "ABC", enter "D".
  • Page 92: Changing A Scan Profile

    3. Sending Scan Files Using WSD Changing a Scan Profile This section explains how to change a scan profile. A scan profile contains scan settings specified on a client computer. Whenever the machine is first registered to a computer, a profile is created automatically. Using the following procedure, you can change this profile on the computer.
  • Page 93: Creating A New Scan Profile

    Changing a Scan Profile Item Scan settings Select one of the following: BMP (Bitmap Image) File type: JPG (JPEG Image) PNG (PNG Image) TIF (TIFF Image) Resolusion (DPI): Specify the resolution. The setting you specify here will not be applied for Brightness: scanning.
  • Page 94 3. Sending Scan Files Using WSD Click [Add]. The [Add New Profile] dialog box appears. Configure the necessary settings for the profile. Click [Save Profile]. The scan settings are saved as a new profile. • You can register multiple profiles. If multiple profiles are registered, the profile specified as default in the [Scan Profiles] dialog box is applied.
  • Page 95: Storing Files Using The Scanner Function

    4. Storing Files Using the Scanner Function Before Storing Files This section outlines file storage under the scanner function and provides related cautions. Overview of File Storage under the Scanner Function This section describes the process of storing files under the scanner function. •...
  • Page 96 4. Storing Files Using the Scanner Function • Stored files will be deleted after a set period. For details about specifying the period, see "Administrator Tools", Network and System Settings Guide. • Files stored under the scanner function cannot be printed from the machine's control panel. Print the files from a client computer after receiving them on the computer.
  • Page 97: Basic Procedure For Storing Scan Files

    Basic Procedure for Storing Scan Files Basic Procedure for Storing Scan Files This section explains the basic procedure for storing scan files. Make sure that no previous settings remain. If a previous setting remains, press the [Clear Modes] key. Place originals. Press [Store File].
  • Page 98 4. Storing Files Using the Scanner Function Press the [Start] key. If you are scanning batches, place the next originals. Press [OK]. • Depending on the security setting, [Access Privileges] may appear instead of [User Name]. For details about specifying [Access Privileges], consult the administrator. •...
  • Page 99: Specifying File Information For A Stored File

    Specifying File Information for a Stored File Specifying File Information for a Stored File You can specify information for a stored file, such as user name, file name, and password. By specifying information for a stored file, you can search for the file by user name or file name, or protect the file with a password to prevent other people from accessing the file.
  • Page 100: Specifying A Password

    4. Storing Files Using the Scanner Function You can change this file name. Press [Store File]. The Store File screen appears. Press [File Name]. The soft keyboard appears. Change the file name. Press [OK] twice. • For details about entering the text, see "Entering Text", About This Machine. Specifying a Password You can specify a password for the stored file.
  • Page 101 Specifying File Information for a Stored File The Store File screen appears. Press [Password]. Using the number keys, enter a four to eight-digit number. Press [OK]. Enter the same number again using the number keys. Press [OK] twice.
  • Page 102: Displaying The List Of Stored Files

    4. Storing Files Using the Scanner Function Displaying the List of Stored Files This section describes the list of stored files. Using the list of stored files, you can delete stored files or change the file's information. List of Stored Files This section describes how the list of stored files is displayed.
  • Page 103: Searching The List Of Stored Files

    Displaying the List of Stored Files 6. [Details] Press this to display details about the selected file. 7. [Preview] Press this to display a preview of the selected file. For details, see "Checking a Stored File Selected from the List". 8.
  • Page 104 4. Storing Files Using the Scanner Function Select the user name to be used for the search. The user names shown here are names that were registered on the [Administrator Tools] tab in [System Settings]. To change a user name not shown here, press [Manual Entry], and then enter the user name. Press [OK].
  • Page 105: Checking Stored Files

    Checking Stored Files Checking Stored Files You can display the Preview screen and check a stored file on the machine or from the client computer. Checking a Stored File Selected from the List This section explains how to preview a file selected from the list of stored files. Press [Select Stored File].
  • Page 106: Checking Stored Files From A Client Computer

    4. Storing Files Using the Scanner Function Stored File Preview Screen BAP008S 1. [Zoom Out], [Zoom In] In previewing, you can reduce or enlarge the file image. 2. [ ] [ ] [ ] [ ] You can scroll the preview screen. 3.
  • Page 107 Checking Stored Files You can also check files stored under the copier, Document Server, and printer functions. Using DeskTopBinder Lite to display stored files The stored files are displayed and can be checked on a client computer using DeskTopBinder Lite. •...
  • Page 108: Sending A Stored File

    4. Storing Files Using the Scanner Function Sending a Stored File This section explains how to send a stored file. Stored files can be sent by e-mail, Scan to Folder, or the network delivery scanner. There are two methods of sending stored files by e-mail. Settings made under [Scanner Features] determine which method is used.
  • Page 109 Sending a Stored File The selected files are sent in the order they were selected. If you press [Queue], only the files you have selected are displayed in the order they will be sent. For details about selecting the stored files, see "Displaying the List of Stored Files". Press [OK].
  • Page 110: Managing Stored Files

    4. Storing Files Using the Scanner Function Managing Stored Files This section explains how to delete stored files and how to change the data for stored files. Deleting a Stored File This section explains how to delete a stored file. Press [Select Stored File].
  • Page 111: Changing Information For A Stored File

    Managing Stored Files • You can also delete files stored in the machine by accessing the machine from a client computer using Web Image Monitor or DeskTopBinder. For detail about Web Image Monitor, see Web Image Monitor Help. For details about DeskTopBinder, see the manuals supplied with DeskTopBinder.
  • Page 112 4. Storing Files Using the Scanner Function Press [Change User Name]. Enter a new user name. The user names shown here are names that were registered on the [Administrator Tools] tab in [System Settings]. To change a user name not shown here, press [Manual Entry], and then enter the user name. Press [OK].
  • Page 113 Managing Stored Files Select the file containing the file information you want to change. If you select a password-protected stored file, a screen for entering the password appears. Enter the password, and then press [OK]. Press [Change File Name]. Change the file name. Press [OK].
  • Page 114 4. Storing Files Using the Scanner Function Press [OK]. Enter the same number again using the number keys. Press [OK]. • Using Web Image Monitor or DeskTopBinder, you can also change the password of a file stored in the machine from the client computer. For details about Web Image Monitor, see Web Image Monitor Help.
  • Page 115: Saving Scan Files On A Removable Memory Device

    5. Saving Scan Files on a Removable Memory Device Before Saving Files on a Removable Memory Device This section explains saving scan files on a removable memory device and provides related cautions. Overview of Saving Files on a Removable Memory Device The following diagram explains saving scan files on a removable memory device.
  • Page 116 5. Saving Scan Files on a Removable Memory Device 1. This Machine If the optional media slot is installed, the machine can save scan files on a removable memory device. 2. Removable Memory Device Scan files are saved on a removable memory device. 3.
  • Page 117: Basic Procedure For Saving Scan Files On A Removable Memory Device

    Basic Procedure for Saving Scan Files on a Removable Memory Device Basic Procedure for Saving Scan Files on a Removable Memory Device Use the following procedure to save scan files on a removable memory device. Insert a removable memory device in the media slot. You can connect only one removable memory device at a time.
  • Page 118 5. Saving Scan Files on a Removable Memory Device If necessary, press [Original Feed Type] to specify settings such as original orientation. For details, see "Setting of Original Feed Type". If necessary, press [Send File Type / Name] to specify settings such as file format and file name.
  • Page 119: Delivering Scan Files

    6. Delivering Scan Files Before Delivering Files This section describes the necessary preparations and the procedure for using the network delivery scanner. • To use the network delivery scanner function, your network must have a delivery server on which the ScanRouter delivery software (optional) is installed.
  • Page 120: Preparing To Deliver Files

    6. Delivering Scan Files For example, you can check a file by one of the following methods: • Use DeskTopBinder to view a file delivered to the in-tray. • Use e-mail software to receive e-mail with an attached file. • Browse a folder for a stored file. Preparing to Deliver Files To deliver scanned files, you must first perform the following: •...
  • Page 121 Before Delivering Files The System Settings screen appears. Press the [Interface Settings] tab. Press [Machine IPv4 Address] to specify the machine's IPv4 address. To specify a static IPv4 address for this machine, press Specify, and then enter the IPv4 address and subnet mask.
  • Page 122: Installing Desktopbinder Lite From The Supplied Cd-Rom

    6. Delivering Scan Files This section explains how to display the Scanner Features screen. For details about the settings on this screen, see "Scanner Features". Press the [User Tools/Counter] key, and then press [Scanner Features]. The Scanner Features screen appears. Press the [General Settings], [Scan Settings], [Send Settings], or [Initial Settings] tabs and configure the relevant settings on those tabs.
  • Page 123: Network Delivery Scanner Screen

    Before Delivering Files To view or receive files delivered to the in-trays, you must install DeskTopBinder Lite on the client computer. Make sure Windows is running on the client computer, and then insert the "Scanner Driver and Utilities" CD-ROM into the CD-ROM drive. The installer is automatically started and the [Scanner Driver and Utilities] dialog box appears.
  • Page 124 6. Delivering Scan Files BAP009S 1. Destination Field The specified destination appears. If more than one destination has been specified, press [ ] or [ ] to scroll through the destinations. 2. Network delivery scanner icon Indicates that the network delivery scanner screen is displayed. 3.
  • Page 125: Basic Procedure For Delivering Files

    Basic Procedure for Delivering Files Basic Procedure for Delivering Files This section explains the basic procedure for delivering scan files using the network delivery scanner. • You must register destinations and senders in advance using the ScanRouter delivery software installed on the delivery server.
  • Page 126 6. Delivering Scan Files If necessary, press [Original Feed Type] to specify settings such as original orientation. For details, see "Setting of Original Feed Type". Specify the destination. You can specify multiple destinations. For details, see "Specifying Delivery Destinations". If necessary, press [Subject] to specify the e-mail subject. For details, see "Entering the Subject of the E-mail to Be Transmitted via the Delivery Server".
  • Page 127 Basic Procedure for Delivering Files • After an e-mail is sent, the destination, sender, and subject fields will be automatically cleared. If you want to preserve the information in these fields, contact your local dealer. • p.126 "Switching to the Network Delivery Scanner Screen" •...
  • Page 128: Switching To The Network Delivery Scanner Screen

    6. Delivering Scan Files Switching to the Network Delivery Scanner Screen This section explains how to switch the screen to the network delivery scanner screen. If the E-mail screen or Scan to Folder screen is being displayed, switch to the network delivery scanner screen.
  • Page 129: Specifying Delivery Destinations

    Specifying Delivery Destinations Specifying Delivery Destinations This section explains how to specify delivery destinations. • You can specify multiple destinations. Selecting Destinations Registered in the Delivery Server's Address Book This section explains how to select destinations registered in the delivery server's address book You can select a delivery destination registered in Destination List of the delivery server by any of the following methods: •...
  • Page 130 6. Delivering Scan Files Selecting destinations by entering their registration numbers Select a destination by entering its Short ID number (registered using the ScanRouter delivery software). For details about how to set Short IDs, see the manuals supplied with the ScanRouter delivery software. Press [Reg.
  • Page 131 Specifying Delivery Destinations To search by destination name, press [Name]. To search by comment, press [Comment]. The soft keyboard appears. You can also search by combining [Name] and [Comment]. Enter the beginning of the destination name. To search by comment, enter the beginning of the comment. Press [OK].
  • Page 132 6. Delivering Scan Files • [Exact Match]: The names which correspond to an entered character or characters are targeted. For example, to search for "ABC", enter "ABC". • [Include one Word]: The names which contain an entered character or characters are targeted.
  • Page 133: Specifying The Sender

    Specifying the Sender Specifying the Sender This section explains how to specify the e-mail sender when sending a file by e-mail via the delivery server. You can specify the sender by any of the following methods: • Select the sender from the sender list •...
  • Page 134: Selecting A Sender By Searching The Delivery Server's Destination List

    6. Delivering Scan Files Press [Sender Name]. Press [Registration No.]. Using the number keys, enter the three-digit registration number assigned to the required destination folder. If the entered number is less than five digits, press the [ ] key after the last number. Example: To enter 006 Press the [6] key, and then press the [ ] key.
  • Page 135 Specifying the Sender Press [Sender Name]. Press [Search]. To search by destination name, press [Name]. To search by comment, press [Comment]. The soft keyboard appears. You can also search by combining [Name] and [Comment]. Enter the beginning of the sender's name. To search by comment, enter beginning of the comment.
  • Page 136 6. Delivering Scan Files Press [Start Search]. Destinations that match the search criteria are displayed. Select the sender. Press [OK]. • The Comment search function searches for destinations by comment information, which is a registration item required by the ScanRouter delivery software. •...
  • Page 137: Entering The Subject Of The E-Mail To Be Transmitted Via The Delivery Server

    Entering the Subject of the E-mail to Be Transmitted via the Delivery Server Entering the Subject of the E-mail to Be Transmitted via the Delivery Server This section explains how to enter the e-mail subject when sending a file by e-mail via the delivery server. Press [Subject].
  • Page 138: Simultaneous Storage And Delivery

    6. Delivering Scan Files Simultaneous Storage and Delivery This section explains how to store a file and simultaneously deliver it. Press [Store File]. Make sure that [Store to HDD + Send] is selected. If necessary, specify the stored file's information, such as [User Name], [File Name], and [Password].
  • Page 139: Scanning Originals With The Network Twain Scanner

    7. Scanning Originals with the Network TWAIN Scanner Before Using the Network TWAIN Scanner This section describes the preparations and procedure for using the network TWAIN scanner. The TWAIN driver allows you to scan originals on the machine from a client computer via the network. •...
  • Page 140: Preparing To Use The Network Twain Scanner

    7. Scanning Originals with the Network TWAIN Scanner 1. This Machine Scans an original after receiving a scan instruction from a client computer, and then sends the scan file over the network to the client computer. 2. Client Computer Specifies the scanner settings and controls the scanner using an application, such as DeskTopBinder Lite, that supports the network TWAIN scanner.
  • Page 141 Before Using the Network TWAIN Scanner Note that the settings you must configure will vary depending on your operating environment. For details about network settings and configuration procedures, see "Network Settings Required to Use Network TWAIN Scanner", Network and System Settings Guide. Press the [User Tools/Counter] key, and then press [System Settings].
  • Page 142: Installing The Twain Driver From The Supplied Cd-Rom

    7. Scanning Originals with the Network TWAIN Scanner For details about installing the TWAIN driver, see "Installing the TWAIN Driver from the Supplied CD- ROM". • p.140 "Installing the TWAIN Driver from the Supplied CD-ROM" Installing a TWAIN-compliant application on the same client computer To use this machine as a network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder, must be installed on the client computer.
  • Page 143 Before Using the Network TWAIN Scanner • Notes on using the network TWAIN scanner are provided in "Readme.txt". Be sure to read them before use. • p.194 "Software Supplied on CD-ROM" • p.194 "Auto-Run Program"...
  • Page 144: Basic Network Twain Scanner Procedure

    7. Scanning Originals with the Network TWAIN Scanner Basic Network TWAIN Scanner Procedure This section explains the basic procedure for scanning with the network TWAIN scanner. • To use the network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder and the TWAIN driver must be installed on the client computer.
  • Page 145 Basic Network TWAIN Scanner Procedure • If you have already selected a scanner, you do not need to select the scanner unless you want to change it. • Using DeskTopBinder, you can edit and print scan files. For more information about DeskTopBinder, see DeskTopBinder manuals.
  • Page 146: Scan Settings When Using Twain Scanner

    7. Scanning Originals with the Network TWAIN Scanner Scan Settings When Using TWAIN Scanner This section explains how to specify original orientation and scan setting for a bundle of mixed size originals when using the TWAIN scanner. Setting Original Orientation on the TWAIN Scanner To correctly display the top/bottom orientation of the scanned original on a client computer, the placement of the original and the settings made in the Scanner Control dialog box must match.
  • Page 147 Scan Settings When Using TWAIN Scanner Original Orientation TWAIN Scanner Control Dialog Box Key bottom edge touches left side of exposure glass bottom edge touches top of exposure glass Original Orientation TWAIN Scanner Control Dialog Box Key top edge of original placed first top edge touches rear of ADF bottom edge touches left side of ADF bottom edge touches top of ADF...
  • Page 148: When Scanning Originals Of Mixed Sizes Using Twain Scanner

    7. Scanning Originals with the Network TWAIN Scanner is different, the combination of original orientation and the orientation specified on the scanner driver does not change. • For details about the Scanner Control dialog box, see the TWAIN driver Help. •...
  • Page 149: Various Scan Settings

    8. Various Scan Settings Specifying Scan Settings This section explains how to make scan settings. Press [Scan Settings]. Specify resolution, scan size, and other settings, as required. For details about individual scan setting items, see "Scan Settings". Press [OK]. • p.148 "Scan Settings"...
  • Page 150: Scan Settings

    8. Various Scan Settings Scan Settings This section describes the items for Scan Settings. Scan Type Select a scan type that is appropriate for your original. [Black & White: Text] Appropriate to increase OCR readability using an OCR-compliant application. • [Dropout Colour] You can select not to scan the following colors: [Chromatic Colour], [Red], [Green], and [Blue].
  • Page 151: Resolution

    Scan Settings • If [Auto Colour Select] is selected, the machine may fail to correctly judge colors depending on the scanning condition or the contents of originals. • If [High Compression PDF] is selected as the file type, you can select only [Gray Scale], [Full Colour: Text / Photo], or [Full Colour: Glossy Photo] for Scan Type.
  • Page 152 8. Various Scan Settings Relationship of original of mixed sizes and scan size This section explains differences you need to be aware of when scanning originals of different length (such as A3 & A4 or B4 & B5) using the original position setting and size. •...
  • Page 153 Scan Settings Custom size original to be scanned BAO013S Scan settings on the custom size setting screen BAP042S 1. Original Size (X1 and Y1) Specify the length and width of the original. Enter the actual width and length in [X1] and [Y1], respectively, and then press the [ ] key. 2.
  • Page 154 8. Various Scan Settings BCR003S • p.152 "Setting procedure of a custom size when scanning part of an original" Setting procedure of a custom size when scanning part of an original This section explains how to specify a custom size for scanning part of an original. To scan part of an original, measure Original Size (X1 and Y1), Start Position (X2 and Y2), and Scan Area (X3 and Y3) on the surface of the original, and then enter those values in the same order on the custom size setting screen.
  • Page 155 Scan Settings Orientation and placement of original Measuring method for scanning the "R" section In the orientation in the ADF. BAO015S In the orientation on the exposure glass. BAO016S Scan settings on the custom size setting screen BAP043S 1. Original Size (X1 and Y1) Specify the original's entire size.
  • Page 156 8. Various Scan Settings • When scanning originals using [Custom Size], you cannot enter specific values in [Original Size] and [Start Position]. To configure the scan area, specify [Scan Area] and [Start Position] first, and then [Original Size]. How to set originals to scan them by custom size This section explains how to place originals you want to scan at custom size.
  • Page 157: Edit

    Scan Settings Item Description Placing an original on the exposure glass Turn the original over, place it face down on the exposure glass, and then align it with the top left corner BHE003S of the exposure glass. • p.157 "Setting of Original Feed Type" Edit Make editing settings.
  • Page 158: Adjusting Image Density

    8. Various Scan Settings Adjusting Image Density This section explains how to adjust image density. To adjust image density, press [ ] or [ ], at the left and right of [Auto Density]. These buttons increase or decrease the image density in single increments up to 7. Selecting [Auto Density] corrects scanning density to improve resolution of paper types such as non-white paper like newspaper or transparent originals.
  • Page 159: Setting Of Original Feed Type

    Setting of Original Feed Type Setting of Original Feed Type This section explains Original Feed Type settings such as orientation and scan sides of originals. Original Orientation This section explains how to correctly display the top/bottom orientation of scanned originals on a client computer screen.
  • Page 160: Original Settings

    8. Various Scan Settings Original orientation Control Panel Key top edge placed first top edge touches rear of ADF • Originals are normally rectangular ( ) or horizontally long ( ). However, the table above uses squares to make original orientation easier to understand. Even if the actual shape of the original is different, the combination of original orientation and the orientation specified on the scanner driver does not change.
  • Page 161 Setting of Original Feed Type In [Original Settings], select [1 Sided Original]. Press [OK]. Two-sided original This section explains the settings for scanning both sides of originals. Press [Original Feed Type]. In [Original Settings], select [2 Sided Original]. In [Page Opening Orientation], select [Top to Top] or [Top to Bottom] according to the binding orientation of the originals.
  • Page 162: Stamp

    8. Various Scan Settings If the last page of the last original is blank, in [Last Page], select [1 Side] or [2 Sides]. To skip the last page, select [1 Side]. To scan the last page as blank page, select [2 Sides]. Press [OK].
  • Page 163: Batch, Sadf

    Setting of Original Feed Type Press [OK]. • The stamp position varies depending on the machine type. • Last pages are stamped even if you selected not to scan the last page. • Stamping may continue if scanning is interrupted, depending on the cause of interruption. •...
  • Page 164: Divide

    8. Various Scan Settings • If [SADF] is selected, scanning starts as soon as you place additional originals in the ADF. However, in the following cases you must press the [Start] key to start scanning additional originals. • After scanning additional originals using the exposure glass •...
  • Page 165 Setting of Original Feed Type If necessary, press [Division Check]. When you select [Division Check], if the originals were not scanned in order due to a paper jam or multi-sheet feed, a screen for stopping or continuing scanning appears at the end of the scan. Press [OK] twice.
  • Page 166 8. Various Scan Settings Scanning Multiple Pages of Originals as One File This section explains the procedure for sending multiple originals as a multi-page file or storing them as a single stored file. • To send multiple originals as a multi-page file, in [Send File Type / Name], select a multi-page file type.
  • Page 167 Scanning Multiple Pages of Originals as One File • If, under [Scanner Features], [Set Wait Time] is set for [Wait Time for Next Orig.: Exposure Glass] or [Wait Time for Next Original(s): SADF], place additional originals within the specified time. When the countdown ends, transmission or storage starts automatically.
  • Page 168: Specifying The File Type And File Name

    8. Various Scan Settings Specifying the File Type and File Name This section explains the procedure for specifying the file type, file name, and security for PDF files. Specifying the File Type This section explains the procedure for specifying the file type of a file you want to send. File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail or Scan to Folder, and saving files on a removable memory device.
  • Page 169: Notes About And Limitations Of File Types

    Specifying the File Type and File Name Select a file type. Press [OK]. • To deliver files, specify the file type using the delivery server computer. For details, see the manuals provided with the ScanRouter delivery software. • If you select [Store to HDD] under [Store File], you cannot specify the file type. •...
  • Page 170: Specifying The File Name

    8. Various Scan Settings • According to the settings specified for [Compression (Gray Scale / Full Colour)] under [Scanner Features], originals scanned in full color or gray scale are sent in one of the following file types: • [On] : JPEG file •...
  • Page 171 Specifying the File Type and File Name (Example: For a file scanned in single-page TIFF at 10 ms, 15 sec., 15:30 hours on Dec. 31, 2020, the file name will be 20201231153015010_0001.tif) • Multi-page files are given file names that contain the time and date of scanning. (Example: For a file scanned in multi-page TIFF at 10 ms, 15 sec., 15:30 hours on Dec.
  • Page 172: Security Settings For Pdf Files

    8. Various Scan Settings Press [Send File Type / Name]. Press [Change] to the right of the entry box. Using the number keys, enter the starting digit of the serial number. Press the [ ] key. Press [OK]. • You can change the starting digit only if a file type other than [Single Page] is selected. •...
  • Page 173 Specifying the File Type and File Name Encrypting PDF files Set a password to protect and encrypt a PDF file. Only users who have the password can open and decrypt the PDF file. • Encryption is possible only for scan files that are sent by e-mail or Scan to Folder and saved on a removable memory device.
  • Page 174 8. Various Scan Settings In [Password], press [Enter]. Enter a password, and then press [OK]. The password entered here will be required to open the PDF file. Enter the password again, and then press [OK]. In [Encryption Level], select [40 bit] or [128 bit]. Press [OK] twice.
  • Page 175 Specifying the File Type and File Name Press [Send File Type / Name]. Check that [PDF] or [High Compression PDF] is selected. Press [Security Settings]. Select [Permissions]. In [Master Password], select [Set]. In [Password], press [Enter]. Enter a password, and then press [OK]. The password entered here will be required to change the security settings of the PDF file.
  • Page 176 8. Various Scan Settings • Print permission: [Prohibit], [Allow], or [Low Resolution Only] • Editing permission: [Prohibit] or [Allow] • Copying or extracting content permission: [Prohibit] or [Allow] Press [OK] twice. • A document password cannot be the same as the Master password. •...
  • Page 177: Programs

    Programs Programs You can register frequently used settings in the machine memory and recall them for future use. • You can register up to 10 programs for the scanner mode. • Programs are not deleted by turning the power off or by pressing the [Clear Modes] key unless the content is deleted or newly registered.
  • Page 178: Recalling A Registered Content

    8. Various Scan Settings Select the number of the program in which you want to register the settings. Program numbers with already have settings in them. Enter the program name. Press [OK]. The Program screen reappears. When the settings are successfully registered, appears on the left side of the registered program number and the program name appears on the right side.
  • Page 179: Deleting A Program

    Programs Press the [Program] key. Press [Program]. Press the number of the program whose settings you changed or the number of a different program in which you want to register the changed settings. If you select a program that is already registered, a confirmation message appears. To overwrite the program, press [Yes].
  • Page 180 8. Various Scan Settings Press [Change Name]. Press the number of the program whose name you want to change. The soft keyboard appears. Enter a new program name. Press [OK]. The new program name appears briefly, and then the initial screen reappears.
  • Page 181: Registering The Default Values Of The Scanner's Initial Display

    Registering the Default Values of the Scanner's Initial Display Registering the Default Values of the Scanner's Initial Display This section explains how to set defaults for the initial screen, which appears when the machine is turned on or when settings are cleared or reset. The following settings can be registered as defaults: Scan Settings, 1 Sided/2 Sided Original, Top to Top/ Top to Bottom, 1 Side/2 Sides for the Last Page, Divide, Original Orientation, File Type, Stamp, Batch/ SADF, Store File, Preview, Reception Notice, and Security (E-mail Encryption and Signature).
  • Page 182 8. Various Scan Settings • Default settings for the initial screen can be registered for normal screens and simplified displays respectively.
  • Page 183: Scanner Features

    9. Scanner Features Accessing User Tools This section describes how to change the settings of [Scanner Features]. • Procedures for configuring system settings differ from procedures for configuring other settings. You must return to the initial screen when you finish configuring the system settings. For details about returning to the initial screen, see "Closing User Tools".
  • Page 184: Closing User Tools

    9. Scanner Features • To cancel changes made to the settings and return to the initial display, press the [User Tools/Counter] key. Closing User Tools This section describes how to quit User Tools. Press the [User Tools/Counter] key. BAX001S • You can also quit User Tools by pressing [Exit].
  • Page 185: General Settings

    General Settings General Settings This section describes the user tools on the [General Settings] tab in [Scanner Features]. Default settings are shown in bold type. Switch Title Select the title to be shown on the destination list. The default setting is Title 1. Update Delivery Server Destination List Press [Update Delivery Server Destination List] to update the receivers from the delivery server.
  • Page 186 9. Scanner Features The default setting is E-mail Address. Print & Delete Scanner Journal Up to 250 transmission/delivery results can be checked on this machine. If the stored transmission/ delivery results reach 250, select whether to print the delivery journal. The default setting is On.
  • Page 187: Scan Settings

    Scan Settings Scan Settings This section describes the user tools in the [Scan Settings] tab under [Scanner Features]. Default settings are shown in bold type. A.C.S. Sensitivity Level Sets the sensitivity level for judging colour/black and white for scanning originals when [Scan Type] is set to [Auto Colour Select].
  • Page 188 9. Scanner Features This setting is valid if [SADF] is specified for [Original Feed Type] when scanning. If [Set Wait Time] is selected, enter the wait time in seconds (3-999) for placing additional originals with the number keys. Scanning will start automatically if additional originals are placed within this time.
  • Page 189: Send Settings

    Send Settings Send Settings This section describes the user tools in the [Send Settings] tab under [Scanner Features]. Default settings are shown in bold type. Compression (Black & White) Select whether or not to compress black and white scan files. The default setting is On.
  • Page 190 9. Scanner Features When [Yes (per Max. Size)] is selected, some received files may not be able to be restored, depending on the type of e-mail software. When [No] is selected, the e-mail is not sent if its size exceeds the limit, and an error message appears. The scan file is discarded.
  • Page 191: Administrator Tools

    Administrator Tools Administrator Tools This section describes the administrator tool. Menu Protect You can specify user access levels for functions whose settings can be changed by users other than the administrator. Using Menu Protect, you can prevent unauthenticated users from changing the user tools. Menu Protect is a Scanner Features setting item.
  • Page 192 9. Scanner Features...
  • Page 193: 10. Appendix

    10. Appendix Relationship between Resolution and Scan Size This section explains the relationship between resolution and scan size. Resolution and scan size are inversely related. The higher the resolution (dpi) is set, the smaller the area that can be scanned. Similarly, the larger the scan area, the lower the resolution that can be set. The relationship between the scanning resolution and scan size is shown below.
  • Page 194: When Using As A Twain Scanner

    10. Appendix • A7 (74 mm/2.9 inches × 105 mm/4.1 inches) When Using as a TWAIN Scanner This section explains the relationship between resolution and scan size when using the machine as a TWAIN scanner. To specify the scan area or resolution on the machine you are using as a network TWAIN scanner directly, see the TWAIN driver Help.
  • Page 195 Relationship between Resolution and Scan Size Scan size Maximum resolution (dpi) A6, A7 1200 • Enter A7 size directly. • A7 (74 mm/2.9 inches × 105 mm/4.1 inches)
  • Page 196: Software Supplied On Cd-Rom

    10. Appendix Software Supplied on CD-ROM This section explains the applications on the supplied CD-ROM. Auto-Run Program This section explains the auto-run program. When the CD-ROM is inserted into a client computer running Windows 2000/XP/Vista or Windows Server 2003/2003 R2, the installer starts up automatically (auto run) to install various software. •...
  • Page 197: Desktopbinder Lite

    Software Supplied on CD-ROM DeskTopBinder Lite This section tells you the file path to DeskTopBinder Lite, the DeskTopBinder Lite system requirements, and the applications that are installed with DeskTopBinder Lite. DeskTopBinder is installed on the client computers to integrate and manage various kinds of files such as scan files, files created with applications, and existing scan files.
  • Page 198 10. Appendix SmartDeviceMonitor for Client provides functions for continuous device status monitoring on the network via TCP/IP or IPX/SPX.
  • Page 199: Values Of Various Set Items For Transmission/Storage/Delivery Function

    Values of Various Set Items for Transmission/Storage/Delivery Function Values of Various Set Items for Transmission/ Storage/Delivery Function This section explains the values of various transmission/storage/delivery function settings. • Depending on the type or settings of the file or original, you may not be able to specify the destination or enter the maximum number of characters stated below.
  • Page 200 10. Appendix Item Maximum value Comments Sendable file size 725.3 MB per file Sendable number of pages 2,000 pages per file Folder transmission The following table tells you the maximum values of the Scan to Folder function settings. Values of Set Items for Scan to Folder Item Maximum value Comments...
  • Page 201: Storage Function

    Values of Various Set Items for Transmission/Storage/Delivery Function Item Maximum value Comments Sendable file size 2,000 MB per file Simultaneous transmission The following table tells you the maximum values of settings for using the E-mail and Scan to Folder functions simultaneously.
  • Page 202: Network Delivery Function

    10. Appendix Values of Set Items for File Storage Item Maximum value Comments Number of file name 64 alphanumeric characters On the control panel, the first 16 characters characters are displayed. When viewing the stored files from a client computer using DeskTopBinder, all the entered characters can be viewed.
  • Page 203 Values of Various Set Items for Transmission/Storage/Delivery Function Values of Set Items for Network Delivery Item Maximum value Comments Number of subject line 128 alphanumeric characters This is the total number of characters characters selected from the list and the number of characters entered directly from text.
  • Page 204: Specifications

    10. Appendix Specifications The following table tells you the specifications of the scanner. Specifications Component Specifications Type Full-color scanner Scan method Flatbed scanning Image sensor type CCD Image Sensor Scan type Sheet, book, three-dimensional object • Length 140 297 mm (5 11 inches) Original sizes that can be scanned •...
  • Page 205 Specifications Component Specifications Black and white: 50 page/min (Scan Type: Text, Compression (Black & White): On, ITU-T No1 Chart) Full Color: 50 page/min (Scan Type: Text / Line Art, Compression (Gray Scale / Full Colour): Compression Level 2, Original Chart) •...
  • Page 206 10. Appendix Component Specifications Selectable scanning resolutions when using the 100 dpi, 200 dpi, 300 dpi, 400 dpi, 600 dpi E-mail function (main scanning × sub scanning) Protocol for sending e-mail SMTP, POP3 Sendable file formats when using the E-mail TIFF, JPEG, PDF, High Compression PDF function Selectable scanning resolutions when using the...
  • Page 207: Trademarks

    Trademarks Trademarks ® ® ® ® ® Adobe , Acrobat , PostScript , and Reader are either registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. ® Pentium is a registered trademark of Intel Corporation. ® NetWare is a registered trademark of Novell, Inc.
  • Page 208 10. Appendix ® ® Microsoft Windows NT Workstation 4.0 ® ® Microsoft Windows NT Server 4.0...
  • Page 209 INDEX Check Modes..............Preview................A.C.S. Sensitivity Level........Scanned Files Status............Access Privileges....... 47, 76, 96, 97, 136 Connecting to the network..22, 23, 55, 78, 118, Accessing User Tools.......... Custom Size............Address book original orientation............registering destination folders........... scanning an entire original..........registering e-mail addresses..........
  • Page 210 Gray Scale............specifying the path by browsing the shared network folder ..................... Destination (WSD scanner) High Compression PDF......searching the destination........... 166, 167 selecting the destination............ High Compression PDF Level......Destination list..... 26, 31, 59, 63, 81, 122, 127 Destination List Display Priority 1....... Insert Additional E-mail Info.......
  • Page 211 custom size..............network delivery.............. TWAIN scanner.............. Scan to Folder..............storing................Original Settings..........TWAIN scanner.............. Outline Restore Factory Defaults........delivering scan files............Result of sending............ network TWAIN scanner..........saving on a memory device........... sending scan files by e-mail..........S/MIME..............sending scan files by Scan to Folder........ storing scan files..............
  • Page 212 selecting by entering a registration number....specifying a password............selecting from the list............specifying a user name............specifying file information..........Sender (e-mail)............Subject............44, 135 searching the machine's address book......selecting by entering a registration number....Switch Title............selecting from the list............Switching screen Sender Name........
  • Page 213 Wait Time for Next Original(s) SADF....Web Image Monitor......25, 104, 105 WSD scanner............WSD scanner destination........WSD scanner screen........80, 85...
  • Page 214 MEMO D029...
  • Page 215 Copyright © 2008...
  • Page 216 D029-7882...
  • Page 217 Operating Instructions Network and System Settings Guide System Settings Connecting the Machine Using a Printer Server Monitoring and Configuring the Printer Registering Addresses and Users for Facsimile / Scanner Functions Special Operations under Windows Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 219 TABLE OF CONTENTS Manuals for This Machine..........................10 Notice................................12 Important..............................12 How to Read This Manual..........................13 Symbols................................13 Names of Major Options..........................13 Note................................13 About IP Address............................14 Laws and Regulations............................15 Legal Prohibition............................15 Display Panel..............................16 Accessing User Tools............................17 Changing Default Settings...........................17 Quitting User Tools............................18 1. System Settings General Features..............................19 Output Tray Settings (Type 1 and 2)......................21 Output Tray Settings (Type 3 and 4)......................22...
  • Page 220 Changing the Realm............................65 Deleting the Realm............................66 2. Connecting the Machine Connecting to the Interfaces..........................67 Connecting to the Ethernet Interface......................68 Connecting to the Gigabit Ethernet Interface....................69 Connecting to the USB Interface........................71 Connecting to the IEEE 1284 Interface.....................72 Connecting to the Wireless LAN Interface....................72 Network Settings Required to Use the Printer/LAN-Fax................75 Ethernet.................................75 Wireless LAN...............................76...
  • Page 221 Using Utilities to Make Network Settings.....................101 Interface Settings............................101 File Transfer..............................107 Connecting the Machine to a Telephone Line and Telephone..............110 Connecting the Telephone Line (Type 1 and 2)..................110 Connecting the Telephone Line (Type 3 and 4)..................110 Selecting the Line Type..........................111 Connecting the Optional Handset or an External Telephone..............111 3.
  • Page 222 Changing Names and Comments......................151 Load Fax Journal............................152 Viewing and Deleting Spool Print Jobs....................153 Managing Address Information.......................153 Using SmartDeviceMonitor for Client......................155 Monitoring Printers............................155 Checking the Machine Status........................156 When Using IPP with SmartDeviceMonitor for Client................156 Printer Status Notification by E-Mail......................158 Setting the Account for E-mail Notification.....................160 Mail Authentication...........................160 Auto E-mail Notification..........................161 On-demand E-mail Notification.......................162...
  • Page 223 ipp................................177 ipsec................................178 ipv6................................178 logout.................................178 lpr................................179 netware..............................179 passwd...............................181 pathmtu...............................181 prnlog.................................182 route................................182 rhpp................................183 set................................184 show................................187 slp................................187 smb................................187 snmp................................188 sntp................................191 spoolsw..............................192 ssdp................................193 ssh................................193 status................................194 syslog................................194 upnp................................194 web................................194 wiconfig..............................195 wins................................199 wsmfp.................................200 8021x................................201 SNMP................................204 Getting Printer Information over the Network.....................206 Current Printer Status..........................206 Printer configuration..........................215 Understanding the Displayed Information....................217...
  • Page 224 Print Job Information..........................217 Print Log Information..........................217 Configuring the Network Interface Board....................218 Message List..............................229 System Log Information..........................229 5. Registering Addresses and Users for Facsimile/Scanner Functions Address Book..............................239 Managing names in the Address Book....................242 Sending fax by Quick Dial........................242 Sending e-mail by Quick Dial........................243 Sending received fax documents or scanned files to a shared folder directly........243 Preventing unauthorized user access to shared folders from the machine...........243 Managing users and machine usage......................243...
  • Page 225 Registering an E-mail Destination......................271 Changing an E-mail Destination......................273 Deleting an E-mail Destination.........................274 Registering Folders............................276 Registering an SMB Folder........................276 Changing an SMB Folder.........................279 Deleting an SMB registered folder......................281 Registering an FTP Folder.........................282 Changing an FTP folder..........................284 Deleting an FTP folder..........................286 Registering an NCP folder........................287 Changing an NCP registered folder......................290 Deleting an NCP folder..........................292 Registering Names to a Group........................293...
  • Page 226 Printing with Bluetooth Connection.......................316 Supported Profiles.............................316 Adding a Bluetooth Printer........................316 7. Appendix When Using Windows Terminal Service/MetaFrame................319 Operating Environment..........................319 Supported Printer Drivers..........................319 Limitations..............................319 Using DHCP..............................321 Using AutoNet............................321 Configuring the WINS Server........................322 Using Web Image Monitor........................322 Using telnet..............................322 Using the Dynamic DNS Function........................324 Updating..............................324 DNS servers targeted for operation......................325 DHCP servers targeted for operation......................325...
  • Page 227 SASL................................342 MD4................................343 MD5................................343 Samba(Ver 3.0.4).............................343 ® RSA BSAFE ..............................344 Open SSL..............................344 Open SSH..............................346 Open LDAP..............................350 Heimdal..............................351 print language emulations......................351 Trademarks..............................352 INDEX ................................355...
  • Page 228: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 229 • Change the user name and password of the administrator using Web Image Monitor. For details, see "Setting Up the Machine", Security Reference. Be sure to read this manual when setting the enhanced security functions, or user and administrator authentication. PostScript 3 Supplement Explains how to set up and use PostScript 3.
  • Page 230: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products.
  • Page 231: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be sure to read these notes. They can be found in the "Safety Information" section of About This machine. Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data.
  • Page 232: About Ip Address

    Some illustrations in this manual might be slightly different from the machine. Certain options might not be available in some countries. For details, please contact your local dealer. Depending on which country you are in, certain units may be optional. For details, please contact your local dealer.
  • Page 233: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 234: Display Panel

    Display Panel The display panel shows machine status, error messages, and function menus. The function items displayed serve as selector keys. You can select or specify an item by lightly pressing it. When you select or specify an item on the display panel, it is highlighted like .
  • Page 235: Accessing User Tools

    Accessing User Tools This section describes how to access User Tools menu. User Tools allow you to change or set defaults. • Operations for system settings differ from normal operations. Always quit User Tools when you have finished. • Any changes you make with User Tools remain in effect even if the main power switch or operation switch is turned off, or the [Energy Saver] or [Clear Modes] key is pressed.
  • Page 236: Quitting User Tools

    • p.19 "System Settings" Quitting User Tools This section describes how to quit the settings of User Tools. Press the [User Tools/Counter] key. BHJ201S • You can also quit User Tools by pressing [Exit].
  • Page 237: System Settings

    1. System Settings This chapter describes user tools in the System Settings menu. For details on how to access System Settings, see "Accessing User Tools". General Features This section describes the user tools in the General Features menu under System Settings. Program / Change / Delete User Text You can register text phrases you often use when specifying settings, such as ".com"...
  • Page 238 1. System Settings Panel Key Sound The beeper (key tone) sounds when a key is pressed. The default setting is [Medium]. Warm-up Beeper (copier/Document Server) You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver mode, or when the power is turned on.
  • Page 239: Output Tray Settings (Type 1 And 2)

    General Features Output: Facsimile (facsimile) Specify a tray to which documents are delivered. The default setting is [Internal Tray 1]. Output: Printer (printer) Specify a tray to which documents are delivered. The default setting is [Internal Tray 1]. System Status/Job List Display Time Specify how long to display the System Status and Job List display for.
  • Page 240: Output Tray Settings (Type 3 And 4)

    1. System Settings BHJ017S 1. Internal Tray 1 2. Internal Tray 2 3. Finisher Upper Tray 4. Finisher Shift Tray Output Tray Settings (Type 3 and 4) • You cannot interrupt the current stapling job even if a stapling job is specified by a different function. •...
  • Page 241 General Features BHJ016S 1. Internal Tray 1 2. Internal Tray 2 3. Finisher Upper Tray 4. Finisher Shift Tray...
  • Page 242: Tray Paper Settings

    1. System Settings Tray Paper Settings This section describes the user tools in the Tray Paper Settings menu under System Settings. • If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed might occur because the correct paper size was not detected.
  • Page 243 Tray Paper Settings The paper guide for the tray 1 is fixed. If you need to change the paper size, contact your service representative. Tray Paper Size: Tray 2 Select the size of the paper loaded in the paper tray. The paper sizes you can set for tray 2 are as follows: •...
  • Page 244 1. System Settings Paper Type: Bypass Tray Sets the display so you can see what type of paper is loaded in the bypass tray. The paper types you can set for the bypass tray are as follows: • [No Display], [Recycled Paper], [Color Paper], [Letterhead], [Label Paper], [Preprinted Paper], [Bond Paper], [Cardstock], [OHP (Transparency)], [Special Paper 1], [Special Paper 2], [Special Paper 3], [Envelope], [Coated Paper], [Coated Paper: Gloss] The paper thicknesses you can set for the bypass tray are as follows:...
  • Page 245 Tray Paper Settings The default setting for "Apply Auto Paper Select" is [Yes]. The key mark is displayed next to the paper tray if [No] is selected in "Apply Auto Paper Select". "Apply Auto Paper Select" can only be selected for the copier function if [No Display] and [Recycled Paper] are selected.
  • Page 246 1. System Settings The print function uses this information to automatically select the paper tray. The paper types you can set for the paper tray 3 - 4 (when the lower paper trays are installed) are as follows: • [No Display], [Recycled Paper], [Color Paper], [Letterhead], [Preprinted Paper], [Bond Paper], [Cardstock], [Special Paper 1], [Special Paper 2], [Special Paper 3], [Coated Paper], [Coated Paper: Gloss] The paper thicknesses you can set for the paper tray 3 - 4 (when the lower paper trays are installed)
  • Page 247 Tray Paper Settings • [Thick Paper 2] (170.0 - 220.0 g/m , 45.0 - 58.5 lb.) • [Thick Paper 3] (221.0 - 256.0 g/m , 59.0 - 68.0 lb.) The default setting for "Paper Type" is [No Display]. The default setting for "Paper Thickness" is [Plain Paper]. The default setting for "Apply Duplex"...
  • Page 248 1. System Settings For details about the relations between possible paper sizes and thickness, see "Recommended Paper Sizes and Types", About This Machine. For details about the recommended conditions for using thick paper, see "Thick Paper", About This Machine. Cover Sheet Tray You can specify and display the paper tray that is used to set front cover sheets.
  • Page 249: Timer Settings

    Timer Settings Timer Settings This section describes the user tools in the Timer Settings menu under System Settings. Auto Off Timer (Type 1 and 2) After a specified period has passed, following job completion, the machine automatically turns off, in order to conserve energy. This function is called “Auto Off”. The machine status after the Auto Off operation is referred to as "Off mode", or "Sleep mode".
  • Page 250 1. System Settings Copier / Document Server Auto Reset Timer (copier/Document Server) Specifies the time to elapse before copier and Document Server modes reset. If [Off] is selected, the machine does not automatically switch to the user code entry screen. The time can be set from 10 to 999 seconds, using the number keys.
  • Page 251: Interface Settings

    Interface Settings Interface Settings This section describes the user tools in the Interface Settings menu under System Settings. Network This section describes the user tools in the Network menu under Interface Settings. Machine IPv4 Address Specify the machine's IPv4 network address. The default setting is [Auto-Obtain (DHCP)].
  • Page 252 1. System Settings The default setting is [Auto-Obtain (DHCP)]. When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a number). DDNS Configuration Specify the DDNS settings. The default setting is [Active]. IPsec Specify the machine's IPsec function Active/Inactive. The default setting is [Inactive].
  • Page 253 Interface Settings SMB Computer Name Specify the SMB computer name. Enter the computer name using up to 15 characters. "*+,/:;<>=?[\]|. and spaces cannot be entered. Do not set a computer name starting with RNP and rnp. Use uppercase letters for alphabets. SMB Work Group Specify the SMB work group.
  • Page 254: Parallel Interface

    1. System Settings For details about IEEE 802.1X authentication, see “Configuring IEEE 802.1X (WPA/WPA2)”. LAN Type When you have installed the Wireless LAN interface unit, select the method of connection. The default setting is [Ethernet]. [LAN Type] is displayed when wireless LAN board is installed. If Ethernet and Wireless LAN are both connected, the selected interface has priority.
  • Page 255: Wireless Lan

    Interface Settings Parallel Timing Sets the timing for the control signal of the parallel interface. Normally, you do not need to change this setting. The default setting is [ACK Outside]. Parallel Communication Speed Sets the communication speed for the parallel interface. If the speed is too high, data may not be transferred smoothly.
  • Page 256 1. System Settings Communication Mode Specifies the communication mode of the wireless LAN. The default setting is [Infrastructure Mode]. SSID Setting Specifies SSID to distinguish the access point in [Infrastructure Mode] or [802.11 Ad-hoc Mode]. The characters that can be used are ASCII 0x20-0x7e (32 bytes). If blank is specified in [802.11 Ad-hoc Mode], "ASSID"...
  • Page 257: Print List

    Interface Settings • WPA Encryption Method Select either [TKIP] or [CCMP (AES)]. • WPA Authent. Method Select either [WPA-PSK], [WPA], [WPA2-PSK], or [WPA2]. If you selected [WPA-PSK] or [WPA2-PSK], enter the Pre-Shared Key ("PSK") of 8- 63 characters in ASCII code. When [WPA] or [WPA2] are selected, authentication settings and certificate installation settings are required.
  • Page 258 1. System Settings Press [Interface Settings]. Press [Print List]. Press the [Start] key. The configuration page is printed. Press [Exit]. Press the [User Tools/Counter] key. • You can also exit by pressing [Exit] on the User Tools main menu. • p.17 "Accessing User Tools"...
  • Page 259: File Transfer

    File Transfer File Transfer This section describes the user tools in the File Transfer menu under System Settings. Delivery Option Enables or disables sending stored or scanned documents to the ScanRouter delivery server. The default setting is [Off]. Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do, you will have to preregister I/O devices in the ScanRouter delivery software.
  • Page 260 1. System Settings If a received fax document cannot be sent to the ScanRouter delivery software, it is stored in memory. To print a stored file, select [Print File], to delete, select [Delete File]. If the machine can send the data to the ScanRouter delivery software, it does so automatically. If you delete the data, you will not be able to distribute or print it.
  • Page 261 File Transfer POP before SMTP Specify POP authentication (POP before SMTP). When sending e-mail to an SMTP server, you can enhance the SMTP server security level by connecting to the POP server for authentication. The default setting is [Off]. If you set POP before SMTP to [On], specify the waiting time after authentication, user name, e-mail address, and password.
  • Page 262 1. System Settings Encryption-[On] Encrypt password. Encryption-[Off] Do not encrypt password. Administrator's E-mail Address Specify the Administrator's E-mail Address. If a failure occurs in the machine or consumables need to be replaced, e-mail messages are sent to the Administrator's E-mail Address by E-mail Notification function. On e-mailed scanned documents, if the sender is not specified this appears as the sender's address.
  • Page 263 File Transfer The default setting is [Off]. Default User Name / Password (Send) Specify the user name and password required when sending scan files directly to a shared folder on a computer running Windows, to an FTP server, or to a NetWare server. Enter in up to 128 characters.
  • Page 264 1. System Settings 6. Press [Delete]. 7. Select the e-mail message to delete. The confirmation message about deleting appears. 8. Press [Yes]. 9. Press [Exit]. 10. Press the [User Tools/Counter] key. Auto Specify Sender Name Set whether or not to specify the name of the sender when sending e-mail. The default setting is [Off].
  • Page 265 File Transfer This setting is for the scanner function. This setting is not valid for the WSD scanner function. Number of Scanner Resends Sets a maximum number of times a scan file is resent to the delivery server or mail server. The default setting is [On], “3”...
  • Page 266: Administrator Tools

    1. System Settings Administrator Tools This section describes the user tools in the Administrator Tools menu under System Settings. Administrator Tools are used by the administrator. To change these settings, contact the administrator. We recommend specifying Administrator Authentication before making Administrator Tools settings. Address Book Management You can add, change or delete information registered in the Address Book.
  • Page 267 Administrator Tools Address Book: Program / Change / Delete Group Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group. • Program/Change You can register and change groups. •...
  • Page 268 1. System Settings 5. Press the name key to be moved. You can select a name using the number keys. 6. Press the name key in place you want to move it to. The user key is moved to the selected position, and the user key currently at the selected position is moved forward or backward.
  • Page 269 Administrator Tools You can also select a name using the number keys. Print Address Book: Destination List You can print the destination list registered in the Address Book. • Print in Title 1 Order Prints the Address Book in Title 1 order. •...
  • Page 270 1. System Settings 5. Press the title key you want to change. 6. Enter the new name, and then press [OK]. 7. Press [OK]. Address Book: Switch Title Specifies the title to select a name. The default setting is [Title 1]. Back Up / Restore Address Book You can back up the machine's address book to external storage or restore the backup copy from the external storage.
  • Page 271 Administrator Tools Display / Print Counter Allows you to view and print the number of prints. • "Display / Print Counter" Displays the number of prints for each function (Total, Copier, Printer, A3/DLT, Duplex, Fax Prints, Send / TX Total, Fax Transmission, Scanner Send, Coverage). •...
  • Page 272 1. System Settings • Printer: [Black & White / Color], [Color], [PC Control], [Do not Restrict] • Other Functions: [Document Server], [Facsimile], [Scanner] • Printer Job Authentication: [Entire], [Simple (Limitation)], [Simple (All)] • Limitation Range: [Change] • Basic Auth. • Windows Auth. •...
  • Page 273 Administrator Tools If you select [On], documents stored subsequently are deleted after the specified period. If you select [Off], documents are not automatically deleted. If you select [On], enter a number of days from 1 to 180 (in 1 day increments). The default is “3”...
  • Page 274 1. System Settings • Realm Name • KDC Server Name • Domain Name Be sure to set both the realm name and KDC server name when programming a realm. For details about Program/Change/Delete Realm, see "Programming the Realm". AOF (Always On) Specify whether or not to use Auto Off.
  • Page 275 Administrator Tools If a PC with the printer driver installed is connected to another device of the same model through the USB interface, selecting [On] for this option eliminates the need for additional installation of the driver to the PC. Machine Data Encryption Settings For details about this function, consult your administrator.
  • Page 276: Programming The Ldap Server

    1. System Settings Programming the LDAP server This section describes how to specify the LDAP server settings. This function supports LDAP version 2.0 and 3.0. Program the LDAP server to find e-mail destinations in the LDAP server Address Book directly. This function is possible when sending scan files by e-mail using the scanner or fax function.
  • Page 277 Programming the LDAP server Enter the server name, and then press [OK]. Press [Change] under "Search Base". Select a root folder to start the search from e-mail addresses registered in the selected folder are search targets. Enter the search base, and then press [OK]. For example, if the search target is the sales department of ABC company, enter "dc=sales department, o=ABC".
  • Page 278 1. System Settings If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 19 to 22, and then proceed to step 24. If you select [Kerberos Authentication], proceed to step 19 to 23, and then proceed to step 24. Press [Change] under "User Name".
  • Page 279 Programming the LDAP server Press [Connection Test]. Access the LDAP server to check that the proper connection is established. Check authentication works according to the authentication settings. Press [Exit]. If the connection test fails, check your settings and try again. This function does not check search conditions or the search base.
  • Page 280: Changing The Ldap Server

    1. System Settings The key does not appear on the search screen unless both "Attribute" and "Key Display" are registered. Make sure you register both to use the optional search. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • p.306 "Registering SMTP and LDAP Authentication" Changing the LDAP server This section describes how to change the programmed LDAP server.
  • Page 281 Programming the LDAP server Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [ Next]twice. Press [Program / Change / Delete LDAP Server]. Press [Delete]. Select the LDAP server you want to delete. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 282: Programming The Realm

    1. System Settings Programming the Realm This section describes how to specify the Realm settings. Program the realm to be used for Kerberos authentication. A realm is the network area in which Kerberos authentication is used. After confirming the network environment, specify the necessary items.
  • Page 283: Changing The Realm

    Programming the Realm Press [Change] under "Realm Name". Enter the realm name, and then press [OK]. Enter the realm name, or host name. You can enter a realm name using up to 64 characters. Press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 284: Deleting The Realm

    1. System Settings To change the realm name, press [Change] under "Realm Name". Enter the realm name, and then press [OK]. You can enter a realm name using up to 64 characters. To change the KDC server name, press [Change] under "KDC Server Name". Enter the KDC server name, and then press [OK].
  • Page 285: Connecting The Machine

    2. Connecting the Machine This chapter describes how to connect the machine to the network and specify the network settings. Connecting to the Interfaces This section explains how to identify the machine's interface and connect the machine according to the network environment.
  • Page 286: Connecting To The Ethernet Interface

    2. Connecting the Machine Connecting to the Ethernet Interface This section describes how to connect Ethernet interface cable to the Ethernet interface. • If the main power switch is on, turn it off. • Use the following Ethernet cables. • Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type 5 or more A ferrite core for the Ethernet interface cable is supplied with this machine.
  • Page 287: Connecting To The Gigabit Ethernet Interface

    Connecting to the Interfaces Turn on the main power switch of the machine. BAX003S 1. Indicator (yellow) When 100BASE-TX is operating, the LED is lit yellow. When 10BASE-T is operating, it is turned off. 2. Indicator (green) When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off. •...
  • Page 288 2. Connecting the Machine Make a loop at both ends of the Ethernet interface cable 5 cm (2.1 inch) (1) from the end, and install the included core. BAX007S Make sure the main power switch of the machine is off. Connect the Ethernet interface cable to the Gigabit Ethernet port.
  • Page 289: Connecting To The Usb Interface

    Connecting to the Interfaces 2. Indicator (green) When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off. 3. Indicators (both yellow and green) When 1000BASE-T is operating, both LED are lit. • For details about how to turn on the main power switch, see "Turning On the Power", About This Machine.
  • Page 290: Connecting To The Ieee 1284 Interface

    2. Connecting the Machine Connecting to the IEEE 1284 Interface This section describes how to connect the IEEE 1284 interface cable to the IEEE 1284 interface board. • Properly shielded and grounded cables and connectors must be used for connections to a host computer (and/or peripheral) in order to meet emission limits.
  • Page 291: Setup Procedure

    Connecting to the Interfaces • Check the machine's IPv4 address and subnet mask, or the IPv6 address settings. • For details about how to set the IPv4 address and subnet mask from the control panel of the machine, see "Interface Settings". •...
  • Page 292 2. Connecting the Machine • You can specify either [WEP] or [WPA] to the Security Method. • Specify [WPA], when [Communication Mode] is set to [Infrastructure Mode]. • If you select the [WPA] option for Security Method, select one of the following: [WPA-PSK], [WPA], [WPA2-PSK], or [WPA2].
  • Page 293: Network Settings Required To Use The Printer/Lan-Fax

    Network Settings Required to Use the Printer/LAN-Fax Network Settings Required to Use the Printer/ LAN-Fax This section lists the network settings required for using the printer or LAN-Fax function. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 294: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network SMB Work Group As required Interface Settings/Network Ethernet Speed As required IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication...
  • Page 295 Network Settings Required to Use the Printer/LAN-Fax Menu User Tool Setting Requirements Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary...
  • Page 296: Network Settings Required To Use Internet Fax

    2. Connecting the Machine Network Settings Required to Use Internet Fax This section lists the network settings required for using Internet Fax. • These settings should be made by the system administrator, or with the advice of the system administrator. Ethernet This section lists the settings required for using Internet Fax with an Ethernet connection.
  • Page 297 Network Settings Required to Use Internet Fax Menu User Tool Setting Requirements Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer...
  • Page 298: Wireless Lan

    2. Connecting the Machine • p.41 "File Transfer" Wireless LAN This section lists the settings required for using Internet Fax with a wireless LAN connection. For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network...
  • Page 299 Network Settings Required to Use Internet Fax Menu User Tool Setting Requirements File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer POP before SMTP As required File Transfer Reception Protocol As required File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address...
  • Page 300: Network Settings Required To Use E-Mail Function

    2. Connecting the Machine Network Settings Required to Use E-mail Function This section lists the network settings required for sending e-mail. • These settings should be made by the system administrator, or with the advice of the system administrator. Ethernet This section lists the settings required for sending e-mail with an Ethernet connection.
  • Page 301: Wireless Lan

    Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required File Transfer SMTP Server Necessary File Transfer SMTP Authentication As required File Transfer...
  • Page 302 2. Connecting the Machine For details about how to specify the settings, see "Interface Settings" and "File Transfer". Menu User Tool Setting Requirements Interface Settings/Network Machine IPv4 Address Necessary Interface Settings/Network IPv4 Gateway Address Necessary Interface Settings/Network Machine IPv6 Address As required Interface Settings/Network IPv6 Gateway Address...
  • Page 303 Network Settings Required to Use E-mail Function Menu User Tool Setting Requirements File Transfer POP3 / IMAP4 Settings As required File Transfer Administrator's E-mail Address As required File Transfer E-mail Communication Port As required Program / Change / Delete E- File Transfer As required mail Message...
  • Page 304: Network Settings Required To Use Scan To Folder Function

    2. Connecting the Machine Network Settings Required to Use Scan to Folder Function This section lists the network settings required for sending files. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 305: Wireless Lan

    Network Settings Required to Use Scan to Folder Function Menu User Tool Setting Requirements Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required Default User Name / Password File Transfer As required (Send)
  • Page 306 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication...
  • Page 307: Network Settings Required To Use The Network Delivery Scanner

    Network Settings Required to Use the Network Delivery Scanner Network Settings Required to Use the Network Delivery Scanner This section lists the network settings required for delivering data to the network. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 308: Wireless Lan

    2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required File Transfer Delivery Option Necessary File Transfer Fax RX File Transmission As required File Transfer Scanner Resend Interval Time...
  • Page 309 Network Settings Required to Use the Network Delivery Scanner Menu User Tool Setting Requirements Interface Settings/Network DNS Configuration As required Interface Settings/Network DDNS Configuration As required Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol...
  • Page 310: Network Settings Required To Use Wsd Scanner

    2. Connecting the Machine Network Settings Required to Use WSD Scanner This section lists the network settings required for using WSD Scanner function. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 311: Wireless Lan

    Network Settings Required to Use WSD Scanner Menu User Tool Setting Requirements IEEE 802.1X Authentication for Interface Settings/Network As required Ethernet Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name...
  • Page 312 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network IPsec As required Interface Settings/Network Domain Name As required Interface Settings/Network WINS Configuration As required Interface Settings/Network Effective Protocol Necessary Interface Settings/Network NCP Delivery Protocol As required Interface Settings/Network NW Frame Type As required Interface Settings/Network...
  • Page 313: Network Settings Required To Use Network Twain Scanner

    Network Settings Required to Use Network TWAIN Scanner Network Settings Required to Use Network TWAIN Scanner This section lists the network settings required for using the TWAIN Scanner under the network environment. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 314: Wireless Lan

    2. Connecting the Machine • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [LAN Type] is displayed when the wireless LAN interface board is installed. • When both Ethernet and wireless LAN are connected, the selected interface takes precedence. •...
  • Page 315 Network Settings Required to Use Network TWAIN Scanner • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. • [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
  • Page 316: Network Settings Required To Use Document Server

    2. Connecting the Machine Network Settings Required to Use Document Server This section lists the settings required for using the Document Server function under the network environment. • These settings should be made by the system administrator, or with the advice of the system administrator.
  • Page 317: Wireless Lan

    Network Settings Required to Use Document Server Menu User Tool Setting Requirements Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required • For the Effective Protocol setting, check that the protocol you want to use is set to [Active]. •...
  • Page 318 2. Connecting the Machine Menu User Tool Setting Requirements Interface Settings/Network LAN Type Necessary Interface Settings/Network Permit SNMPv3 Communication As required Interface Settings/Network Permit SSL / TLS Communication As required Interface Settings/Network Host Name As required Interface Settings/Wireless LAN Communication Mode Necessary Interface Settings/Wireless LAN SSID Setting As required...
  • Page 319: Using Utilities To Make Network Settings

    Using Utilities to Make Network Settings Using Utilities to Make Network Settings This section describes how to make network settings using utilities. You can also specify network settings using utilities such as Web Image Monitor, SmartDeviceMonitor for Admin, and telnet. •...
  • Page 320 2. Connecting the Machine • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [Machine IPv6 Address] "Manual Configuration Address" • Web Image Monitor: Can be used for specifying the setting. •...
  • Page 321 Using Utilities to Make Network Settings • telnet: Can be used for specifying the setting. [Network] [Domain Name] [Specify] "Domain Name" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. •...
  • Page 322 2. Connecting the Machine • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "SMB" • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Can be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [Effective Protocol] "AppleTalk"...
  • Page 323 Using Utilities to Make Network Settings [Network] [NW Frame Type] [Ethernet 802.2] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [NW Frame Type] [Ethernet 802.3]...
  • Page 324 2. Connecting the Machine [Network] [LAN Type] [Wireless LAN] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. [Network] [Ping Command] •...
  • Page 325: File Transfer

    Using Utilities to Make Network Settings [Network] [Machine Name] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Can be used for specifying the setting. [Wireless LAN] [Communication Mode] [802.11 Ad-hoc Mode]...
  • Page 326 2. Connecting the Machine [File Transfer] [SMTP Authentication] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [File Transfer] [POP before SMTP] •...
  • Page 327 Using Utilities to Make Network Settings [File Transfer] [E-mail Reception Interval] • Web Image Monitor: Can be used for specifying the setting. • SmartDeviceMonitor for Admin: Cannot be used for specifying the setting. • telnet: Cannot be used for specifying the setting. [File Transfer] [Max.
  • Page 328: Connecting The Machine To A Telephone Line And Telephone

    2. Connecting the Machine Connecting the Machine to a Telephone Line and Telephone This section describes how to connect the machine to the telephone lines and select the line type. Connecting the Telephone Line (Type 1 and 2) To connect the machine to a telephone line, use a snap-in modular type connector. •...
  • Page 329: Selecting The Line Type

    Connecting the Machine to a Telephone Line and Telephone BHJ018S 1. G3 interface unit connector 2. External telephone connector 3. Extra G3 interface unit connector Selecting the Line Type Select the line type to which the machine is connected. There are two types: tone and pulse dial. Select the line type using Administrator Tools.
  • Page 330 2. Connecting the Machine Specifying the handset line type BHJ310S The switch on the handset should be in the appropriate position-TT (Tone Dialing) or DP (Pulse Dialing). Adjusting the handset bell volume Ringer BHJ311S Adjust the handset ringer volume using the volume switch. •...
  • Page 331: Using A Printer Server

    3. Using a Printer Server This chapter describes how to configure the machine as a network to printer. Preparing Printer Server This section explains how to configure the machine as a Windows network printer. The machine is configured to enabling network clients to use it. When the network printer is connected via SmartDeviceMonitor for Client, you can set the printing notification function to notify clients of the results of their print jobs.
  • Page 332: Using Netware

    3. Using a Printer Server Using NetWare This section describes the setting procedure for network printers in the NetWare environment. In the NetWare environment, you can connect the machine as a “print server” or “remote printer”. • IPv6 cannot be used on this function. Setting procedure •...
  • Page 333: Setting Up As A Print Server (Netware 3.X)

    Using NetWare • NDS or Bindery mode in Windows XP • For details about SmartDeviceMonitor for Admin, see “Using SmartDeviceMonitor for Admin”. • p.139 "Using SmartDeviceMonitor for Admin" Setting Up as a Print Server (NetWare 3.x) Follow the procedure below to connect the machine as a print server using NetWare 3.x. Start Web Image Monitor.
  • Page 334: Setting Up As A Print Server (Netware 4.X, 5/5.1, 6/6.5)

    3. Using a Printer Server Confirm the settings, and then click [Device Name]. Configuration is now complete. Wait several before restarting Web Image Monitor. Click [Logout]. • To check the configuration is correct, enter the following from the command prompt: F:>...
  • Page 335: Using Pure Ip In The Netware 5/5.1 Or 6/6.5 Environment

    Using NetWare Quit Web Image Monitor. • To check the configuration is correct, enter the following from the command prompt: F:> USERLIST • If the printer works as configured, the name of the print server appears as a connected user. •...
  • Page 336 3. Using a Printer Server Check the settings, and then click [Create]. Select the object in which the printer is located, and then click [Create] on the [Object] menu. In the [Class of new object] box, click [Printer], and then click [OK]. For NetWare 5, click [Printer (Non NDPS)].
  • Page 337: Setting Up As A Remote Printer (Netware 3.X)

    Using NetWare Click [Configuration] in the left area, and then click [NetWare Print Settings]. Confirm the settings, and then click [Device Name]. Configuration is now complete. Wait several minutes before restarting Web Image Monitor. Click [Logout]. Quit Web Image Monitor. •...
  • Page 338 3. Using a Printer Server From the [Print Server Information] menu, select [Print Server Configuration]. From the [Print Server Configuration] menu, select [Printer Configuration]. Select the printer indicated as [Not Installed]. Use the same printer number specified as the remote printer number using SmartDeviceMonitor for Admin.
  • Page 339: Setting Up As A Remote Printer (Netware 4.X, 5/5.1, 6/6.5)

    Using NetWare Confirm the settings, and then click [Device Name]. Configuration is now complete. Wait several minutes before restarting Web Image Monitor. Click [Logout]. Quit Web Image Monitor. • If you cannot identify the printer you want to configure, check the printer name against the configuration page printed from the printer.
  • Page 340 3. Using a Printer Server In the [Class of new object] box, click [Printer], and then click [OK]. For NetWare 5, click [Printer (Non NDPS)]. In the [Printer name] box, enter the printer name Select the [Define additional properties] check box, and then click [Create]. Assign print queues to the created printer.
  • Page 341 Using NetWare Click [Login]. A dialog box for entering the login user name and login password appears. Enter the user login name and password, and then click [Login]. For details about the login user name and password, consult your network administrator. Click [Configuration] in the left area, and then click [NetWare Print Settings].
  • Page 342 3. Using a Printer Server...
  • Page 343: Monitoring And Configuring The Printer

    4. Monitoring and Configuring the Printer This chapter describes how to monitoring and configuring the printer. Using Web Image Monitor Using Web Image Monitor, you can check the machine status and change settings. Available operations The following operations can be remotely performed using Web Image Monitor from a client computer.
  • Page 344: Displaying Top Page

    4. Monitoring and Configuring the Printer • Display and operation problems can occur if you do not enable JavaScript and cookies, or if you are using a non-recommended Web Browser. • If you are using a proxy server, change the Web browser settings. Contact your administrator for information about the settings.
  • Page 345: When User Authentication Is Set

    Using Web Image Monitor Every Web Image Monitor page is divided into the following areas: BHJ300S 1. Menu area If you select menu, it's content will be shown on the work area, or the sub area. 2. Tab area Details about each menu appears. 3.
  • Page 346: About Menu And Mode

    4. Monitoring and Configuring the Printer Enter a login user name and password, and then click [Login]. For details about the login user name and password, consult your network administrator. • For user code authentication, enter a user code in [Login User Name], and then click [Login]. •...
  • Page 347: Administrator Mode

    Using Web Image Monitor 4. Printer: Print Jobs Allows you to display list of Sample Print, Locked Print, Hold Print, and Stored Print jobs. 5. Job Display all print files. 6. Configuration Display current machine and network settings. Administrator Mode In the administrator mode, you can configure various machine settings.
  • Page 348: Access In The Administrator Mode

    4. Monitoring and Configuring the Printer Access in the Administrator Mode Follow the procedure below to access Web Image Monitor in the administrator mode. On Top Page, click [Login]. The window for entering the login user name and password appears. Enter your login user name and password, and then click [Login].
  • Page 349 Using Web Image Monitor Counter Menu Guest mode Administrator mode Copier Read Read Printer Read Read Read Read Send/TX Total Read Read Fax Transmission Read Read Scanner Send Read Read Coverage Read Read Other Function(s) Read Read Inquiry Menu Guest mode Administrator mode Machine Maintenance/Repair Read Read...
  • Page 350 4. Monitoring and Configuring the Printer Guest mode Administrator mode Read/Modify Read/Modify Job List Menu Guest mode Administrator mode Current/Waiting Jobs Read Read/Modify Job History Read Read Printer Menu Guest mode Administrator mode Job History Read Read Error Log Read Read Fax History Menu...
  • Page 351 Using Web Image Monitor Address Book Menu Guest mode Administrator mode Address Book None Read/Modify Configuration Device Settings Menu Guest mode Administrator mode System Read Read/Modify Paper Read Read/Modify Date/Time Read Read/Modify Timer Read Read/Modify Logs None Read/Modify E-mail Read Read/Modify Auto E-mail Notification None...
  • Page 352 4. Monitoring and Configuring the Printer Menu Guest mode Administrator mode Basic Settings Read Read/Modify Tray Parameters (PCL) None Read/Modify Tray Parameters (PS) None Read/Modify Virtual Printer Settings Read Read/Modify PDF Temporary Password Modify None PDF Group Password None Modify PDF Fixed Password None Modify...
  • Page 353 Using Web Image Monitor Interface Menu Guest mode Administrator mode Interface Settings Read Read/Modify Wireless LAN Settings Read Read/Modify Network Menu Guest mode Administrator mode IPv4 Read Read/Modify IPv6 Read Read/Modify NetWare Read Read/Modify AppleTalk Read Read/Modify Read Read/Modify SNMP None Read/Modify SNMPv3...
  • Page 354 4. Monitoring and Configuring the Printer Menu Guest mode Administrator mode IPsec None Read/Modify User Lockout Policy None Read/Modify IEEE 802.1X (WPA/WPA2) None Read/Modify S/MIME None Read/Modify RC Gate Menu Guest mode Administrator mode Setup RC Gate None Read/Modify Update RC Gate Firmware None Read RC Gate Proxy Server...
  • Page 355: Displaying Web Image Monitor Help

    Using Web Image Monitor • Some items are not displayed depending on the security settings. Displaying Web Image Monitor Help When using Help for the first time, clicking the icon marked “? ” ( ) makes the following screen appear, in which you can view Help in two different ways, as shown below: Viewing Help on our Web site Downloading Help to your computer...
  • Page 356 4. Monitoring and Configuring the Printer In the [Set Help URL Target] box, enter the URL of the help file. If you saved the help file to "C:\HELP\EN", enter “file://C:/HELP/”. For example, if you saved the file to a Web server, and the URL of the index file is “http:// a.b.c.d/HELP/EN/index.html”, enter “http://a.b.c.d/HELP/”.
  • Page 357: Using Smartdevicemonitor For Admin

    Using SmartDeviceMonitor for Admin Using SmartDeviceMonitor for Admin Using SmartDeviceMonitor for Admin, you can monitor the network printers. Also, you can change the configuration of the network interface board using TCP/IP or IPX/SPX. • IPv6 cannot be used on this function. Protocol stack provided with Operating System •...
  • Page 358: Installing Smartdevicemonitor For Admin

    4. Monitoring and Configuring the Printer • Allows you to check job histories of printed, faxed (LAN-Fax), scanned, and photocopied documents identified by user codes. • Allows selection of functions such as printing and scanning for each user code. • Fax numbers and e-mail addresses stored in the machine can be changed and saved by computer.
  • Page 359: Changing The Network Interface Board Configuration

    Using SmartDeviceMonitor for Admin Changing the Network Interface Board Configuration Follow the procedure below to change the network interface board configuration using SmartDeviceMonitor for Admin. Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3].
  • Page 360: Locking The Menus On The Machine's Control Panel

    4. Monitoring and Configuring the Printer Locking the Menus on the Machine's Control Panel Follow the procedure below to lock the menus on the machine's control panel. Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3].
  • Page 361: Changing The Paper Type

    Using SmartDeviceMonitor for Admin Changing the Paper Type Follow the procedure below to change the paper type. Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3]. A list of machines using the selected protocol appears. Select the protocol of the machine whose configuration you want to change.
  • Page 362 4. Monitoring and Configuring the Printer Starting User Management Tool Follow the procedure below to start User Management Tool. Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3]. A list of machines using the selected protocol appears. Select the protocol of the machine whose configuration you want to change.
  • Page 363 Using SmartDeviceMonitor for Admin Click the [User Counter Information] tab of User Management Tool. The number of pages printed under each user appears. Click [Exit] on the [File] menu to quit User Management Tool. Exporting the information about the number of pages printed Follow the procedure below to export the information of the number of pages printed under each user as a .csv file.
  • Page 364 4. Monitoring and Configuring the Printer Click the [User Counter Information] tab of User Management Tool. Select the user whose information you want to reset. On the [Edit] menu, click [Reset User Counters]. Select the check box of the items you want to reset, and then click [OK]. A confirmation message appears.
  • Page 365 Using SmartDeviceMonitor for Admin Click [Exit] on the [File] menu to quit User Management Tool. Restricting Functions Follow the procedure below to restrict use of individual functions. Start SmartDeviceMonitor for Admin User Management Tool. Click the [User Counter Information] tab of User Management Tool. Click the user whose functions you want to restrict.
  • Page 366 4. Monitoring and Configuring the Printer Click the [Access Control List] tab of User Management Tool. On the [Edit] menu, click [Add New User]. Enter the user code and user name. Select the check box of the functions applicable to the new user. If the check boxes are unavailable, there is no restriction to use that function.
  • Page 367: Configuring The Energy Saver Mode

    Using SmartDeviceMonitor for Admin Configuring the Energy Saver Mode Follow the procedure below to configure Energy Saver mode. Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3]. A list of machines using the selected protocol appears. Select the protocol of the machine whose configuration you want to change.
  • Page 368: Checking The Machine Status

    4. Monitoring and Configuring the Printer Select the protocol of the machine whose configuration you want to change. If you are using IPv4 SNMPv3, enter the user authentication. In the list, select a machine whose configuration you want to change. On the [Tools] menu, click [NIB Setup Tool].
  • Page 369: Changing Names And Comments

    Using SmartDeviceMonitor for Admin Click the [View] menu, and then click [Select List Columns]. From [Device] in the [Select List Columns] dialog box, select the items you want to display, and then click [Add]. Selected items will move to [Show]. Move all the items you want to display, and then click [OK].
  • Page 370: Load Fax Journal

    4. Monitoring and Configuring the Printer Quit Web Image Monitor. Quit SmartDeviceMonitor for Admin. • In the [Device Name] box, enter a device name on the machine using up to 31 characters. • In the [Comment] box, enter a comment on the machine using up to 31 characters. •...
  • Page 371: Viewing And Deleting Spool Print Jobs

    Using SmartDeviceMonitor for Admin • p.125 "Using Web Image Monitor" Viewing and Deleting Spool Print Jobs Start SmartDeviceMonitor for Admin. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3]. A list of machines using the selected protocol appears. Select the protocol of the machine whose configuration you want to change.
  • Page 372 4. Monitoring and Configuring the Printer On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4 SNMPv3]. A list of machines using the selected protocol appears. Select the protocol of the machine whose configuration you want to change. If you are using IPv4 SNMPv3, enter the user authentication.
  • Page 373: Using Smartdevicemonitor For Client

    Using SmartDeviceMonitor for Client Using SmartDeviceMonitor for Client To view the status of machines using SmartDeviceMonitor for Client, configure SmartDeviceMonitor for Client beforehand. Monitoring Printers Follow the procedure below to monitor the machine using SmartDeviceMonitor for Client. Right-click the SmartDeviceMonitor for Client icon, point to [Properties], and then click [Monitor Device Settings...].
  • Page 374: Checking The Machine Status

    4. Monitoring and Configuring the Printer • For details about status icons, see SmartDeviceMonitor for Client Help. Checking the Machine Status Follow the procedure below to check machine status using SmartDeviceMonitor for Client. Right-click the SmartDeviceMonitor for Client icon, and then click the machine. The machine status appears in the dialog box.
  • Page 375 Using SmartDeviceMonitor for Client • When setting SSL, a protocol for encrypted communication, under environment which server authentication is issued, enter “https://( machine's IP address or host name)/ ”. Internet Explorer must be installed on your computer. Use the highest version. Internet Explorer 6.0 or higher is recommended.
  • Page 376: Printer Status Notification By E-Mail

    4. Monitoring and Configuring the Printer Printer Status Notification by E-Mail Whenever a paper tray becomes empty or paper is jammed, an e-mail alert is issued to the registered addresses to notify the printer status. For this notification, you can make the e-mail notification settings. Notification timing and e-mail content can be set.
  • Page 377 Printer Status Notification by E-Mail • File Storage Memory Full Soon • Log Error • Device Access Violation • Replacement Required: Unit • Replacement Required Soon: Unit Log on to Web Image Monitor in administrator mode. In the menu area, click [Configuration]. Click [E-mail] on the [Device Settings] area.
  • Page 378: Setting The Account For E-Mail Notification

    4. Monitoring and Configuring the Printer Setting the Account for E-mail Notification Before enabling Auto E-mail notification or On-demand E-mail notification, specify a receiving e-mail address. Perform the following configuration procedure in Web Image Monitor. Log on to Web Image Monitor in administrator mode. Click [Configuration] in the menu area, and then click [E-mail] in the [Device Settings] area.
  • Page 379: Auto E-Mail Notification

    Printer Status Notification by E-Mail • SMTP Auth. User Name: Enter the SMTP account name. • SMTP Auth. Password: To set or change the password for SMTP AUTH. • SMTP Auth. Encryption: Select whether to encrypt the password or not. [Encryption]-[Auto Select]: If the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5.
  • Page 380: On-Demand E-Mail Notification

    4. Monitoring and Configuring the Printer • Items in the Groups to Notify column: E-mail notification addresses can be grouped as required. • Items in the Select Groups/Items to Notify column: Select groups for each notification type, such as machine status and error. To make detailed settings for these items, click [Edit] next to [Detailed Settings of Each Item].
  • Page 381: Format Of On-Demand E-Mail Messages

    Printer Status Notification by E-Mail • p.125 "Using Web Image Monitor" Format of On-demand E-mail Messages To use mail notification, you need to send an on-demand e-mail message to this machine. Using your mail software, enter the following: Item Description Subject (Referred to as Subject) Enter “requeststatus”.
  • Page 382: Remote Maintenance By Telnet

    4. Monitoring and Configuring the Printer Remote Maintenance by telnet • Remote Maintenance should be protected so that access is allowed to administrators only. • The password is the same as the one of Web Image Monitor administrator. When the password is changed using “mshell”, other's change also.
  • Page 383: Access

    Remote Maintenance by telnet access Use the “access” command to view and configure access control. You can also specify two or more access ranges. View settings msh> access IPv4 configration display msh> access ID range IPv6 configuration display msh> access ID range6 IPv6 access mask configuration display msh>...
  • Page 384: Appletalk

    4. Monitoring and Configuring the Printer • For IPv4 and IPv6, you can select an ID number between 1 and 5. • IPv6 can register and select the range and the mask for each access ranges. • IPv6 mask ranges between 1 - 128 can be selected. •...
  • Page 385: Autonet

    Remote Maintenance by telnet Parallel/USB settings msh> authfree [parallel | usb] [on|off] • To enable authfree, set to on. To disable authfree, set to off. Always specify the interface. Authentication exclusion control initialization msh> authfree flush autonet Use the “autonet” command to configure AutoNet parameters. View settings The following command displays the current AutoNet settings: msh>...
  • Page 386: Bonjour

    4. Monitoring and Configuring the Printer bonjour Use the “bonjour” command to display bonjour-related settings. View settings Bonjour settings are displayed. msh> bonjour Bonjour service name setting You can specify the bonjour service name. msh> bonjour cname “computer name” • The computer name can be entered using up to 63 alphanumeric characters. •...
  • Page 387: Btconfig

    Remote Maintenance by telnet • If you do not specify an interface, the Ethernet interface is selected automatically. • If many types of interface are installed, configure the interface that communicates with linklocal address. • If you do not specify an interface, the Ethernet interface is automatically selected. •...
  • Page 388: Dhcp

    4. Monitoring and Configuring the Printer • Enter a printer name using up to 31 alphanumeric characters. • Set single names for each printer. Printer name initialization msh> devicename clear name • Reset the printer name to its default. dhcp Use the “dhcp”...
  • Page 389: Dhcp6

    Remote Maintenance by telnet • To obtain the DNS server address from the DHCP server, specify “dhcp”. To use the address set by a user, specify “static”. Domain name selection msh> dhcp domainname {dhcp|static} • Specify whether to obtain the domain name from the DNS server or use the domain name set by a user.
  • Page 390: Dns

    4. Monitoring and Configuring the Printer View settings The following command displays the current direct printing port settings: msh> diprint Example output: port 9100 timeout=300(sec) bidirect on conn multi apl async • The “port” specifies the port number of the direct printing port. •...
  • Page 391 Remote Maintenance by telnet • You can select an ID number between 1 and 3. You can select up to three ID numbers. • You cannot use “255.255.255.255” as the DNS server address. IPv6 DNS server configuration The following command enables or disables the IPv4 DNS server address: msh>...
  • Page 392: Domainname

    4. Monitoring and Configuring the Printer Record updating interval settings msh> dns interval [1-255] • You can specify the interval after which records are updated when using the dynamic DNS function. • The updating interval is specified hourly. It can be entered between 1 and 255 hours. •...
  • Page 393: Etherauth

    Remote Maintenance by telnet etherauth Use "Ethernet" command to display or modify the authentication related parameters for Ethernet. View settings msh> etherauth 802.1x Configuration msh> etherauth 8021x {on|off} • {on} means "active" and {off} means "inactive". help Use the “help” command to display the available command list and the procedures for using those commands.
  • Page 394: Ifconfig

    4. Monitoring and Configuring the Printer Initializing the printer name for each interface msh>hostname “interface_name” clear name ifconfig Use the “ifconfig” command to view and configure TCP/IP (IP address, subnet mask, broadcast address, default gateway address) for the printer. View settings msh>...
  • Page 395: Info

    Remote Maintenance by telnet • When using the optional IEEE 802.11 interface unit, you can specify either Ethernet or IEEE 802.11 interface. • To get the above addresses, contact your network administrator. • Use the default configuration if you cannot obtain setting addresses. •...
  • Page 396: Ipsec

    4. Monitoring and Configuring the Printer IPP user name configuration Configure IPP users according to the following messages: msh> ipp user The following message appears: msh> Input user number (1 to 10): Enter the number, user name, and password. msh> IPP user name:user1 msh>...
  • Page 397: Lpr

    Remote Maintenance by telnet Closing telnet msh> logout A confirmation message appears. {yes|no|return} Enter [yes], [no], or [return] as required, and then press the [Enter] key. To save the changes and then close telnet, enter [yes]. To close telnet without saving any changes, enter [no]. To continue making changes, enter [return].
  • Page 398 4. Monitoring and Configuring the Printer Encap type msh> netware encap {802.3|802.2|snap|ethernet2|auto} Remote Printer Number msh> netware rnum [0-254] • The default is 0. Timeout msh> netware timeout [3-255] • The default is 15. Printer server mode msh> netware mode pserver msh>...
  • Page 399: Passwd

    Remote Maintenance by telnet Protocol Set Protocol passwd Use the “passwd” command to change the remote maintenance password. Changing the password msh> passwd • Enter the current password. • Enter the new password. • Renter the new password to confirm it. Changing the password of the administrators using the Supervisor msh>...
  • Page 400: Prnlog

    4. Monitoring and Configuring the Printer prnlog Use the “prnlog” command to obtain printer log information. Print logs display msh> prnlog • Display previous print jobs. msh> prnlog “ID Number” • Specify the ID number of the displayed print log information to display additional details about a print job.
  • Page 401: Rhpp

    Remote Maintenance by telnet Adding a specified IPv6 destination to Routing Table msh> route add6 “destination” “prefixlen[1-128]” “gateway” • Specify the IPv6 address to destination and gateway. • If the prefix of the address is between 1 and 127, the network is selected. If the prefix of the address is 128, the host is selected.
  • Page 402: Set

    4. Monitoring and Configuring the Printer Setting timeout msh> rhpp timeout [30-65535] • The default is 300 seconds. • “RHPP” is an abbreviation of “Reliable Host Printing Protocol”, which is a manufacturer-original printing protocol. Use the “set” command to set the protocol information display “active” or “inactive”. View settings The following command displays protocol information (active/inactive).
  • Page 403 Remote Maintenance by telnet msh> set rfu6 msh> set ipp msh> set ipp6 msh> set http msh> set http6 msh> set bonjour msh> set bonjour6 msh> set nbt msh> set ssdp msh> set ssh msh> set sftp msh> set sftp6 msh>...
  • Page 404 4. Monitoring and Configuring the Printer msh> set smb {up|down} msh> set lpr {up|down} msh> set lpr6 {up|down} msh> set ftp {up|down} msh> set ftp6 {up|down} msh> set rsh {up|down} msh> set rsh6 {up|down} msh> set diprint {up|down} msh> set diprint6 {up|down} msh>...
  • Page 405: Show

    Remote Maintenance by telnet msh> set wsscn {up|down} msh> set rhpp {up|down} msh> set rhpp6 {up|down} show Use the “show” command to display network interface board configuration settings. View settings msh> show • If “-p” is added, you can view settings one by one. Use “slp”...
  • Page 406: Snmp

    4. Monitoring and Configuring the Printer Notify print job completion msh> smb notif {on|off} • To notify print job completion, specify “on”. Otherwise, specify “off”. Deleting computer name msh> smb clear comp Deleting group name msh> smb clear group Deleting comment msh>...
  • Page 407 Remote Maintenance by telnet Display msh> snmp ? Community name configuration msh> snmp “number” name “community_name” • You can configure ten SNMP access settings numbered 1-10. • The printer cannot be accessed from SmartDeviceMonitor for Admin or SmartDeviceMonitor for Client if “public” is not registered in numbers 1-10. When changing the community name, use SmartDeviceMonitor for Admin and SNMP Setup Tool to correspond with printer settings.
  • Page 408 4. Monitoring and Configuring the Printer • The network interface board accepts requests only from hosts that have IPv4, IPv6, and IPX addresses with access types of “read-only” or “read-write”. Enter “0” to have network interface board accept requests from any host without requiring a specific type of access. •...
  • Page 409: Sntp

    Remote Maintenance by telnet Configuring a sending protocol for SNMP v3 TRAP msh> snmp v3trap [1-5] active {ipv4|ipv6|ipx} {on|off} Configuring a user account for SNMP v3 TRAP msh> snmp v3trap [1-5] account “account_name” • Enter an account name using up to 32 alphanumeric characters. Deleting an SNMP v3 TRAP user account msh>...
  • Page 410: Spoolsw

    4. Monitoring and Configuring the Printer • You can specify the interval at which the printer synchronizes with the operator-specified NTP server. The default is 60 minutes. • The interval can be entered from 0, or between 15 and 10,080 minutes. •...
  • Page 411: Ssdp

    Remote Maintenance by telnet msh> spoolsw wsprn {on|off} ssdp Use the “ssdp” command to view and configure SSDP settings. View settings msh> ssdp Setting effective time msh> ssdp profile [1801-86400] The default is 10800 seconds. Advertise packet TTL settings msh> ssdp ttl [1-255] The default is 4.
  • Page 412: Status

    4. Monitoring and Configuring the Printer Usable characters are ASCII 0x20-0x7e (32 bytes) other than “0”. The default key length is 1024, and the character string is blank. If you do not specify this parameter, an open key with the default value will be created. Deleting open key for ssh/sftp communication msh>...
  • Page 413: Wiconfig

    Remote Maintenance by telnet View Settings msh> web URL Configuration You can set URLs linked by clicking [URL] on Web Image Monitor. msh> web “ID” url http:// “The URL or IP address you want to register”/ Specify “1” or “2” for ID as the number corresponding to the URL. Up to two URLs can be registered and specified.
  • Page 414 4. Monitoring and Configuring the Printer Parameter Value configured mode {ap|802.11adhoc} You can set the infrastructure mode (ap) or the 802.11 Ad hoc mode (802.11 adhoc). The default is the infrastructure mode. ssid “ID value” You can specify an SSID in infrastructure mode. The characters you can enter in the SSID string are ASCII 0x20-0x7e (32 bytes).
  • Page 415 Remote Maintenance by telnet Parameter Value configured Up to four WEP keys can be registered. Specify the number to be registered with “val”. When a WEP is specified by key phrase, the WEP specified by key is overwritten. To use this function, set the same key number and WEP key for all ports that transmit data to each other.
  • Page 416 4. Monitoring and Configuring the Printer Parameter Value configured Usable characters: ASCII 0x20-0x7e (8 to 63 bytes). The default is blank. eap {tls|ttls|leap|peap} {chap|mschap| You can specify the EAP authentication type. mschapv2|pap|md5|tls} tls: EAP-TLS (default) ttls: EAP-TTLS leap: LEAP peap: PEAP chap, mschap, mschapv2, pap, md5, or tls are settings for the phase 2 method, and must be set when using EAP-TTLS or PEAP.
  • Page 417: Wins

    Remote Maintenance by telnet Parameter Value configured Usable characters: ASCII 0x20-0x7e (128 bytes). The default is blank. srvcert {on|off} You can set the server certificate. The default is “off”. imca {on|off} You can enable or disable the certificate when the intermediate certificate authority is present. The default is “off”.
  • Page 418: Wsmfp

    4. Monitoring and Configuring the Printer • wlan can be specified only when the IEEE 802.11 interface is installed. Interface name Interface configured Ether Ethernet interface Wlan IEEE 802.11 interface Address configuration Use the following command to configure a WINS server IP address: wins “interface_name”...
  • Page 419: 8021X

    Remote Maintenance by telnet • If you do not specify a comment, current setting is displayed. Presentation URL configuration msh> wsmfp url “URL” • Ebter the URL string in the “URL”. WSD (Device) TCP port configuration msh> wsmfp devport “port_number” •...
  • Page 420 4. Monitoring and Configuring the Printer Parameter Value configured ttls: EAP-TTLS leap: LEAP peap: PEAP chap, mschap, mschapv2, pap, md5, or tls are settings for the phase 2 method, and must be set when using EAP-TTLS or PEAP. Do not make these settings when using other EAP authentication types.
  • Page 421 Remote Maintenance by telnet Parameter Value configured imca {on|off} You can enable or disable the certificate when the intermediate certificate authority is present. The default is "off". srvid "character string" You can set the server ID and subdomain of the certificate server.
  • Page 422 4. Monitoring and Configuring the Printer SNMP Using the SNMP manager, you can get information about the machine. The SNMP agent operating on UDP and IPX is incorporated into the built-in Ethernet board and optional IEEE 802.11 interface unit of this machine. This machine also supports SNMPv3, which increases user authentication, data encryption, and access control security.
  • Page 423: Snmp

    SNMP • PrinterMIB • HostResourceMIB • IPv6-TCP-MIB • IPv6-UDP-MIB • IPv6-MIB • IPv6-ICMP-MIB • RicohPrivateMIB • SNMP-FRAMEWORK-MIB • SNMP-TARGET-MIB • SNMP-NOTIFICATION-MIB • SNMP-USER-BASED-SM-MIB • SNMP-VIEW-BASED-ACM-MIB • PRINTER-PORT-MONITOR-MIB...
  • Page 424: Getting Printer Information Over The Network

    4. Monitoring and Configuring the Printer Getting Printer Information over the Network This section explains details of each item displayed in the printer status and information. Current Printer Status This section explains how you can check the machine's status and the items displayed. Depending on the options installed on the machine, some items might not be displayed.
  • Page 425 Getting Printer Information over the Network Messages Description Cover Open: Bridge Unit Left The cover of the bridge unit left is open. Cover Open: Bridge Unit Right The cover of the bridge unit right is open. Cover Open: Duplex Unit The cover of the duplex unit is open.
  • Page 426 4. Monitoring and Configuring the Printer Messages Description Error: Ethernet Board An Ethernet board error has occurred. Error: HDD Board A hard disk drive board error has occurred. Error: Media Link Board An error has occurred on the File Format Converter. Error: Memory Switch A memory switch error has occurred.
  • Page 427 Getting Printer Information over the Network Messages Description Full: Log Data Capacity The log data capacity is full. Full: Waste Toner The waste toner is full. Hex Dump Mode It is a hex dump mode. Immed. Trans. not connected It did not connect directly with the other party of the transmission.
  • Page 428 4. Monitoring and Configuring the Printer Messages Description Low: Toner The toner cartridge is not set correctly, or toner is almost running out. Low: Yellow Toner The yellow toner cartridge is not set correctly, or toner is almost running out. Malfunction: Booklet Processor There is a problem with booklet finisher.
  • Page 429 Getting Printer Information over the Network Messages Description Mismatch: Paper Size Indicated paper tray does not contain paper of selected size. Mismatch: Paper Size and Type Indicated paper tray does not contain paper of selected size and type. Mismatch: Paper Type Indicated paper tray does not contain paper of selected type.
  • Page 430 4. Monitoring and Configuring the Printer Messages Description Not Detected: Cyan Toner Cyan toner is not correctly set. Not Detected: Develop. Unit (C) The development unit (cyan) is not correctly set. Not Detected: Develop. Unit (K) The development unit (black) is not correctly set. Not Detected: Develop.
  • Page 431 Getting Printer Information over the Network Messages Description Not Detected: Yellow Toner Yellow toner is not correctly set. Not Reached, Data Deleted Unreached job is deleted. Not Reached, Data Stored Unreached documents are saved. Offline Machine is offline. Online Machine is online. Operating Thermo-range Error The machine is operating outside the permissible temperature range.
  • Page 432 4. Monitoring and Configuring the Printer Messages Description Proxy User/Password Incorrect The proxy user name and password setting is incorrect. Readjusting... The machine is readjusting itself. Ready The machine is ready to print. Renewing Remote Certificate The remote certificate is being renewed. Replace Black PCU It is time to replace the black photoconductor unit.
  • Page 433: Printer Configuration

    Getting Printer Information over the Network Messages Description Setting Remotely The RDS setting is being processed. Skipped due to Error Skipped the error. Storage Complete The storage is complete. Storage Failed The storage has failed. Supplies Order Call failed The supply order call has failed. Suspend / Resume Key Error Finisher stop button was pressed.
  • Page 434 4. Monitoring and Configuring the Printer Input Tray Item Description ID number of the paper tray Name Name of the paper tray PaperSize Size of paper loaded in the paper tray Status Current status of the paper tray • Normal: Normal •...
  • Page 435: Understanding The Displayed Information

    Understanding the Displayed Information Understanding the Displayed Information This section explains how to read status information returned by the network interface board. Print Job Information Use the following command to display print job information: • UNIX: Use the “info” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters. •...
  • Page 436: Configuring The Network Interface Board

    4. Monitoring and Configuring the Printer Item Description Print request ID. User Print request user name. Page Number of pages printed Result Print Request Result Communication Result • OK Print was completed normally. However, the print result may not be as required due to printer problems.
  • Page 437 Understanding the Displayed Information Item Description Common Mode Protocol Up/Down Protocol Settings AppleTalk IPv4 IPv6 IPsec NetWare PictBridge Device Up/Down Device Settings Parallel Bluetooth Ethernet interface Syslog priority NVRAM version Device name Comment Location Contact Soft switch AppleTalk AppleTalk settings Mode...
  • Page 438 4. Monitoring and Configuring the Printer Item Description Object Type Zone TCP/IP TCP/IP settings Mode (IPv4) Mode (IPv6) telnet diprint http ftpc snmp autonet Bonjour ssdp sftp...
  • Page 439 Understanding the Displayed Information Item Description WSD (Device) WSD (Printer) WSD (Scanner) rhpp IPv4 DHCP Address Netmask Broadcast Gateway IPv6 Stateless Manual Gateway DHCPv6-lite DUID DHCPv6 option lifetime IPsec Manual Mode Excluded Protocol https dhcp wins EncapType...
  • Page 440 4. Monitoring and Configuring the Printer Item Description Host name DNS Domain Access Control Access Control settings IPv4 AccessEntry [X] X can be set between 1 and 5. IPv6 AccessEntry [X] X can be set between 1 and 5. SNTP Server Time settings Time Zone SNTP Server polling time...
  • Page 441 Understanding the Displayed Information Item Description Mode NDS/Bindery Packet negotiation Login Mode Print job timeout Protocol SAP interval time NDS Tree Name Transfer Protocol SMB settings Switch Mode Direct print Notification Workgroup name Computer name Comment Share name [1] Protocol Wireless LAN Wireless LAN settings Host Name...
  • Page 442 4. Monitoring and Configuring the Printer Item Description WEP Authentication WEP Encryption key number WEP Encryption keys [X] X can be set between 1 and 4. WPA Encryption WPA Authentication Pre-Shared Key User name Domain name EAP Type Password Phase 2 user name Phase 2 Method TTLS Phase 2 Method PEAP Server cert.
  • Page 443 Understanding the Displayed Information Item Description Resolver Protocol Domain Name ether wlan DDNS ether wlan Ethernet 802.1X Authentication WINS WINS settings ether Primary WINS Secondary WINS wlan Primary WINS Secondary WINS Bluetooth Bluetooth settings Bluetooth mode Bluetooth connection mode SSDP SSDP settings UUID Profile...
  • Page 444 4. Monitoring and Configuring the Printer Item Description Computer Name (cname) Local Hostname (ether) Local Hostname (wlan) Location Priority (diprint) Priority (lpr) Priority (ipp) IP TTL Link Local Route for Multi I/F IPP Port SNMP SNMP settings SNMPv1v2 SNMPv3 protocol v1Trap v2Trap v3Trap...
  • Page 445 Understanding the Displayed Information Item Description IPv4 AuthFree Entry [X] X can be set between 1 and 5. IPv6 AuthFree Entry [X] X can be set between 1 and 5 Parallel lprm check host lpr prnerr chk Certificate Verification WS-MFP Network Device Name Comments Location...
  • Page 446 4. Monitoring and Configuring the Printer Item Description EAP Type Password Phase 2 user name Phase 2 Method TTLS Phase 2 Method PEAP Server cert Intermediate CA Server ID Sub domain Shell mode Remote maintenance tool mode...
  • Page 447: Message List

    Message List Message List This is a list of messages that appear in the machine's system log. The system log can be viewed using the “syslog” command. System Log Information Use the following command to display the system log information: •...
  • Page 448 4. Monitoring and Configuring the Printer Message Problem and solutions add_sess_IPv6: community <community name> The same community name already exists. Use already defined. another community name. add_sess_IPX: bad trap <IPX address> The IPX address (00:00:00:00:00:00) is community <community name> unavailable when the community access type is TRAP.
  • Page 449 Message List Message Problem and solutions client EAP method rejected The authentication mode of the access point is different with the authentication mode of the supplicant. Use the same authentication mode between the access point and the supplicant. Client password rejected The client's password was rejected.
  • Page 450 4. Monitoring and Configuring the Printer Message Problem and solutions Established SPX Connection with PServer, Connection to the print server was established (RPSocket=<socket number>, when the remote printer went online. connID=<connection ID>) exiting The lpd service has ended and the system is exiting the process.
  • Page 451 Message List Message Problem and solutions group <DH group number 2>, Make sure this machine's ISAKMP SA Oakley group matches that of the communicating host. (IKE phase-1) mismatched hash type: local=<Hash This machine's ISAKMP SA <Hash Algorithm 1> in Algorithm 1> remote=<Hash Algorithm 2> IKE phase 1 does not match the communicating host's ISAKMP SA <Hash Algorithm 2>, Make sure this machine's ISAKMP SA Hash Algorithm matches...
  • Page 452 4. Monitoring and Configuring the Printer Message Problem and solutions MIC failure TKIP counter measures stopped Counter measures have stopped after 60 seconds (since the supplicant using TKIP started counter measures against tampering). Name registration failed. name=<NetBIOS name> Name registration of <NetBIOS Name> failed. Change to a different NetBIOS name.
  • Page 453 Message List Message Problem and solutions pserver start. (NetWare) The NetWare service starts when the print server goes online. Required file server (<file server name>) not found The required file server <file server name> could not be found. sap enable. saptype=<SAP type>, sapname=<SAP The SAP function was been started.
  • Page 454 4. Monitoring and Configuring the Printer Message Problem and solutions SMTPC: failed to connect smtp server. timeout. Connection to the SMTP server failed due to timeout. This could be because the specified SMTP server name is incorrect, or no connection to the network has been established, or the network configuration is incorrect, so there is no response from the SMTP server.
  • Page 455 Message List Message Problem and solutions Snmp over IPv4 is ready Communication over IPv4 with snmp is available. Snmp over IPv6 is ready. Communication over IPv6 with snmp is available. Snmp over IPX is ready. Communication over IPX with snmp is available. success key received The supplicant received the EAP-Success key.
  • Page 456 4. Monitoring and Configuring the Printer Message Problem and solutions WINS name registration: No response to server There was no response from the WINS server. (WINS server address) Check that the correct WINS server address is entered. Also, check that the WINS server is functioning properly.
  • Page 457: Registering Addresses And Users For Facsimile/Scanner Functions

    5. Registering Addresses and Users for Facsimile/Scanner Functions This chapter describes how to register destinations and users in the Address Book. For details on how to access System Settings, see "Accessing System Settings ". Address Book This section describes Address Book settings. Registering information such as the names of users and their e-mail addresses in the Address Book allows you to manage them easily.
  • Page 458 5. Registering Addresses and Users for Facsimile/Scanner Functions Protection You can set protection codes to stop sender's name from being used or folders from being accessed without authorization. Fax Dest. You can register fax numbers, line, fax header and select label insertion. When using IP-Fax, you can register the IP-Fax destination and select the protocol.
  • Page 459 Address Book Folder You can register the protocol, path name and server name. • SMB • FTP • NCP Add to Group You can put registered e-mail and folder destinations into a group for easier management.
  • Page 460: Managing Names In The Address Book

    5. Registering Addresses and Users for Facsimile/Scanner Functions • You can also use Web Image Monitor to register names in the Address Book. With SmartDeviceMonitor for Admin, you can register multiple names at the same time. For details about using Web Image Monitor, see Web Image Monitor Help. •...
  • Page 461: Sending E-Mail By Quick Dial

    Address Book Sending e-mail by Quick Dial By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting them from the fax initial display when sending a document by Internet fax or e-mail. You can also specify an e-mail address by selecting the destination shown on the initial scanner display when sending a document using the scanner function.
  • Page 462 5. Registering Addresses and Users for Facsimile/Scanner Functions • Facsimile • Printer • Scanner • p.249 "Authentication Information"...
  • Page 463: Registering Names

    Registering Names Registering Names Register user information including their names. The user name is useful for selecting a destination when sending faxes or e-mail. You can also use it as a folder destination. You can register up to 2000 names. Registering Names This section describes how to register names.
  • Page 464: Changing A Registered Name

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press the key for the classification you want to use under "Select Title". The keys you can select are as follows: • [Frequent]: Added to the page that is displayed first. • [AB], [CD], [EF], [GH], [IJK], [LMN], [OPQ], [RST], [UVW], [XYZ], [1] to [10]: Added to the list of items in the selected title.
  • Page 465: Deleting A Registered Name

    Registering Names Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the registered name you want to change. Press the name key, or enter the registered number using the number keys. To change the name or key display, press [Change] on the right of the "Name" or "Key Display".
  • Page 466 5. Registering Addresses and Users for Facsimile/Scanner Functions Select the name you want to delete. Press the name key, or enter the registered number using the number keys. Press [Yes]. Press [Exit]. Press the [User Tools/Counter] key.
  • Page 467: Authentication Information

    Authentication Information Authentication Information Following describes the procedure for authenticating a user code. • The functions associated with each user code are the same. If you change or delete user codes, management data and limits associated with that code become invalid. Register user codes to limit users to the following functions and check their use of each function: •...
  • Page 468 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Press the name whose code is to be registered, or enter the registered number using the number key.
  • Page 469: Changing A User Code

    Authentication Information Select the functions to be used with the user code from "Available Functions". Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • You can enter a one-to eight-digit user code. • To register the name, see "Registering Names". •...
  • Page 470: Deleting A User Code

    5. Registering Addresses and Users for Facsimile/Scanner Functions Check that [Program / Change] is selected. Select the user whose user code you want to change. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 471 Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Press [Program / Change]. Select the name whose code is to be deleted. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 472: Displaying The Counter For Each User

    5. Registering Addresses and Users for Facsimile/Scanner Functions Displaying the Counter for Each User This section describes how to display the counter for each user. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the function usage you want to print from [Copier Counter], [Printer Counter], [Fax Counter] or [Scanner Counter].
  • Page 473: Printing The Counter For All Users

    Authentication Information Select a user code from the left side of the display. Press [Select All on the Page] to select all user codes on the page. Press [Print Counter List] under "Per User". Enter the user code, and then press the [ ] key if the user code is registered. Select the function usage you want to print from [Copier Counter], [Printer Counter], [Fax Prints], [Fax Transmission], [Scanner Counter], and [All Counters].
  • Page 474: Clearing The Number Of Prints

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Press [Print Counter List] under "All Users". Enter the user code, and then press the [ ] key if the user code is registered. Select the function usage you want to print from [Copier Counter], [Printer Counter], [Fax Prints], [Fax Transmission], [Scanner Counter], and [All Counters].
  • Page 475 Authentication Information Press [System Settings]. Press [Administrator Tools]. Press [Display / Clear / Print Counter per User]. Select the user code to clear. To clear the number of prints made under a user code, select the user code from the left side of the display.
  • Page 476: Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Fax Destination This section describes the procedure for registering, changing, and deleting Fax Destinations. Register a fax destination so you do not need to enter fax numbers each time, and can send documents that have been scanned in using the facsimile function.
  • Page 477: Registering A Fax Destination

    Fax Destination Label insertion Use label insertion to print information such as the destination name on the sheet printed out at the destination. Data is printed as follows: • Destination Name The destination name specified in [Fax Destination] is printed with "To" before it at the top of the sheet.
  • Page 478 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose fax destination you want to register. Press the name key, or enter the registered number using the number keys. Press [Fax Dest.].
  • Page 479: Changing A Fax Destination

    Fax Destination • p.245 "Registering Names" • p.293 "Registering Names to a Group" Changing a Fax Destination This section describes how to change a registered fax destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected.
  • Page 480 5. Registering Addresses and Users for Facsimile/Scanner Functions To change the fax number This section describes how to change the fax number. Press [Change] under "Fax Destination". Enter the new fax number using the number keys, and then press [OK]. To change the line This section describes how to change the line.
  • Page 481 Fax Destination To change the password, press [Change] under "Password (PWD)". Enter the new password, and then press [OK]. Press [OK]. To set the International TX Mode This section describes how to set the International TX Mode. Press [Change] under "International TX Mode". Select [Off] or [On], and then press [OK].
  • Page 482: Deleting A Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Deleting a Fax Destination This section describes how to delete a registered fax destination. • If you delete a destination that is a specified delivery destination, messages to its registered Personal Box, for example, cannot be delivered. Be sure to check the settings in the fax function before deleting any destinations.
  • Page 483: Registering An Ip-Fax Destination

    Fax Destination Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To delete the name, key display, and title, see "Registering Names". • p.245 "Registering Names" Registering an IP-Fax Destination This section describes how to register an IP-Fax Destination. Press the [User Tools/Counter] key.
  • Page 484: Changing A Registered Ip-Fax Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Select Line], and then select [H.323] or [SIP]. Press [Change] under "Fax Destination". Enter the IP-Fax destination. Press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To register the name, see "Registering Names". •...
  • Page 485 Fax Destination Check that [Program / Change] is selected. Select the name whose IP-Fax destination you want to change. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination. Press [Fax Dest.]. Press [Change] under "Fax Destination". Enter the new destination, and then press [OK].
  • Page 486 5. Registering Addresses and Users for Facsimile/Scanner Functions To program the SUB Code This section describes how to program the SUB Code. Press [Adv. Features], and then press [SUB Code]. Press [Change] under "TX SUB Code". Enter the SUB Code, and then press [OK]. To enter a password, press [Change] under "Password (SID)".
  • Page 487: Deleting A Registered Ip-Fax Destination

    Fax Destination When Label Insertion is set to ON, the receiver's name and standard messages are printed on the fax message when it is received at the other end. Press [Change] under "Label Insertion". Press [On]. Press [Change] under "Line 2". Select the new standard message or press [Manual Entry] to enter the new message.
  • Page 488 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Program / Change]. Select the name whose IP-Fax destination you want to delete. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 489: E-Mail Destination

    E-mail Destination E-mail Destination This section describes the procedure for registering, changing, and deleting E-mail Destination. Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan files from scanner or fax function by e-mail. •...
  • Page 490 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Change]. Enter the e-mail address. Press [OK]. Select [E-mail / Internet Fax Destination] or [Internet Fax Destination Only]. If [E-mail / Internet Fax Destination] is specified, registered e-mail addresses appear in both the internet fax address display and E-mail address display on the fax function screen, and in the address display on the scanner function screen.
  • Page 491: Changing An E-Mail Destination

    E-mail Destination Changing an E-mail Destination This section describes how to change an e-mail destination. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose e-mail address you want to change. Press the name key, or enter the registered number using the number keys.
  • Page 492: Deleting An E-Mail Destination

    5. Registering Addresses and Users for Facsimile/Scanner Functions • To change the name, key display and title, see "Registering Names". • p.245 "Registering Names" Deleting an E-mail Destination This section describes how to delete an e-mail destination. Press the [User Tools/Counter] key. Press [System Settings].
  • Page 493 E-mail Destination • p.245 "Registering Names"...
  • Page 494: Registering Folders

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering Folders This section describes the procedure for registering, changing, and deleting folders. By registering a shared folder, you can send scan files or received fax documents to it directly. There are three types of protocol you can use: •...
  • Page 495 Registering Folders Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to register. Press the name key, or enter the registered number using the number keys. Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth.
  • Page 496 5. Registering Addresses and Users for Facsimile/Scanner Functions For details about how to specify the path using Browse Network, see "Locating the SMB folder using Browse Network". Press [Connection Test] to check the path is set correctly. Press [Exit]. If the connection test fails, check the settings, and then try again. Press [OK].
  • Page 497: Changing An Smb Folder

    Registering Folders Press [Browse Network]. The client computers sharing the same network as the machine appear. Network display only lists client computers you are authorized to access. Select a client computer. Shared folders under it appear. You can press [Up One Level] to switch between levels. Select the folder you want to register.
  • Page 498 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to change. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 499: Deleting An Smb Registered Folder

    Registering Folders Press [FTP] or [NCP]. A confirmation message appears. Press [Yes]. Changing the protocol will clear all settings made under the previous protocol. Enter each item again. Deleting an SMB registered folder This section describes how to delete the registered SMB folder. Press the [User Tools/Counter] key.
  • Page 500: Registering An Ftp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Folder]. Press the protocol which is not currently selected. A confirmation message appears. Press [Yes]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To delete the name, key display and title, see "Registering Names". •...
  • Page 501 Registering Folders Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth. Info] on the right side of Folder Authentication. When [Do not Specify] is selected, the FTP User Name and FTP Password that you have specified in Default User Name/Password (Send) of File Transfer settings applies.
  • Page 502: Changing An Ftp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions You can enter a path using up to 256 characters. To change the port number, press [Change] under "Port Number". Enter the port number using the number keys, and then press the [ ] key. You can enter 1 to 65535.
  • Page 503 Registering Folders Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name whose folder you want to change. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 504: Deleting An Ftp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Enter each item again. Changing the registered FTP folder This section describes how to change the registered FTP folder. Press [Change] under "Port Number". Enter the new port number, and then press the [ ] key. Press [Change] under "Server Name".
  • Page 505: Registering An Ncp Folder

    Registering Folders Press the protocol which is not currently selected. A confirmation message appears. Press [Yes]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To delete a name entirely, see "Registering Names". • p.245 "Registering Names" Registering an NCP folder This section describes how to register an NCP folder.
  • Page 506 5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Auth. Info], and then press [ Next]. Press [Specify Other Auth. Info] on the right side of Folder Authentication. When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified in Default User Name/Password (Send) of File Transfer settings applies.
  • Page 507 Registering Folders For details about how to specify the path using Browse Network, see "Locating the NCP folder using Browse Network". Press [Connection Test] to check the path is set correctly. Press [Exit]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. •...
  • Page 508: Changing An Ncp Registered Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Locating the NCP folder using Browse Network This section describes how to locate the NCP folder using Browse Network. Press [Browse Network]. If you have set "Connection Type" to [NDS], a list of items in the NDS tree appears. If you have set "Connection Type"...
  • Page 509 Registering Folders You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination. Press [Folder]. Select "Connection Type". If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a NetWare server, press [Bindery].
  • Page 510: Deleting An Ncp Folder

    5. Registering Addresses and Users for Facsimile/Scanner Functions Deleting an NCP folder This section describes how to delete the registered NCP folder. Press the [User Tools/Counter] key Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select a user of the folder you want to delete.
  • Page 511: Registering Names To A Group

    Registering Names to a Group Registering Names to a Group This section describes how to register names to a group. You can register names to a group to enable easy management of e-mail addresses and folders for each group. To add names to a group, the groups must be registered beforehand. •...
  • Page 512: Registering Names To A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Change] under "Group Name". Enter the group name, and then press [OK]. The Key Display name is set automatically. Press the title key under "Select Title", if necessary. The keys you can select are as follows: •...
  • Page 513 Registering Names to a Group Press [System Settings]. Press [Administrator Tools]. Press [Address Book Management]. Check that [Program / Change] is selected. Select the name to register in a group. Press the name key, or enter the registered number using the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 514: Adding A Group To Another Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Adding a Group to Another Group This section describes how to add a group to another group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools].
  • Page 515: Displaying Names Registered In A Group

    Registering Names to a Group The group key that you have selected becomes highlighted, and the group is added to it. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Displaying Names Registered in a Group This section describes how to display names registered in a group. You can check the names or groups registered in each group.
  • Page 516: Removing A Name From A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Programmed User/Group]. All the names registered will be displayed. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Removing a Name from a Group This section describes how to remove a name from a group. Press the [User Tools/Counter] key.
  • Page 517: Deleting A Group Within Another Group

    Registering Names to a Group Select the group from which you want to remove the name. The group key is deselected and the name is removed from it. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. Deleting a Group Within Another Group This section describes how to delete a group within another group.
  • Page 518: Changing A Group Name

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Select the group that you want to delete from. Press the group key, or enter the registered number during the number keys. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 519 Registering Names to a Group Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to change. You can search by the registered name, fax number, folder name, e-mail address, or IP-Fax destination.
  • Page 520: Deleting A Group

    5. Registering Addresses and Users for Facsimile/Scanner Functions Deleting a Group This section describes how to delete a group. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Press [Delete]. Press a group key you want to delete.
  • Page 521: Registering A Protection Code

    Registering a Protection Code Registering a Protection Code This section describes how to register a Protection Code. You can stop sender's names or folders being accessed by setting a protection code. You can use this function to protect the following: •...
  • Page 522: Registering A Protection Code To A Group User

    5. Registering Addresses and Users for Facsimile/Scanner Functions Press [Protection]. Press [Destination] or [Sender] under "Use Name as". Both [Destination] and [Sender] can be selected at the same time. Press [Change] under "Protection Code". Enter a protection code using the number keys, and then press the [ ] key. Press [OK].
  • Page 523 Registering a Protection Code Press [System Settings]. Press [Administrator Tools]. Press [Address Book: Program / Change / Delete Group]. Check that [Program / Change] is selected. Press the group key you want to register or enter the registered number using the number keys.
  • Page 524: Registering Smtp And Ldap Authentication

    5. Registering Addresses and Users for Facsimile/Scanner Functions Registering SMTP and LDAP Authentication This section describes how to register SMTP and LDAP Authentication. SMTP Authentication This section describes how to register SMTP Authentication. For each user registered in the Address Book, you can register a login user name and login password to be used when accessing an SMTP server.
  • Page 525: Ldap Authentication

    Registering SMTP and LDAP Authentication Press [Change] under "Login User Name". Enter the login user name, and then press [OK]. Press [Change] under "Login Password". Enter the password, and then press [OK]. Enter the password again to confirm, and then press [OK]. Press [OK].
  • Page 526 5. Registering Addresses and Users for Facsimile/Scanner Functions • When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you have specified in Program/Change LDAP Server of Administrator Tools settings applies. For details, see "Programming the LDAP server". Press the [User Tools/Counter] key.
  • Page 527 Registering SMTP and LDAP Authentication Enter the password again to confirm, and then press [OK]. Press [OK]. Press [Exit]. Press the [User Tools/Counter] key. • To register the name, see "Registering Names". • You can enter up to 128 characters for the user name. •...
  • Page 528 5. Registering Addresses and Users for Facsimile/Scanner Functions...
  • Page 529: Special Operations Under Windows

    6. Special Operations under Windows This chapter describes how to print files directly from Windows, or print with Bluetooth devices. Printing Files Directly from Windows You can print files directly using Windows commands. For example, you can print PostScript files for PostScript 3.
  • Page 530: Printing Commands

    6. Special Operations under Windows In other cases Add the IP address and host name of the network printer to the hosts file on the computer used for printing. Methods of addition vary depending on operating systems. Open the hosts file using memo pad files, for instance. The hosts file is in the following folder: \WINNT\SYSTEM32\DRIVERS\ETC\HOSTS “\WINNT”...
  • Page 531 Printing Files Directly from Windows • lpr: 5(When the spool printing function is available: 10) • rcp, rsh: 5 • ftp: 3 • sftp: 3 • Enter the file name in a format including the path from the directory executing commands. •...
  • Page 532 6. Special Operations under Windows Printing from the virtual printer c:> rcp [-b] \path name\file name [\path name\file name...] printer's host name: [virtual printer name] • For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference. ftp/sftp Use the “put”...
  • Page 533 Printing Files Directly from Windows • “=”, “,”, “_”, and “;” cannot be used for filenames. File names will be read as option strings. • If you are using ftp, you cannot specify an option using the “mput” command. • If you are using ftp, you cannot specify an option using the “pwd” command. •...
  • Page 534: Printing With Bluetooth Connection

    6. Special Operations under Windows Printing with Bluetooth Connection This describes how to print with Bluetooth devices. Supported Profiles The following profiles are supported: • SPP (Serial Port Profile) • HCRP (Hardcopy Cable Profile) • BIP (Basic Imaging Profile) Restrictions on SPP, HCRP •...
  • Page 535 Printing with Bluetooth Connection • To perform a printer installation, your account must have Manage Printers permission. Log on as an Administrators or Power Users group member. • To connect to a Bluetooth printer, your computer must have a Bluetooth device installed. Make sure a Bluetooth device is installed on your computer.
  • Page 536 6. Special Operations under Windows Windows Vista • To perform a printer installation, your account must have Manage Printers permission. Log on as an Administrators or Power Users group member. On the [Start] menu, click [Control Panel]. In the “Hardware and Sound” area, click [Printers]. In the top part of the window, click [Add a printer].
  • Page 537: Appendix

    7. Appendix When Using Windows Terminal Service/ MetaFrame The following explains how to use Windows Terminal Service and Maintenance. Operating Environment The following operating systems and MetaFrame versions are supported. Windows 2000 Server / Advanced Server • MetaFrame XP 1.0 SP1 / SP2 / FR1 / FR1+SP2 / FR2 / SP3 / FR2+SP3 / FR3 •...
  • Page 538 7. Appendix Windows Terminal Service In the Windows Terminal Service environment, some of the printer driver's functions is unavailable. In an environment where Windows Terminal Service is installed, some of the printer driver's functions is unavailable, even if any function of Windows Terminal Service is not used. When you install SmartDeviceMonitor for Client in an environment where the Terminal Service is running on the Windows 2000 Server family computer, be sure to install it using the install mode.
  • Page 539: Using Dhcp

    Using DHCP Using DHCP You can use the printer in a DHCP environment. You can also register the printer NetBIOS name on a WINS server when it is running. • Printers that register the printer NetBIOS name on a WINS server must be configured for the WINS server.
  • Page 540: Configuring The Wins Server

    7. Appendix Configuring the WINS Server This section explains configuring the WINS server. The printer can be configured to register its NetBIOS name with a WINS server when the power is turned on. This enables the NetBIOS name of the printer to be specified from SmartDeviceMonitor for Admin even in a DHCP environment.
  • Page 541 Configuring the WINS Server Use the “wins” command to make the setting with telnet. • p.164 "Remote Maintenance by telnet"...
  • Page 542: Using The Dynamic Dns Function

    7. Appendix Using the Dynamic DNS Function Dynamic DNS is a function which dynamically updates (registers and deletes) records (A record, AAAA record, CNAME, and PTR record) managed by the DNS server. When a DNS server is part of the network environment to which this printer, a DNS client, is connected, records can be dynamically updated using this function.
  • Page 543: Dns Servers Targeted For Operation

    Using the Dynamic DNS Function • No security settings made. • If security settings are made, an IP-specified client (this printer) permits updating. DNS servers targeted for operation For static IP setting • Microsoft DNS servers with standard Windows 2000 Server/Windows Server 2003/2003 R2 features •...
  • Page 544 7. Appendix • For details, see “Using telnet”. • p.164 "Remote Maintenance by telnet"...
  • Page 545: Precautions

    Precautions Precautions Please pay attention to the following when using the network interface board. When configuration is necessary, follow the appropriate procedures below. Connecting a Dial-Up Router to a Network When using NetWare (file server) If the NetWare file server and printer are on opposite sides of a router, packets are sent back and forth continuously, possibly incurring communications charges.
  • Page 546: Netware Printing

    7. Appendix When using network utility If the machine is connected to a network, observe the following points when setting up the machine or changing settings: For more details, see the operating instructions and Help for the ScanRouter delivery software and DeskTopBinder.
  • Page 547 Precautions • Under Windows 2000/XP and Windows Server 2003/2003 R2, clear the [Form feed] check box on the [NetWare Settings] tab in the printer properties dialog box. Banner page You should not configure a banner page on NetWare. If you want to change the banner page setting, always configure it using Windows.
  • Page 548: When The Ieee 802.11 Interface Unit Is Installed

    7. Appendix When the IEEE 802.11 Interface Unit is Installed Please pay attention to the following when using the IEEE 802.11 interface on the network. When using the wireless LAN interface on the network, note the following: When moving the machine Detach the antennas when relocating the machine locally.
  • Page 549: Configuring Ieee 802.1X

    Configuring IEEE 802.1X Configuring IEEE 802.1X IEEE 802.1X can be configured using Web Image Monitor's administrator mode. You can select four types of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication method has different configuration settings and authentication procedures. Types and requirements of certificates are as follows: If a certificate is required, configure all settings after installing the certificate.
  • Page 550: Installing Device Certificate

    7. Appendix Installing Device Certificate Log on to Web Image Monitor in the administrator mode. Click [Configuration]. Click [Device Certificate] in “Security” area. Click [Certificate 2] on the “Device Certificate” window, and then click [Request]. Enter appropriate “Common Name” and “Country Code” on “Certificate Information” page, and then click [OK].
  • Page 551: Setting Items Of Ieee 802.1X For Ethernet

    Configuring IEEE 802.1X Setting Items of IEEE 802.1X for Ethernet Log on to Web Image Monitor in the administrator mode. Click [Configuration]. Select [IEEE 802.1X (WPA/WPA2)] in “Security” area. In “User Name”, enter the user name set in the RADIUS server. Enter the domain name in “Domain Name”.
  • Page 552: Setting Items Of Ieee 802.1X For Wireless Lan

    7. Appendix Click [OK]. Click [Configuration], and then click [Interface Settings] in the “Interface” area. Select [Active] in “Ethernet Security”. Click [OK]. Click [Logout]. Quit the Web Image Monitor. • If there is a problem with settings, you might not be able to communicate with the printer. To identify the problem, print a network summary.
  • Page 553 Configuring IEEE 802.1X • Select [On] or [Off] in “Trust Intermediate Certificate Authority”. • Enter the host name of the RADIUS server in “Server ID”. PEAP • Click [Change] in “Password”, and then enter the password set in the RADIUS server. •...
  • Page 554: Specifications

    7. Appendix Specifications Interface 1000BASE-T, 100BASE-TX, 10BASE-T, IEEE 802.11a/b/g Frame type EthernetII, IEEE 802.2, IEEE 802.3, SNAP Printer ( LAN-Fax) TCP/IP (IPv4/IPv6) DIPRINT IPP-SSL IPX/SPX (NetWare) AppleTalk WSD (Printer) Internet Fax TCP/IP (IPv4/IPv6) SMTP SMTP-C POP3 IMAP4 Network Scanner TCP/IP (IPv4/IPv6) FTP-C...
  • Page 555 Specifications SMTP SMTP-C POP3 Document Server TCP/IP (IPv4/IPv6) FTP-C HTTP HTTPS Management Function TCP/IP (IPv4/IPv6) FTP-C SNMP SNMP-C HTTP HTTPS TELNET (mshell) DHCP DNS-C LDAP...
  • Page 556 7. Appendix To use IPP and SMB, use the SmartDeviceMonitor for Client port. To use IPP under Windows XP, Windows Server 2003/2003 R2, use the Standard IPP port. To use IPP under Windows 2000, use SmartDeviceMonitor for Client. AppleTalk can be used when the PostScript 3 module is installed. Under Windows Vista, WSD (Printer), WSD (Scanner), uses the WSD Port.
  • Page 557: Copyrights

    Copyrights Copyrights expat • The software including controller, etc. (hereinafter "software") installed on this product uses the expat under the conditions mentioned below. • The product manufacturer provides warranty and support to the software of the product including the expat, and the product manufacturer makes the initial developer and copyright holder of the expat, free from these obligations.
  • Page 558 7. Appendix Copyright (c) 1999, 2000 The NetBSD Foundation, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 559: Sablotron

    Copyrights • This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD Project. • This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors. • This product includes software developed by Christos Zoulas. •...
  • Page 560: Jpeg Library

    7. Appendix JPEG LIBRARY • The software installed on this product is based in part on the work of the Independent JPEG Group. SASL CMU libsasl Tim Martin Rob Earhart Rob Siemborski Copyright (c) 2001 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 561: Md4

    Copyrights Copyright (c) 1990-2, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.
  • Page 562: Rsa Bsafe

    7. Appendix • The source code for SMB transmission by this machine can be downloaded from the following website: • http://support-download.com/services/scbs ® RSA BSAFE • This product includes RSA BSAFE(c) cryptographic or security protocol software from RSA Security Inc. • RSA and BSAFE are registered trademarks of RSA Security Inc. in the United States and/or other countries.
  • Page 563 Copyrights 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http:// www.openssl.org/)"...
  • Page 564: Open Ssh

    7. Appendix 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 565 Copyrights - Zlib is now external, in a library - The make-ssh-known-hosts script is no longer included - TSS has been removed - MD5 is now external, in the OpenSSL library - RC4 support has been replaced with ARC4 support from OpenSSL - Blowfish is now external, in the OpenSSL library [The licence continues] Note that any information and cryptographic algorithms used in this software are publicly available on the...
  • Page 566 7. Appendix THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS SOFTWARE. Ariel Futoransky <futo@core-sdi.com>...
  • Page 567 Copyrights Daniel Kouril Wesley Griffin Per Allansson Jason Downs Solar Designer Todd C. Miller Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 568: Open Ldap

    7. Appendix 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 569: Heimdal

    Copyrights The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders. OpenLDAP is a registered trademark of the OpenLDAP Foundation.
  • Page 570: Trademarks

    Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd is under license. UNIX is a registered trademark in the United States and other countries, licensed exclusively through, X/ Open Company Limited.
  • Page 571 Trademarks ® ® Microsoft Windows Vista Home Basic ® ® Microsoft Windows Vista Enterprise *The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ® ® Microsoft Windows Server 2003 Enterprise Edition ®...
  • Page 572 7. Appendix...
  • Page 573: Index

    INDEX Address book............Bluetooth.............. managing names............adding a printer.............. supported profiles............Administrator mode..........login................. Administrator tools Copyrights............address book change order..........Counter for all users address book edit title............printing................address book management..........Counter per user Address book program/change/delete group....address book switch title...........
  • Page 574 External telephone..........output: facsimile..............output: printer..............panel key sound..............Fax destination............ Print Priority................. program/change/delete user text........changing................warm-up beeper..............deleting................Gigabit ethernet interface........fax header............... fax number............... Group..............international TX mode............. add a group to another group........label insertion..............changing name............... line..................
  • Page 575 changing................deleting................NCP folder fax header............... Browse Network............. international TX mode............. changing................IP-fax destination............. deleting................label insertion..............locating................protocol................protocol................registering................ registering................ SEP code................NetWare.............. SUB code................. banner page..............form feed................Laws and Regulations........... printing................printing after resetting............. legal prohibition..............NetWare 3.x..........
  • Page 576 Network Interface Board........Print log information display................ftp..................show................. prnlog................Note............... rcp..................rsh..................Notice..............sftp..................Print server NetWare 4.x..............Optional handset..........NetWare 5..............Output tray settings NetWare 5.1..............type 1 and 2..............NetWare 6..............type 3 and 4..............NetWare 6.5..............Print Server NetWare 3.x..............
  • Page 577 changing................deleting................Quick dial locating................e-mail................login screen..............fax..................protocol................registering................ SNMP..............Realm..............Specifications............changing................Symbols..............deleating................System log............programming..............System log information Remote maintenance ftp..................telnet................. rcp..................Remote printer rsh..................NetWare 3.x..............sftp..................NetWare 4.x..............syslog................NetWare 5..............System settings NetWare 5.1..............
  • Page 578 netware................tray 2.................. passwd................tray 3 (LCT)................. pathmtu................tray 3 (lower paper tray)..........prnlog................tray 4 (lower paper tray)..........rhpp.................. TWAIN scanner............. route................. ethernet................set..................wireless LAN..............show................. slp..................smb................... USB interface............snmp................. User code............sntp................... changing................spoolsw................deleting................ssdp.................. registering................
  • Page 579 limitations................. supported printer drivers..........WINS server............telnet................. Web Image Monitor............Wireless LAN............ad-hoc channel..............communication mode............restore factory defaults............security method..............SSID settings............... wierless LAN signal............Wireless LAN interface checking the signal............connecting................setup procedure..............WSD scanner............ethernet................wireless LAN..............
  • Page 580 MEMO...
  • Page 581 MEMO...
  • Page 582 MEMO D029-7702...
  • Page 583 Copyright © 2008...
  • Page 584 Type for C2828/MP C2800/LD528C/Aficio MP C2800 Type for C3333/MP C3300/LD533C/Aficio MP C3300 Type for C4040/MP C4000/LD540C/Aficio MP C4000 Type for C5050/MP C5000/LD550C/Aficio MP C5000 Type for C2828G/LD528CG/Aficio MP C2800G Type for C3333G/LD533CG/Aficio MP C3300G Type for C4040G/LD540CG/Aficio MP C4000G Type for C5050G/LD550CG/Aficio MP C5000G...
  • Page 585 Operating Instructions Security Reference Getting Started Administrators/Authentication and its Application Users/Authentication and its Application Protecting Document Data Information from Leaks Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Managing Access to the Machine Enhanced Network Security Specifying the Extended Security Functions Troubleshooting Appendix...
  • Page 587 TABLE OF CONTENTS Manuals for This Machine..........................8 Notice................................10 Important..............................10 How to Read This Manual..........................11 Symbols................................11 IP Address..............................11 Note................................11 Laws and Regulations............................12 Legal Prohibition............................12 1. Getting Started Before Using the Security Functions........................13 Setting Up the Machine...........................14 Enhanced Security............................16 Glossary................................17 Security Measures Provided by this Machine....................18 Using Authentication and Managing Users....................18 Ensuring Information Security........................18 Limiting and Controlling Access........................20...
  • Page 588 Using Web Image Monitor.........................36 3. Users/Authentication and its Application Users..................................37 About User Authentication..........................38 Authentication Setting Procedure........................39 Enabling User Authentication..........................41 User Code Authentication..........................42 Specifying User Code Authentication......................42 Basic Authentication............................46 Specifying Basic Authentication........................46 Authentication Information Stored in the Address Book................48 Specifying Login User Name and Login Password...................49 Specifying Authentication Information to Log on..................51 Windows Authentication..........................53 Specifying Windows Authentication......................54...
  • Page 589 Unauthorized Copy Prevention........................91 Data Security for Copying..........................92 Printing Limitations............................94 Notice................................94 Printing with Unauthorized Copy Prevention and Data Security for Copying........94 Printing a Confidential Document........................97 Specifying a Locked Print File........................97 Printing a Locked Print File...........................98 Deleting Locked Print Files...........................99 Changing Passwords of Locked Print Files....................100 Unlocking Locked Print Files........................101 Specifying Access Permission for Stored Files.....................103 Assigning Users and Access Permission for Stored Files................104...
  • Page 590 Auto Erase Memory..........................135 Erase All Memory............................140 6. Managing Access to the Machine Preventing Modification of Machine Settings....................143 Menu Protect..............................145 Set up Menu Protect..........................145 Limiting Available Functions..........................150 Specifying Which Functions are Available.....................150 Managing Log Files............................152 Using The Control Panel to Specify Log File Settings................152 Using Web SmartDeviceMonitor Professional IS/Standard to Manage Log Files......154 Using Web Image Monitor to Manage Log Files...................154 7.
  • Page 591 Authentication by telnet..........................206 "authfree" Command..........................206 Authentication by IEEE802.1X........................207 8. Specifying the Extended Security Functions Specifying the Extended Security Functions....................209 Changing the Extended Security Functions.....................209 Procedure for Changing the Extended Security Functions..............209 Settings...............................210 Other Security Functions..........................215 Fax Function...............................215 Scanner Function............................215 Limiting Machine Operation to Customers Only..................217 Settings...............................217 Specifying Service Mode Lock Preparation....................217 Canceling Service Mode Lock.........................218...
  • Page 592 Facsimile Features.............................256 Printer Features............................258 Scanner Features............................259 Settings via Web Image Monitor......................260 Settings via SmartDeviceMonitor for Admin...................263 Network Administrator Settings........................264 System Settings............................264 Facsimile Features.............................265 Scanner Features............................265 Settings via Web Image Monitor......................265 Settings via SmartDeviceMonitor for Admin...................268 File Administrator Settings..........................269 System Settings............................269 Facsimile Features.............................269 Printer Features............................269 Settings via Web Image Monitor......................270...
  • Page 593 Fax..................................316 Interface................................319 Network................................321 Webpage...............................325 Functions That Require Options........................327 Trademarks..............................328 INDEX ................................331...
  • Page 594: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 595 Network and System Settings Guide Explains how to connect the machine to a network, configure and operate the machine in a network environment, and use the software provided. Also explains how to change User Tools settings and how to register information in the Address Book. Security Reference This manual is for administrators of the machine.
  • Page 596: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products.
  • Page 597: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 598: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 599: Getting Started

    1. Getting Started This chapter describes the machine's security features and how to specify initial security settings. Before Using the Security Functions • If the security settings are not specified, the machine may be damaged by malicious attackers. 1. To prevent this machine being stolen or willfully damaged, etc., install it in a secure location. 2.
  • Page 600: Setting Up The Machine

    1. Getting Started Setting Up the Machine This section explains how to enable encryption of transmitted data and configure the administrator account. If you want higher security, make the following setting before using the machine. Turn the machine on. Press the [User Tools/Counter] key. BHL006S Press [System Settings].
  • Page 601 Setting Up the Machine Specify IPv4 Address. For details on how to specify the IPv4 address, see "Interface Settings", Network and System Settings Guide. Connect the machine to the network. Start Web Image Monitor, and then log on to the machine as the administrator. For details about logging on to Web Image Monitor as an administrator, see "Using Web Image Monitor".
  • Page 602: Enhanced Security

    1. Getting Started Enhanced Security This machine's security functions can be enhanced by managing the machine and its users using the improved authentication functions. By specifying access limits for the machine's functions and the documents and data stored in the machine, information leaks and unauthorized access can be prevented.
  • Page 603: Glossary

    Glossary Glossary Administrator There are four types of administrators according to administrative function: machine administrator, network administrator, file administrator, and user administrator. We recommend that only one person takes each administrator role. In this way, you can spread the workload and limit unauthorized operation by a single administrator. Basically, administrators make machine settings and manage the machine;...
  • Page 604: Security Measures Provided By This Machine

    1. Getting Started Security Measures Provided by this Machine Using Authentication and Managing Users Enabling Authentication To control administrators' and users' access to the machine, perform administrator authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be enabled.
  • Page 605 Security Measures Provided by this Machine Printing Confidential files Using the printer's Locked Print, you can store files in the machine as confidential files and then print them. You can print a file using the machine's control panel and collect it on the spot to prevent others from seeing it.
  • Page 606: Limiting And Controlling Access

    1. Getting Started Overwriting the Data on the Hard Disk To prevent data leaks, you can set the machine to automatically overwrite temporary data. We recommend that before disposing of the machine, you overwrite all the data on the hard disk. To overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required.
  • Page 607: Enhanced Network Security

    Security Measures Provided by this Machine • p.150 "Limiting Available Functions" Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the Address Book, stored files, and default settings. For details about preventing unauthorized access, see "Preventing Unauthorized Access".
  • Page 608 1. Getting Started...
  • Page 609: Administrators/Authentication And Its Application

    2. Administrators/Authentication and its Application Administrators Administrators manage user access to the machine and various other important functions and settings. When an administrator controls limited access and settings, first select the machine's administrator, enable the authentication function, and then use the machine. When the authentication function is enabled, the login user name and login password are required in order to use the machine.
  • Page 610: Machine Administrator

    2. Administrators/Authentication and its Application Machine Administrator This is the administrator who mainly manages the machine's default settings. You can set the machine so that the default for each function can only be specified by the machine administrator. By making this setting, you can prevent unauthorized people from changing the settings and allow the machine to be used securely by its many users.
  • Page 611: About Administrator Authentication

    About Administrator Authentication About Administrator Authentication There are four types of administrators: user administrator, machine administrator, network administrator, and file administrator. For details about each administrator, see "Administrators". BBC005S 1. User Administrator This administrator manages personal information in the Address Book. You can register/delete users in the Address Book or change users' personal information.
  • Page 612 2. Administrators/Authentication and its Application • p.23 "Administrators"...
  • Page 613: Enabling Administrator Authentication

    Enabling Administrator Authentication Enabling Administrator Authentication To control administrators' access to the machine, perform administrator authentication using login user names and passwords. When registering an administrator, you cannot use a login user name already registered in the Address Book. Administrators are handled differently from the users registered in the Address Book.
  • Page 614 2. Administrators/Authentication and its Application • If you have enabled [Administrator Authentication Management], make sure not to forget the administrator login user name and login password. If an administrator login user name or login password is forgotten, a new password must be specified using the supervisor's authority. For instructions on registering the supervisor, see "Supervisor Operations".
  • Page 615 Enabling Administrator Authentication Press [User Management], [Machine Management], [Network Management], or [File Management] to select which settings to manage. Set "Admin. Authentication" to [On]. "Available Settings" appears. Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. "Available Settings"...
  • Page 616: Registering The Administrator

    2. Administrators/Authentication and its Application • p.249 "Supervisor Operations" • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" • p.143 "Managing Access to the Machine" Registering the Administrator If administrator authentication has been specified, we recommend only one person take each administrator role.
  • Page 617 Enabling Administrator Authentication In the line for the administrator whose authority you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. If you allocate each administrator's authority to a different person, the screen appears as follows: Press [Change] for the login user name.
  • Page 618 2. Administrators/Authentication and its Application Enter the login user name, and then press [OK]. Press [Change] for the login password. Enter the login password, and then press [OK]. Follow the password policy to make the login password more secure. For details about the password policy and how to specify it, see "Specifying the Extended Security Functions".
  • Page 619 Enabling Administrator Authentication Press [Change] for the encryption password. Enter the encryption password, and then press [OK]. If a password reentry screen appears, enter the encryption password, and then press [OK]. Press [OK] twice. You will be logged off. Press the [User Tools/Counter] key. •...
  • Page 620: Logging On Using Administrator Authentication

    2. Administrators/Authentication and its Application Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administrator's user name and password. This section describes how to log on. When you log in with a user name that has multiple administrator authority, each of the authorities associated with that name are displayed.
  • Page 621: Logging Off Using Administrator Authentication

    Enabling Administrator Authentication Enter the login password, and then press [OK]. "Authenticating... Please wait." appears, followed by the screen for specifying the default. • If user authentication has already been specified, a screen for authentication appears. • To log on as an administrator, enter the administrator's login user name and login password. •...
  • Page 622: Using Web Image Monitor

    2. Administrators/Authentication and its Application Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. In the line for the administrator you want to change, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. Press [Change] for the setting you want to change, and re-enter the setting.
  • Page 623: Users/Authentication And Its Application

    3. Users/Authentication and its Application Users A user performs normal operations on the machine, such as copying and printing. Users are managed using the personal information in the machine's Address Book, and can use only the functions they are permitted to access by administrators. By enabling user authentication, you can allow only people registered in the Address Book to use the machine.
  • Page 624: About User Authentication

    3. Users/Authentication and its Application About User Authentication This machine has an authentication function to prevent unauthorized access. By using login user name and login password, you can specify access limits for individual users and groups of users. BBC004S 1. User A user performs normal operations on the machine, such as copying and printing.
  • Page 625: Authentication Setting Procedure

    Authentication Setting Procedure Authentication Setting Procedure Specify administrator authentication and user authentication according to the following chart: Administrator Authentication Specifying Administrator Privileges See "Enabling Administrator Authentication". See "Specifying Administrator Privileges". Registering the Administrator See "Registering the Administrator". User Authentication Specifying User Authentication See "Enabling User Authentication".
  • Page 626 3. Users/Authentication and its Application • p.65 "LDAP Authentication" • p.73 "Integration Server Authentication"...
  • Page 627: Enabling User Authentication

    Enabling User Authentication Enabling User Authentication To control users' access to the machine, perform user authentication using login user names and passwords. There are five types of user authentication methods: User Code authentication, Basic authentication, Windows authentication, LDAP authentication, and Integration Server authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authentication.
  • Page 628: User Code Authentication

    3. Users/Authentication and its Application User Code Authentication This is an authentication method for limiting access to functions according to a user code. The same user code can be used by more than one user. For details about specifying user codes, see "Authentication Information", Network and System Settings Guide.
  • Page 629 User Code Authentication Select which of the machine's functions you want to limit. The selected settings will be unavailable to users. For details about limiting available functions for individuals or groups, see "Limiting Available Functions". Select the "Printer Job Authentication" level. If you select [Entire] or [Simple (All)], proceed to "Selecting Entire or Simple (All)".
  • Page 630 3. Users/Authentication and its Application If you select [Simple (All)], you can print even with unauthenticated printer drivers or devices. Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing.
  • Page 631 User Code Authentication Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 632: Basic Authentication

    3. Users/Authentication and its Application Basic Authentication Specify this authentication method when using the machine's Address Book to authenticate each user. Using Basic authentication, you can not only manage the machine's available functions but also limit access to stored files and to the personal data in the Address Book. Under Basic authentication, the administrator must specify the functions available to each user registered in the Address Book.
  • Page 633 Basic Authentication Select the "Printer Job Authentication" level. If you select [Entire] or [Simple (All)], proceed to "Selecting Entire or Simple (All)". If you select [Simple (Limitation)], proceed to "Selecting Simple (Limitation)". For a description of the printer job authentication levels, see "Printer Job Authentication". •...
  • Page 634: Authentication Information Stored In The Address Book

    3. Users/Authentication and its Application Selecting Simple (Limitation) If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients' IPv4 address range in which printer job authentication is not required.
  • Page 635: Specifying Login User Name And Login Password

    Basic Authentication Users must have a registered account in the Address Book in order to use the machine when User Authentication is specified. For details about user registration, see "Registering Names", Network and System Settings Guide. User authentication can also be specified via SmartDeviceMonitor for Admin or Web Image Monitor. •...
  • Page 636 3. Users/Authentication and its Application Press [Auth. Info]. Press [Change] for "Login User Name". Enter a login user name, and then press [OK]. Press [Change] for "Login Password". Enter a login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK]. Press [OK].
  • Page 637: Specifying Authentication Information To Log On

    Basic Authentication Specifying Authentication Information to Log on The login user name and password specified in [Address Book Management] can be used as the login information for "SMTP Authentication", "Folder Authentication", and "LDAP Authentication". If you do not want to use the login user name and password specified in [Address Book Management] for "SMTP Authentication", "Folder Authentication", or "LDAP Authentication", see "Address Book"...
  • Page 638 3. Users/Authentication and its Application Press the [User Tools/Counter] key. • p.49 "Specifying Login User Name and Login Password"...
  • Page 639: Windows Authentication

    Windows Authentication Windows Authentication Specify this authentication when using the Windows domain controller to authenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group registered in the directory server.
  • Page 640: Specifying Windows Authentication

    3. Users/Authentication and its Application • If you have created a new user in the domain controller and selected "User must change password at next logon", log on to the machine from the computer to change the password before logging on from the machine's control panel.
  • Page 641 Windows Authentication If you want to use Kerberos authentication, press [On]. If you want to use NTLM authentication, press [Off] and proceed to step 8. Select Kerberos authentication realm and proceed to step 9. To enable Kerberos authentication, a realm must be registered beforehand. The realm name must be registered in capital letters.
  • Page 642 3. Users/Authentication and its Application Select the "Printer Job Authentication" level. If you select [Entire] or [Simple (All)], proceed to "Selecting Entire or Simple (All)". If you select [Simple (Limitation)], proceed to "Selecting Simple (Limitation)". For a description of the printer job authentication levels, see "Printer Job Authentication". •...
  • Page 643 Windows Authentication Press [On] for "Use Secure Connection (SSL)". If you are not using secure sockets layer (SSL) for authentication, press [Off]. If global groups have been registered under Windows server, you can limit the use of functions for each global group. You need to create global groups in the Windows server in advance and register in each group the users to be authenticated.
  • Page 644 3. Users/Authentication and its Application Under "Group Name", press [Change], and then enter the group name. Press [OK]. Select which of the machine's functions you want to permit. Windows Authentication will be applied to the selected functions. Users can use the selected functions only. For details about specifying available functions for individuals or groups, see "Limiting Available Functions".
  • Page 645 Windows Authentication Selecting Simple (Limitation) If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients' IPv4 address range in which printer job authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers or without any printer driver.
  • Page 646 3. Users/Authentication and its Application Press [On] for "Use Secure Connection (SSL)". If you are not using secure sockets layer (SSL) for authentication, press [Off]. If global groups have been registered under Windows server, you can limit the use of functions for each global group.
  • Page 647 Windows Authentication Under "Group Name", press [Change], and then enter the group name. Press [OK]. Select which of the machine's functions you want to permit. Windows Authentication will be applied to the selected functions. Users can use the selected functions only. For details about specifying available functions for individuals or groups, see "Limiting Available Functions".
  • Page 648 3. Users/Authentication and its Application Installing Internet Information Services (IIS) and Certificate services Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active Directory. We recommend you install Internet Information Services (IIS) and Certificate services as the Windows components.
  • Page 649 Windows Authentication Check the specified data, which appears as "Request File Summary", and then click [Next]. The server certificate is created. If the fax number cannot be obtained If the fax number cannot be obtained during authentication, specify the setting as follows: Start C:\WINNT\SYSTEM32\adminpak.
  • Page 650 3. Users/Authentication and its Application Click [Install]. Enter the contents of the device certificate. In the "Certificate Request" box, enter the contents of the device certificate received from the certificate authority. Click [OK]. "Installed" appears under "Certificate Status" to show that a device certificate for the machine has been installed.
  • Page 651: Ldap Authentication

    LDAP Authentication LDAP Authentication Specify this authentication method when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the Address Book.
  • Page 652: Specifying Ldap Authentication

    3. Users/Authentication and its Application • User Name You do not have to enter the user name if the LDAP server supports "Anonymous Authentication". • Password You do not have to enter the password if the LDAP server supports "Anonymous Authentication".
  • Page 653 LDAP Authentication Select [LDAP Auth.]. If you do not want to use user authentication management, select [Off]. Select the LDAP server to be used for LDAP authentication. Select the "Printer Job Authentication" level. You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces.
  • Page 654 3. Users/Authentication and its Application • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" • p.68 "Selecting Entire or Simple (All)" • p.70 "Selecting Simple (Limitation)" • p.80 "Printer Job Authentication" Selecting Entire or Simple (All) If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
  • Page 655 LDAP Authentication Press [Change] for "Login Name Attribute". Enter the login name attribute, and then press [OK]. Use the Login Name Attribute as a search criterion to obtain information about an authenticated user. You can create a search filter based on the Login Name Attribute, select a user, and then retrieve the user information from the LDAP server so it is transferred to the machine's Address Book.
  • Page 656 3. Users/Authentication and its Application Press [Change] for "Unique Attribute". Enter the unique attribute and then press [OK]. Specify Unique Attribute on the machine to match the user information in the LDAP server with that in the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that of a user registered in the machine, the two instances are treated as referring to the same user.
  • Page 657 LDAP Authentication you do not require authentication for printing. However, note that, because the machine does not require authentication in this case, it may be used by unauthorized users. Press [Simple (Limitation)]. Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces.
  • Page 658 3. Users/Authentication and its Application For details about specifying available functions for individuals or groups, see "Limiting Available Functions". Press [Change] for "Login Name Attribute". Enter the login name attribute, and then press [OK]. Use the Login Name Attribute as a search criterion to obtain information about an authenticated user. You can create a search filter based on the Login Name Attribute, select a user, and then retrieve the user information from the LDAP server so it is transferred to the machine's Address Book.
  • Page 659: Integration Server Authentication

    Integration Server Authentication Integration Server Authentication To use Integration Server authentication, you need a server on which ScanRouter software that supports authentication is installed. For external authentication, the Integration Server authentication collectively authenticates users accessing the server over the network, providing a server-independent, centralized user authentication system that is safe and convenient.
  • Page 660 3. Users/Authentication and its Application Select [Integration Svr. Auth.]. If you do not want to use User Authentication Management, select [Off]. Press [Change] for "Server Name". Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IPv4 address or host name.
  • Page 661 Integration Server Authentication Press [Change] for "Domain Name". Enter the domain name, and then press [OK]. You cannot specify a domain name under an authentication system that does not support domain login. Press [Obtain URL]. The machine obtains the URL of the server specified in "Server Name". If "Server Name"...
  • Page 662 3. Users/Authentication and its Application If you set "Authentication Type" to [Windows (Native)] or [Windows (NT Compatible)], you can use the global group. If you set "Authentication Type" to [Notes], you can use the Notes group. If you set "Authentication Type"...
  • Page 663 Integration Server Authentication Users can use the selected functions only. For details about specifying available functions for individuals or groups, see "Limiting Available Functions". Press [OK]. Select the "Printer Job Authentication" level. If you select [Entire] or [Simple (All)], proceed to "Selecting Entire or Simple (All)". If you select [Simple (Limitation)], proceed to "Selecting Simple (Limitation)".
  • Page 664 3. Users/Authentication and its Application Press [On] for "Use Secure Connection (SSL)", and then press [OK]. To not use secure sockets layer (SSL) for authentication, press [Off]. Press the [User Tools/Counter] key. Selecting Simple (Limitation) If you select [Simple (Limitation)], you can specify clients for which printer job authentication is not required. Specify [Parallel Interface: Simple], [USB: Simple] and the clients' IPv4 address range in which printer job authentication is not required.
  • Page 665 Integration Server Authentication Press [Change]. Specify the range in which [Simple (Limitation)] is applied to "Printer Job Authentication". You can specify the IPv4 address range to which this setting is applied, and whether or not to apply the setting to the parallel and USB interfaces. Press [Exit].
  • Page 666: Printer Job Authentication

    3. Users/Authentication and its Application Printer Job Authentication This section explains Printer Job Authentication. Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication levels and printer job types. Depending on the combination of printer job authentication level and printer job type, the machine may not print properly.
  • Page 667 Printer Job Authentication Printer Jobs: Job Reset Settings: Disabled • [Simple (All)] The machine authenticates printer jobs and remote settings that have authentication information, and cancels the jobs and settings that fail authentication. Printer jobs and settings without authentication information are performed without being authenticated.
  • Page 668 3. Users/Authentication and its Application 7. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password used for logging on via ftp. However, the user ID and password are not encrypted. • p.209 "Specifying the Extended Security Functions"...
  • Page 669: If User Authentication Is Specified

    If User Authentication is Specified If User Authentication is Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations.
  • Page 670: User Code Authentication (Using A Printer Driver)

    3. Users/Authentication and its Application User Code Authentication (Using a Printer Driver) When User Code Authentication is set, specify a user code in printer properties on the printer driver. For details, see the printer driver Help. Login (Using the Control Panel) Use the following procedure to log in when Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication is enabled.
  • Page 671: Login (Using Web Image Monitor)

    If User Authentication is Specified Login (Using Web Image Monitor) This section explains how to log on to the machine via Web Image Monitor. Click [Login] on the top page of the Web Image Monitor. Enter a login user name and password, and then click [Login]. •...
  • Page 672 3. Users/Authentication and its Application Setting Item Description Setting Values Default Setting Specify whether or not • Active to cancel lockout after Lockout Release Timer • Inactive a specified period • Inactive elapses. Specify the number of Lock Out User for minutes after which 1-9999 min.
  • Page 673: Auto Logout

    If User Authentication is Specified Set the "Lockout Release Timer" to [Active]. In the "Lock Out User for" field, enter the number of minutes until lockout is disabled. Click [OK]. User Lockout Policy is set. Click [OK]. Click [Logout]. Unlocking a Locked User Account A locked user account can be unlocked by the administrator or supervisor with unlocking privileges using Web Image Monitor.
  • Page 674 3. Users/Authentication and its Application Press the [User Tools/Counter] key. Press [System Settings]. Press [Timer Settings]. Press [Auto Logout Timer]. If the setting to be specified does not appear, press [ Next] to scroll down to other settings. Select [On]. If you do not want to specify [Auto Logout Timer], select [Off].
  • Page 675 If User Authentication is Specified Enter "60" to "999" (seconds) using the number keys, and then press [ ]. Press the [User Tools/Counter] key. • If a paper jam occurs or a print cartridge runs out of ink, the machine might not be able to perform the Auto Logout function.
  • Page 676: Authentication Using An External Device

    3. Users/Authentication and its Application Authentication Using an External Device To authenticate using an external device, see the device manual. For details, contact your sales representative.
  • Page 677: Protecting Document Data Information From Leaks

    4. Protecting Document Data Information from Leaks This chapter describes how to protect document data. Preventing Unauthorized Copying In Printer Features, using the printer driver, you can embed a pattern in the printed copy to discourage or prevent unauthorized copying. The unauthorized copy prevention function prevents unauthorized copies of documents by embedding a text pattern (for instance, a warning such as "No Copying") that you can set on the print driver (which will appear on printed copies).
  • Page 678: Data Security For Copying

    4. Protecting Document Data Information from Leaks If the document is copied, faxed and scanned, or stored in the Document Server by a copier or multifunction printer, the embedded pattern appears clearly on the copy, discouraging unauthorized copying. To use the printer function when User Authentication is enabled, you must enter the login user name and password for the printer driver.
  • Page 679 Preventing Unauthorized Copying confidential information from being copied. Also if a document with embedded pattern is detected, the machine beeps. An unauthorized copy log is also stored. To gray out copies of data security for copying documents when they are copied, faxed and scanned, or stored in the Document Server, the optional Copy Data Security Unit must be installed in the machine.
  • Page 680: Printing Limitations

    4. Protecting Document Data Information from Leaks • If a document with embedded pattern for data security for copying is copied, faxed and scanned, or stored in the Document Server using a copier or multi-function printer without the Copy Data Security Unit, the embedded pattern appears clearly on the copy.
  • Page 681 Preventing Unauthorized Copying Specifying Printer Settings for Unauthorized Copy Prevention (Printer Driver Setting) Using the printer driver, specify the printer settings for unauthorized copy prevention. To use the printer function when User Authentication is enabled, you must enter the login user name and password for the printer driver.
  • Page 682 4. Protecting Document Data Information from Leaks • If a document that is not copy-guarded is copied, faxed and scanned, or stored, the copy or stored file is not grayed out. Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Data Security for Copying].
  • Page 683: Printing A Confidential Document

    Printing a Confidential Document Printing a Confidential Document Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine's output trays. When printing confidential documents, use the Locked Print function. Locked Print •...
  • Page 684: Printing A Locked Print File

    4. Protecting Document Data Information from Leaks Printing a Locked Print File To print a Locked Print file, you must be at the machine and print the file using the control panel. To print Locked Print files, the password is required. If you do not enter the correct password, you cannot print the files.
  • Page 685: Deleting Locked Print Files

    Printing a Confidential Document Press [Print]. Enter the password for the stored file, and then press [OK]. Enter the password specified in step 4 of "Specifying a Locked Print File". Press [Yes]. • p.83 "If User Authentication is Specified" Deleting Locked Print Files This can be specified by the file creator (owner).
  • Page 686: Changing Passwords Of Locked Print Files

    4. Protecting Document Data Information from Leaks Press [Delete]. Enter the password of the Locked Print file, and then press [OK]. The password entry screen does not appear if the file administrator is logged in. Press [Yes]. • Locked Print files can also be deleted by the file administrator. Changing Passwords of Locked Print Files This can be specified by the file creator (owner) or file administrator.
  • Page 687: Unlocking Locked Print Files

    Printing a Confidential Document Enter the password for the stored file, and then press [OK]. The machine administrator does not need to enter the password. Enter the new password for the stored file, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK]. The password entry screen does not appear if the file administrator is logged in.
  • Page 688 4. Protecting Document Data Information from Leaks Select the file. Press [Unlock File]. Press [Yes]. • You can use the same procedure to unlock stored print files also. • p.209 "Specifying the Extended Security Functions" • p.34 "Logging on Using Administrator Authentication" •...
  • Page 689: Specifying Access Permission For Stored Files

    Specifying Access Permission for Stored Files Specifying Access Permission for Stored Files This section describes Specifying Access Permission for Stored Files. You can specify who is allowed to access stored scan files and files stored in the Document Server. This can prevent activities such as printing or sending of stored files by unauthorized users. You can also specify which users can change or delete stored files.
  • Page 690: Assigning Users And Access Permission For Stored Files

    4. Protecting Document Data Information from Leaks Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files. For details about logging on and logging off with administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator Authentication".
  • Page 691 Specifying Access Permission for Stored Files Press [Change Access Priv.]. Press [Program/Change/Delete]. Press [New Program].
  • Page 692: Specifying Access Privileges For Files Stored Using The Scanner And Fax Functions

    4. Protecting Document Data Information from Leaks Select the users or groups you want to assign permission to. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control].
  • Page 693 Specifying Access Permission for Stored Files Specifying Access Privileges When Storing Files This section explains how to specify the access privileges and then store a file in the Document Server under the scanner or fax function. The scanner screen is used to illustrate the procedure. Press [Store File].
  • Page 694 4. Protecting Document Data Information from Leaks Press [Exit]. Select the user who you want to assign access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit]. Press [OK].
  • Page 695 Specifying Access Permission for Stored Files Press [Manage / Delete File]. Press [Change Access Priv.]. Press [Program/Change/Delete].
  • Page 696: Assigning The User And The Access Permission For The User's Stored Files

    4. Protecting Document Data Information from Leaks Press [New Program]. Select the users or groups you want to assign permission to. You can select more than one user. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign access permission to, and then select the permission.
  • Page 697 Specifying Access Permission for Stored Files Select the user or group. Press [Protection]. Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users/ Groups". If the setting to be specified does not appear, press [ Next] to scroll down to other settings. Press [New Program].
  • Page 698: Specifying Passwords For Stored Files

    4. Protecting Document Data Information from Leaks • p.35 "Logging off Using Administrator Authentication" Specifying Passwords for Stored Files This can be specified by the file creator (owner) or file administrator. Specify passwords for stored files. This provides increased protection against unauthorized use of files. For details about logging on and logging off with administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator Authentication".
  • Page 699: Unlocking Files

    Specifying Access Permission for Stored Files Press [OK]. • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" Unlocking Files If you specify "Enhance File Protection", the file will be locked and become inaccessible if an invalid password is entered ten times.
  • Page 700 4. Protecting Document Data Information from Leaks...
  • Page 701: Protecting Information Transmitted Through The Network Or Stored On The Hard Disk From Leaks

    5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks This chapter describes how to protect information transmitted through the network or stored on the hard disk from unauthorized viewing and modification. Preventing Data Leaks Due to Unauthorized Transmission This section describes Preventing Data Leaks Due to Unauthorized Transmission.
  • Page 702 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Extended Security]. Press [On] for "Restrict Use of Destinations". If "Restrict Use of Destinations" is set to [On], "Restrict Adding of User Destinations" does not appear. Press [OK].
  • Page 703: Using S/Mime To Protect Email Transmission

    Using S/MIME to Protect Email Transmission Using S/MIME to Protect Email Transmission By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public key which prevents its content from being altered during transmission. You can also prevent sender impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic signature created with a private key.
  • Page 704 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks 2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the certificate is specified in the Address Book.) 3.
  • Page 705: Attaching An Electronic Signature

    Using S/MIME to Protect Email Transmission Specifying the Encryption Algorithm This can be specified by the network administrator. Open a Web browser. Enter "http://(the machine's IP address or host name)/" in the address bar. When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10"...
  • Page 706 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks 5. Using the public key, you can determine the authenticity of the attached electronic signature to see if the message has been altered. Configuration flow (self-signed certificate) 1.
  • Page 707 Using S/MIME to Protect Email Transmission Click [Configuration], and then click [Device Certificate] under "Security". Check the radio button next to the number of the certificate you want to create. Click [Create]. Make the necessary settings. Click [OK]. The setting is changed. Click [OK].
  • Page 708 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Click [OK]. "Requesting" appears for Certificate Status in the "Certificates" area. Click [Logout]. Apply to the certificate authority for the device certificate. The application procedure depends on the certificate authority. For details, contact the certificate authority.
  • Page 709 Using S/MIME to Protect Email Transmission Enter the details of the device certificate. In the Certificate Request box, enter the details of the device certificate received from the certificate authority. Click [OK]. "Installed" appears under [Certificate Status] to show that a device certificate for the machine has been installed.
  • Page 710 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Enter "http://(the machine's IP address or host name)/" in the address bar. When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10"...
  • Page 711: Protecting The Address Book

    Protecting the Address Book Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person masquerading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the Address Book. Address Book Access Permission This can be specified by the registered user.
  • Page 712: Encrypting Data In The Address Book

    5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Select the user who you want to assign access permission to, and then select the permission. Select the permission, from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit].
  • Page 713 Protecting the Address Book Press [Change] for "Encryption Key". Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt / Decrypt].
  • Page 714 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Press [Yes]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the Address Book may take a long time. The time it takes to encrypt the data in the Address Book depends on the number of registered users.
  • Page 715: Encrypting Data On The Hard Disk

    Encrypting Data on the Hard Disk Encrypting Data on the Hard Disk This can be specified by the machine administrator. For details about logging on and logging off with administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator Authentication". In order to use this function, the HDD Encryption Unit option is required.
  • Page 716 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks hours for the Type 3 / 4, or two hours for the Type 1 / 2. If both the erase-by-overwrite function and the encryption function are specified, encryption begins after the data that is stored on the hard disk has been overwritten and the machine has been rebooted using the [Off] - [On] procedure.
  • Page 717: Printing The Encryption Key

    Encrypting Data on the Hard Disk Press the [Start] key. The encryption key for backup data is printed. Press [OK]. Press [Exit]. Press [Exit]. Press the [User Tools/Counter] key. Turn off the power and the main power switch, and then turn the main power switch back For details about turning off the power, see "Turning On the Power", About This Machine.
  • Page 718: Updating The Encryption Key

    5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Press [Print Encryption Key]. Press the [Start] key. The encryption key for retrieving backup data is printed. Press [Exit]. Updating the Encryption Key You can update the encryption key and create a new key. Updates are possible when the machine is functioning normally.
  • Page 719: Canceling Data Encryption

    Encrypting Data on the Hard Disk Press [Update Encryption Key]. Select the data to be carried over to the hard disk and not be reset. To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings data, select [File System Data Only].
  • Page 720 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks • After completing this procedure on the machine's control panel, turn off the power and restart the machine to enable the new settings. Restarting can be slow when there is data to be carried over to the hard disk.
  • Page 721: Deleting Data On The Hard Disk

    Deleting Data on the Hard Disk Deleting Data on the Hard Disk This can be specified by the machine administrator. To use this function, the optional DataOverwriteSecurity Unit must be installed. The machine's hard disk stores all document data from the copier, printer, fax, and scanner functions. It also stores the data of users' document server and code counters, and the Address Book.
  • Page 722 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks This icon is lit when there is temporary data to be overwritten, and Dirty blinks during overwriting. Clear This icon is lit when there is no temporary data to be overwritten. •...
  • Page 723 Deleting Data on the Hard Disk • When Auto Erase Memory is set to [On], temporary data that remained on the hard disk when Auto Erase Memory was set to [Off] might not be overwritten. Press the [User Tools/Counter] key. Press [System Settings].
  • Page 724 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Enter the number of times that you want to overwrite using the number keys, and then press [ ]. Press [OK]. Auto Erase Memory is set. •...
  • Page 725 Deleting Data on the Hard Disk • To set Auto Erase Memory to [On] again, repeat the procedure in "Using Auto Erase Memory". • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" Types of Data that Can or Cannot Be Overwritten The following are the types of data that can or cannot be overwritten by "Auto Erase Memory".
  • Page 726: Erase All Memory

    5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Data stored in the Address Book can be encrypted for security. For details, see "Protecting the Address Book". • Counters stored under each user code •...
  • Page 727 Deleting Data on the Hard Disk Press [ Next] repeatedly until [Erase All Memory] appears. Press [Erase All Memory]. Select the method of overwriting. If you select [NSA] or [DoD], proceed to step 10. If you select [Random Numbers], proceed to step 8. For details about the methods of overwriting, see "Methods of Overwriting".
  • Page 728 5. Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks Press [Yes]. When overwriting is completed, press [Exit], and then turn off the main power. Before turning the power off, see "Turning On the Power", About This Machine. •...
  • Page 729: Managing Access To The Machine

    6. Managing Access to the Machine This chapter describes how to prevent unauthorized access to and modification of the machine's settings. Preventing Modification of Machine Settings This section describes Preventing Modification of Machine Settings. The administrator type determines which machine settings can be modified. Users cannot change the administrator settings.
  • Page 730 6. Managing Access to the Machine For a list of settings that users can specify according to the Menu Protect level, see "User Settings - Control Panel Settings", "User Settings - Web Image Monitor Settings". • p.23 "Administrators" • p.37 "Users" •...
  • Page 731: Menu Protect

    Menu Protect Menu Protect The administrator can also limit users' access permission to the machine's settings. The machine's [System Settings] menu and the printer's regular menus can be locked so they cannot be changed. This function is also effective when management is not based on user authentication. For a list of settings that users can specify according to the Menu Protect level, see "User Settings - Control Panel Settings", or "User Settings - Web Image Monitor Settings".
  • Page 732 6. Managing Access to the Machine Press [Administrator Tools]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the [User Tools/Counter] key. Fax Functions To specify [Menu Protect] in [Facsimile Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
  • Page 733 Menu Protect Press [Initial Settings]. Press [Menu Protect]. If the setting to be specified does not appear, press [ Next] to scroll down to other settings. Select the menu protect level, and then press [OK]. Press the [User Tools/Counter] key. Printer Functions To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
  • Page 734 6. Managing Access to the Machine Press [Printer Features]. Press [Maintenance]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the [User Tools/Counter] key. Scanner Functions To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
  • Page 735 Menu Protect Press [Scanner Features]. Press [Initial Settings]. Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the [User Tools/Counter] key.
  • Page 736: Limiting Available Functions

    6. Managing Access to the Machine Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Available Functions Specify the available functions from the copier, Document Server, fax, scanner, and printer functions. Specifying Which Functions are Available This can be specified by the user administrator.
  • Page 737 Limiting Available Functions • p.35 "Logging off Using Administrator Authentication"...
  • Page 738: Managing Log Files

    6. Managing Access to the Machine Managing Log Files 1. Log information To view the log, Web SmartDeviceMonitor Professional IS/Standard is required. The following log information is stored in the machine's memory and on its hard disk: • Job log Stores information about workflow related to user files, such as copying, printing, fax delivery, and scan file delivery.
  • Page 739 Managing Log Files Press the [User Tools/Counter] key. Press [System Settings]. Press [Administrator Tools]. Press [Transfer Log Setting]. If the setting to be specified does not appear, press [ Next] to scroll down to other settings. Press [Off]. Press [OK]. Press the [User Tools/Counter] key.
  • Page 740: Using Web Smartdevicemonitor Professional Is/Standard To Manage Log Files

    6. Managing Access to the Machine Press [Exit]. Press the [User Tools/Counter] key. Using Web SmartDeviceMonitor Professional IS/Standard to Manage Log Files For details about using Web SmartDeviceMonitor Professional IS/Standard to manage Log Files, see the manual supplied with the Using Web SmartDeviceMonitor Professional IS/Standard. Using Web Image Monitor to Manage Log Files This can be specified by the machine administrator.
  • Page 741 Managing Log Files Specify the recording levels for either "Job Log Collect Level" or "Access Log Collect Level". The settings shown for Job Log Collect Settings Listed by Function Type or Access Log Collect Settings Listed by Function Type vary depending on the collection level selected. If you change the setting in the list, the setting for "Job Log Collect Level"...
  • Page 742 6. Managing Access to the Machine Delete All Logs Follow steps 1 to 4 in "Specify Log Collect Settings". Click [Delete] under "Delete All Logs". Click [OK]. All job logs and device access log records are cleared. Click [Logout]. • On this page, "Delete All Logs" does not appear if either "Collect Job Logs" or "Collect Access Logs" are not set to [Active].
  • Page 743: Enhanced Network Security

    7. Enhanced Network Security This chapter describes how to increase security over the network using the machine's functions. Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Monitor to specify the network security level to prevent unauthorized access over the network and protect the Address Book, stored files, and default settings.
  • Page 744: Enabling/Disabling Protocols

    7. Enhanced Network Security Click [OK]. Access control is set. Click [Logout]. Enabling/Disabling Protocols This can be specified by the network administrator. Specify whether to enable or disable the function for each protocol. By making this setting, you can specify which protocols are available and so prevent unauthorized access over the network.
  • Page 745 Preventing Unauthorized Access Protocol Port Setting Method Disabled Condition Functions that require FTP cannot be used. • Web Image Monitor You can restrict • telnet personal information • SmartDeviceMonitor TCP:21 from being displayed by for Admin making settings on the •...
  • Page 746 7. Enhanced Network Security Protocol Port Setting Method Disabled Condition You can also make settings to require SSL transmission using the control panel or Web Image Monitor. • Control Panel • Web Image Monitor • telnet SMB printing functions TCP:139 •...
  • Page 747 Preventing Unauthorized Access Protocol Port Setting Method Disabled Condition Web Image Monitor, or telnet. Functions that require RSH and network TWAIN functions • Web Image Monitor cannot be used. • telnet You can restrict • SmartDeviceMonitor RSH/RCP TCP:514 personal information for Admin from being displayed by •...
  • Page 748 7. Enhanced Network Security Protocol Port Setting Method Disabled Condition Device discovery using • Web Image Monitor SSDP UDP:1900 UPnP from Windows • telnet cannot be used. • Web Image Monitor • telnet Bonjour functions • SmartDeviceMonitor Bonjour UDP:5353 cannot be used. for Admin •...
  • Page 749 Preventing Unauthorized Access Protocol Port Setting Method Disabled Condition • SmartDeviceMonitor for Admin • Web SmartDeviceMonitor • Web Image Monitor • telnet TCP:53001 WSD (Printer) functions • SmartDeviceMonitor WSD (Printer) cannot be used. (variable) for Admin • Web SmartDeviceMonitor • Web Image Monitor •...
  • Page 750 7. Enhanced Network Security Making Settings Using the Control Panel Press the [User Tools/Counter] key. Press [System Settings]. Press [Interface Settings]. Press [Effective Protocol]. Press [Inactive] for the protocol you want to disable. Press [OK]. Press the [User Tools/Counter] key. Making Settings Using Web Image Monitor Open a Web browser.
  • Page 751: Specifying Network Security Level

    Preventing Unauthorized Access Click [Configuration], and then click [Network Security] under "Security". Set the desired protocols to active/inactive (or open/close). Click [OK]. Click [OK]. Click [Logout]. • To disable SMTP from Web Image Monitor, specify a protocol other than SMTP as the mail receiving protocol.
  • Page 752 7. Enhanced Network Security Press [Network Security Level]. If the setting you want to specify does not appear, press [ Next] to scroll down to other settings. Select the network security level. Select [Level 0], [Level 1], or [Level 2]. Press [OK].
  • Page 753 Preventing Unauthorized Access Select the network security level in "Security Level". Click [OK]. Click [OK]. Click [Logout]. Status of Functions under each Network Security Level Tab Name:TCP/IP Function Level 0 Level 1 Level 2 TCP/IP Active Active Active HTTP> Port 80 Open Open Open...
  • Page 754 7. Enhanced Network Security Function Level 0 Level 1 Level 2 WSD (Device) Active Active Inactive WSD (Printer) Active Active Inactive WSD (Scanner) Active Active Inactive RHPP Active Active Inactive Tab Name:NetWare Function Level 0 Level 1 Level 2 NetWare Active Active Inactive...
  • Page 755: Encrypting Transmitted Passwords

    Encrypting Transmitted Passwords Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords from being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user authentication. Driver Encryption Key Encrypt the password transmitted when specifying user authentication.
  • Page 756 7. Enhanced Network Security For "Driver Encryption Key", press [Change]. "Driver Encryption Key" is one of the extended security functions. For details about this and other security functions, see "Specifying the Extended Security Functions". Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters.
  • Page 757: Group Password For Pdf Files

    Encrypting Transmitted Passwords Group Password for PDF files This can be specified by the machine administrator. On the machine, specify the group password for PDF files. By using a PDF group password, you can enhance security and so protect passwords from being analyzed. For details about logging on and logging off with administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator Authentication".
  • Page 758 7. Enhanced Network Security Enter the password, and then press [OK]. For [Confirm New Password], press [Enter]. Enter the password and press [OK]. Press [OK]. Press the [User Tools/Counter] key. • The machine administrator must give users the group password for PDF files that are already registered on the machine.
  • Page 759: Ipp Authentication Password

    Encrypting Transmitted Passwords • The group password for PDF files can also be specified using Web Image Monitor. For details, see Web Image Monitor Help. • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" IPP Authentication Password This can be specified by the network administrator.
  • Page 760: Protection Using Encryption

    7. Enhanced Network Security Protection Using Encryption Establish encrypted transmission on this machine using SSL, SNMPv3, and IPsec. By encrypting transmitted data and safeguarding the transmission route, you can prevent sent data from being intercepted, analyzed, and tampered with. SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator.
  • Page 761 Protection Using Encryption 2. The device certificate and public key are sent from the machine to the user's computer. 3. Create a shared key from the user's computer, and then encrypt it using the public key. 4. The encrypted shared key is sent to the machine. 5.
  • Page 762 7. Enhanced Network Security Enter "http://(the machine's IP address or host name)/" in the address bar. When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine. The top page of Web Image Monitor appears.
  • Page 763 Protection Using Encryption Click [Configuration], and then click [Device Certificate] under "Security". The "Device Certificate" page appears. Check the radio button next to the number of the certificate you want to request. Click [Request]. Make the necessary settings. Click [OK]. "Requesting"...
  • Page 764 7. Enhanced Network Security Click [Configuration], and then click [Device Certificate] under "Security". The "Device Certificate" page appears. Check the radio button next to the number of the certificate you want to install. Click [Install]. Enter the contents of the device certificate. In the "Certificate Request"...
  • Page 765: User Settings For Ssl (Secure Sockets Layer)

    Protection Using Encryption User Settings for SSL (Secure Sockets Layer) If you have installed a device certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user's computer. The network administrator must explain the procedure for installing the certificate to users. If a warning dialog box appears while accessing the machine using Web Image Monitor or IPP, start the Certificate Import Wizard and install a certificate.
  • Page 766 7. Enhanced Network Security Setting the SSL / TLS Encryption Mode This can be specified by the network administrator. After installing the device certificate, specify the SSL/TLS encrypted communication mode. By making this setting, you can change the security level. For details about logging on and logging off with administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator Authentication".
  • Page 767: Snmpv3 Encryption

    Protection Using Encryption • The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For details, see Web Image Monitor Help. • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" SNMPv3 Encryption This can be specified by the network administrator.
  • Page 768 7. Enhanced Network Security SNMPv3 Communication] on the machine. For details about specifying [Encryption Key] in SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin Help. • If network administrator's [Encryption Password] setting is not specified, the data for transmission may not be encrypted or sent. For details about specifying the network administrator's [Encryption Password] setting, see "Registering the Administrator".
  • Page 769: Transmission Using Ipsec

    Transmission Using IPsec Transmission Using IPsec This can be specified by the network administrator. For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key.
  • Page 770: Encryption Key Auto Exchange Settings And Encryption Key Manual Settings

    7. Enhanced Network Security • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. If you use the encryption key auto exchange method, the authentication algorithm and authentication key are specified automatically. AH Protocol The AH protocol provides secure transmission through authentication of packets only, including headers.
  • Page 771: Ipsec Settings

    Transmission Using IPsec Settings 1-4 and Default Setting Using either the manual or auto exchange method, you can configure four separate sets of SA details (such as different shared keys and IPsec algorithms). In the default settings of these sets, you can include settings that the fields of sets 1 to 4 cannot contain.
  • Page 772 7. Enhanced Network Security Security Level Security Level Features Since the data is sent in cleartext, data packets are vulnerable to eavesdropping attacks. Do not select this if you are exchanging sensitive information. Select this level if you want to encrypt the data packets as well as authenticate the transmission partner and prevent unauthorized Authentication and Low Level packet tampering.
  • Page 773 Transmission Using IPsec Authentication and Low Authentication and High Setting Authentication Only Level Encryption Level Encryption Phase 2 HMAC-MD5-96/ HMAC-MD5-96/ Authentication HMAC-SHA1-96 HMAC-SHA1-96 HMAC-SHA1-96 Algorithm DES/3DES/ Phase 2 Encryption Cleartext (NULL 3DES/AES-128/ AES-128/AES-192/ Algorithm encryption) AES-192/AES-256 AES-256 Phase 2 PFS Inactive Inactive Encryption Key Auto Exchange Setting Items...
  • Page 774 7. Enhanced Network Security Setting Description Setting Value • apply Security Policy Specify how IPsec is handled. • bypass • discarded • Transport • Tunnel (Tunnel beginning address - Tunnel ending address) Specify the encapsulation If you specify "Tunnel", you mode.
  • Page 775 Transmission Using IPsec Setting Description Setting Value Specify the encryption Phase 1 algorithm to be used in phase • DES Encryption Algorithm • 3DES (auto setting) Select the Diffie-Hellman group • 1 Phase 1 number used for IKE encryption • 2 key generation.
  • Page 776 7. Enhanced Network Security Setting Description Setting Value (auto setting) • 14 Specify the time period for Specify a period (in seconds) Phase 2 which the SA settings in phase from 300 (5min.) to 172800 Validity Period 2 are valid. (48 hrs.).
  • Page 777 Transmission Using IPsec Setting Description Setting Value the beginning point as you set in "Local Address". Specify the same value as your Any number between 256 and SPI (Output) transmission partner's SPI input 4095 value. Specify the same value as your Any number between 256 and SPI (Input) transmission partner's SPI...
  • Page 778: Encryption Key Auto Exchange Settings Configuration Flow

    7. Enhanced Network Security Setting Description Setting Value • AES-128 • AES-192 • AES-256 Specify a value within the ranges shown below, according to the encryption algorithm. hexadecimal value 0-9, a-f, A-F • DES, set 16 digits • 3DES, set 48 digits •...
  • Page 779 Transmission Using IPsec BBD004S • To use a certificate to authenticate the transmission partner in encryption key auto exchange settings, a device certificate must be installed. • After configuring IPsec, you can use "Ping" command to check if the connection is established correctly. However, you cannot use "Ping"...
  • Page 780 7. Enhanced Network Security Click [Edit] under "Encryption Key Auto Exchange Settings". Make encryption key auto exchange settings in [Settings 1]. If you want to make multiple settings, select the settings number and add settings. Click [OK]. Select [Active] for "IPsec". Set "Exclude HTTPS Transmission"...
  • Page 781 Transmission Using IPsec Click [OK]. Click [Logout]. Specifying IPsec Settings on the Computer Specify exactly the same settings for IPsec SA settings on your computer as are specified by the machine's security level on the machine. Setting methods differ according to the computer's operating system. The example procedure shown here uses Windows XP when the Authentication and Low Level Encryption Security level is selected.
  • Page 782 7. Enhanced Network Security If you select "Certificate" for authentication method in Encryption Key Auto Exchange Settings on the machine, specify the device certificate. If you select PSK, enter the same PSK text specified on the machine with the pre-shared key. Click [Add] in the IP Filter List.
  • Page 783: Encryption Key Manual Settings Configuration Flow

    Transmission Using IPsec • If you specify the "Authentication and High Level Encryption" security level in encryption key auto exchange settings, also select the "Master key perfect forward secrecy (PFS)" check box in the Security Filter Properties screen (which appears in step 29). If using PFS in Windows XP, the PFS group number used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in step 11).
  • Page 784: Telnet Setting Commands

    7. Enhanced Network Security Open a Web browser. Enter "http://(the machine's IP address or host name)/" in the address bar. When entering an IPv4 address, do not begin segments with zeros. For example: If the address is "192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine. The top page of Web Image Monitor appears.
  • Page 785 Transmission Using IPsec Displays the following IPsec settings information: • IPsec shared settings values • Encryption key manual settings, SA setting 1-4 values • Encryption key manual settings, default setting values • Encryption key auto exchange settings, IKE setting 1-4 values •...
  • Page 786 7. Enhanced Network Security • To display the settings 1-4, specify the number [1-4]. • To display the default setting, specify [default]. • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the setting number [1-4]. •...
  • Page 787 Transmission Using IPsec • Not specifying an encapsulation mode displays the current setting. Tunnel end point setting msh> ipsec manual {1|2|3|4|default} tunneladdar beginning IP address ending IP address • Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning and ending IP address.
  • Page 788 7. Enhanced Network Security • To display the settings 1-4, specify the number [1-4]. • To display the default setting, specify [default]. • Not specifying any value displays all of the settings. Disable settings msh> ipsec manual {1|2|3|4|default} disable • To disable the settings 1-4, specify the number [1-4]. •...
  • Page 789 Transmission Using IPsec • If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify [use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec transmission is performed. •...
  • Page 790 7. Enhanced Network Security • Not specifying the hash algorithm displays the current setting. ISAKMP SA (phase 1) encryption algorithm setting msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des} • Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) encryption algorithm.
  • Page 791 Transmission Using IPsec IPsec SA (phase 2) PFS setting msh> ipsec ike {1|2|3|4|default} ph2 pfs {none|1|2|14} • Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) Diffie- Hellman group number. • Specify the group number to be used. •...
  • Page 792: Authentication By Telnet

    7. Enhanced Network Security Authentication by telnet This section explains Authentication by telnet. When using telnet, the default login name for administrator login is "admin" and the password is blank. For details on how to login to telnet, see "Using telnet", Network Guide.
  • Page 793: Authentication By Ieee802.1X

    Authentication by IEEE802.1X Authentication by IEEE802.1X IEEE802.1X enables authentication in an Ethernet or wireless LAN environment. For details, see "Interface Settings", Network and System Settings Guide.
  • Page 794 7. Enhanced Network Security...
  • Page 795: Specifying The Extended Security Functions

    8. Specifying the Extended Security Functions This chapter describes the machine's extended security features and how to specify them. Specifying the Extended Security Functions In addition to providing basic security through user authentication and administrator specified access limits on the machine, security can also be increased by encrypting transmitted data and data in the Address Book.
  • Page 796: Settings

    8. Specifying the Extended Security Functions Press the setting you want to change, and change the setting. Press [OK]. Press the [User Tools/Counter] key. Settings Default settings are shown in bold type. Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication.
  • Page 797 Specifying the Extended Security Functions Restrict Adding of User Destinations This can be specified by the user administrator. When "Restrict Use of Destinations" is set to [Off], after entering a fax or scanner destination directly, you can register it in the Address Book by pressing [Program Dest.]. If [On] is selected for this setting, [Program Dest.] does not appear.
  • Page 798 8. Specifying the Extended Security Functions • Do not Prohibit Restrict Use of Simple Encryption This can be specified by the network administrator. When a sophisticated encryption method cannot be enabled, simple encryption will be applied. For example, when using User Management Tool and Address Management in Smart Device Monitor for Admin to edit the Address Book, or DeskTopBinder and ScanRouter delivery software and SSL/TLS cannot be enabled, make this setting [Off] to enable simple encryption.
  • Page 799: Update Firmware

    Specifying the Extended Security Functions Even if you select [Login Privilege] and log on to the machine, you cannot cancel a copy or print job in progress if you are not authorized to use the copy and printer functions. You can specify [Authenticate Current Job] only if [User Authentication Management] was specified. •...
  • Page 800 8. Specifying the Extended Security Functions Specify whether to prevent changes in the machine's firmware structure. The Change Firmware Structure function detects when the SD card is inserted, removed or replaced. If you select [Prohibit], the machine stops during startup when a firmware structure change is detected and a message requesting administrator login is displayed.
  • Page 801: Other Security Functions

    Other Security Functions Other Security Functions This section explains settings for preventing information leaks, and functions that you can restrict to further increase security. Fax Function Not Displaying Destinations and Senders in Reports and Lists In [Facsimile Features], you can specify whether to display destinations and sender names by setting "Switch 4, Bit No.
  • Page 802 8. Specifying the Extended Security Functions WSD scanner function WSD scanner function is automatically disabled when user authentication is specified. Even if automatically disabled, it can be enabled from the initial settings available in the Web Image Monitor. For instructions on how to configure this function, see "Before Sending Scan Files Using WSD", Scanner Reference.
  • Page 803: Limiting Machine Operation To Customers Only

    Limiting Machine Operation to Customers Only Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator authentication. The machine can be set to prohibit operation without administrator authentication and also prohibit remote registration in the Address Book by a service representative.
  • Page 804: Canceling Service Mode Lock

    8. Specifying the Extended Security Functions Press [On], and then press [OK]. A confirmation message appears. Press [Yes]. Press the [User Tools/Counter] key. • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication" Canceling Service Mode Lock For a service representative to carry out inspection or repair in service mode, the machine administrator must log on to the machine and cancel the service mode lock.
  • Page 805 Limiting Machine Operation to Customers Only Press [Off], and then press [OK]. Press the [User Tools/Counter] key. The service representative can switch to service mode. • p.34 "Logging on Using Administrator Authentication" • p.35 "Logging off Using Administrator Authentication"...
  • Page 806: Additional Information Enhanced Security

    8. Specifying the Extended Security Functions Additional Information Enhanced Security This section explains the settings and their setting values for secure operation of this machine. Settings to configure using the Control panel You can use the control panel to configure the settings shown in the table below. When you first begin operating the machine, specify the values shown in the table.
  • Page 807 Additional Information Enhanced Security Feature Setting Menu Settings Setting Value System Settings Administrator Extended Security/ Tools Settings by SNMPv1 Prohibit and v2 System Settings Administrator Extended Security / Tools Restrict Use of Simple Encryption System Settings Administrator Extended Security / Tools Authenticate Current Access Privilege...
  • Page 808: Settings To Configure Using Web Image Monitor

    8. Specifying the Extended Security Functions • For Basic Authentication settings, see "Basic Authentication". • For Administrator Authentication settings, see "Enabling Administrator Authentication". • For the Extended Security settings, see "Specifying the Extended Security Functions". • For Network Security Level settings, see "Preventing Unauthorized Access". •...
  • Page 809: Settings When Ipsec Is Available / Unavailable

    Additional Information Enhanced Security Category Settings Setting Value If you select [Active], select Lockout Release Time of at least 60 minutes. Security / User Lockout Policy Lock Out User for If you select [Lockout Release Timer] select Lockout Release Time of at least 60 minutes. Settings when IPsec is available / unavailable IPsec encrypts all network transmissions.
  • Page 810 8. Specifying the Extended Security Functions Category Settings Setting Value Security / IPsec Encryption Key Auto Authentication and High Level Encryption Exchange Settings / Security Level *1 You can configure "Permit SSL/TLS Communication" using Control panel. Settings when IPsec is not available If IPsec is not available on your network, we recommend you configure the settings shown in the following table.
  • Page 811 Additional Information Enhanced Security When sending faxes, specify destinations by fax number, Internet Fax destination, e-mail address, or folder destination. Do not specify destinations by IP-Fax destination. For details about specifying the destination for a facsimile, see "Specifying a Destination", Facsimile Reference. •...
  • Page 812 8. Specifying the Extended Security Functions...
  • Page 813: Troubleshooting

    9. Troubleshooting This chapter describes what to do if the machine does not function properly. Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication.
  • Page 814 9. Troubleshooting Messages Cause Solutions "Failed to obtain URL." The machine cannot connect to Make sure the server's settings, the server or cannot establish such as the IP address and host communication. name, are specified correctly on the machine. Make sure the host name of the UA Server is specified correctly.
  • Page 815: Authentication Does Not Work Properly

    Authentication Does Not Work Properly Messages Cause Solutions "Administrator Authentication for Admin. Authentication is not To specify Basic Authentication, User Management must be set to configured under "Administrator Windows Authentication, LDAP on before this selection can be Authentication Management". Authentication, or Integration made."...
  • Page 816 9. Troubleshooting Basic Authentication Error Code Cause Solution Make sure no other user is A TWAIN operation occurred B0103-000 logged on to the machine, and during authentication. then try again. 1. A password error occurred. Make sure the password is entered correctly.
  • Page 817 Authentication Does Not Work Properly Error Code Cause Solution If the account name was entered incorrectly, enter it correctly and log in again. An authentication error occurred because the Address Wait a few minutes and then try B0207-001 Book is being used at another again.
  • Page 818 9. Troubleshooting Error Code Cause Solution The user attempted Only the administrator has authentication from an login privileges on this screen. application on the "System W0206-002 Settings" screen, where only Log in as a general user from the administrator has the application's login screen.
  • Page 819 Authentication Does Not Work Properly Error Code Cause Solution Make sure that the user is 2. A login name or password registered on the server. W0406-104 error occurred. Use a registered login user name and password. Make sure that the Windows 3.
  • Page 820 9. Troubleshooting Error Code Cause Solution If you are using a Windows firewall, open "Network Connection Properties". Then click detail settings, Windows firewall settings, permit exceptions settings. Click the exceptions tab and specify numbers 137, 139 as the exceptions. In "Network Connection" properties, open TCP/IP properties.
  • Page 821 Authentication Does Not Work Properly Error Code Cause Solution 4. Kerberos authentication will fail if automatic retrieval for KDC fails. Ask your service representative to make sure the KDC retrieval settings are set to "automatic retrieval". If automatic retrieval is not functioning properly, switch to manual retrieval.
  • Page 822 9. Troubleshooting Error Code Cause Solution Make sure that DNS/WINS is The domain name cannot be W0400-106 specified in the domain name in resolved. "Interface Settings". Due to the high number of Wait a few minutes and then try W0400-200 authentication attempts, all again.
  • Page 823 Authentication Does Not Work Properly Error Code Cause Solution Authentication failed because Do not use "other", "admin", the user name contains W0606-004 "supervisor" or "HIDE*" in language that cannot be used general user accounts. by general users. Authentication failed because no more users can be Ask the user administrator to W0612-005...
  • Page 824 9. Troubleshooting Error Code Cause Solution A login user name was not Set the DeskTopBinder login L0105-000 specified but a DeskTopBinder user name correctly. operation was performed. A user attempted Only the administrator has authentication from an login privileges on this screen. application on the "System L0206-002 Settings"...
  • Page 825 Authentication Does Not Work Properly Error Code Cause Solution Change the LDAP server Authentication is disabled in the L0406-201 settings in administrator tools, in LDAP server settings. "System Settings". 1. Make sure that a connection test is successful with the current LDAP server configuration.
  • Page 826 9. Troubleshooting Error Code Cause Solution To allow blank passwords, contact your service representative. 2. In simple authentication mode, the DN of the login user name is obtained in the user account. Authentication fails if the DN cannot be obtained. Make sure there are no errors in the server name, login user name/password, or...
  • Page 827 Authentication Does Not Work Properly Error Code Cause Solution Make sure the login name attribute is specified correctly. Recreate the account if the An authentication error account name contains any of occurred because the user these prohibited characters. L0406-003 name contains a space, colon If the account name was (:), or quotation mark (").
  • Page 828 9. Troubleshooting Error Code Cause Solution Book is being used at another location. Integration Server Authentication Error Code Cause Solution Make sure no other user is A TWAIN operation occurred I0103-000 logged on to the machine, and during authentication. then try again. 1.
  • Page 829 Authentication Does Not Work Properly Error Code Cause Solution If the account name was entered incorrectly, enter it correctly and log in again. An authentication error occurred because the Address Wait a few minutes and then try I0207-001 Book is being used at another again.
  • Page 830: Machine Cannot Be Operated

    9. Troubleshooting Error Code Cause Solution machine. (Names are 2. If the authentication server distinguished by the unique has just been changed, delete attribute specified in the LDAP the old name on the server. authentication settings.) An authentication error occurred because the Address Wait a few minutes and then try I0607-001 Book is being used at another...
  • Page 831 Authentication Does Not Work Properly Condition Cause Solution Confirm with the user administrator if using basic authentication. Cannot perform the following: The encryption key specified in Specify the driver encryption key the driver does not match the registered in the machine. •...
  • Page 832 9. Troubleshooting Condition Cause Solution Authentication/Encryption] in Alternatively, "SSL/TLS" has Alternatively, enable "SSL/TLS", DeskTopBinder. been enabled although the install the server certificate in the required certificate is not installed machine, and then install the in the computer. certificate in the computer. See "Setting the SSL / TLS Encryption Mode".
  • Page 833 Authentication Does Not Work Properly Condition Cause Solution User authentication is enabled, User authentication may have Re-enable user authentication, yet destinations specified using been disabled while [All Users] is and then enable [All Users] for the machine do not appear. not specified.
  • Page 834 9. Troubleshooting...
  • Page 835: 10. Appendix

    10. Appendix Supervisor Operations The supervisor can delete an administrator's password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the supervisor's user name and password, you cannot use normal functions or specify defaults.
  • Page 836: Logging Off As The Supervisor

    10. Appendix Logging off as the Supervisor If administrator authentication has been specified, be sure to log off after completing settings. This section describes how to log off after completing settings. Press the [Login/Logout] key. Press [Yes]. Changing the Supervisor This section describes how to change the supervisor's login name and password.
  • Page 837: Resetting An Administrator's Password

    Supervisor Operations Press [Change] for the login user name. Enter the login user name, and then press [OK]. Press [Change] for the login password. Enter the login password, and then press [OK]. You will be automatically logged off. If a password reentry screen appears, enter the login password, and then press [OK]. Press [OK] twice.
  • Page 838 10. Appendix Press [Change] for the administrator you wish to reset. Press [Change] for the login password. Enter the login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK]. Press [OK] twice. Press the [User Tools/Counter] key.
  • Page 839: Machine Administrator Settings

    Machine Administrator Settings Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. General Features All the settings can be specified. Tray Paper Settings All the settings can be specified. Timer Settings All the settings can be specified.
  • Page 840 10. Appendix User Name E-mail Address Password • Reception Protocol • POP3 / IMAP4 Settings Server Name Encryption Connection Test • Administrator's E-mail Address • Default User Name / Password (Send) SMB User Name / SMB Password FTP User Name / FTP Password NCP User Name / NCP Password •...
  • Page 841 Machine Administrator Settings You can specify which authentication to use. You can also edit the settings for each function. • Enhanced Authentication Management • Administrator Authentication Management Machine Management • Program / Change Administrator Machine Administrator • Key Counter Management •...
  • Page 842 10. Appendix • Energy Saver Level • Service Mode Lock • Delete All Logs • Auto Erase Memory Setting *1 • Erase All Memory *1 • Transfer Log Setting • Data Security for Copying *2 • Fixed USB Port • Machine Data Encryption Settings *3 *1 The DataOverwriteSecurity Unit option must be installed.
  • Page 843 Machine Administrator Settings General Settings All the settings can be specified. Scan Settings All the settings can be specified. Send Settings The following settings can be specified. • Program / Change / Delete Standard Message • Memory File Transfer • Backup File TX Setting Reception Settings The following settings can be specified.
  • Page 844 10. Appendix • Program Memory Lock ID • Internet Fax Setting • Select Dial/Push Phone • Program Fax Information • Menu Protect • E-mail Setting • Folder Setting Printer Features The following settings can be specified. List / Test Print All the settings can be specified.
  • Page 845 Machine Administrator Settings • Letterhead Setting • Bypass Tray Setting Priority • Edge to Edge Print • Default Printer Language • Tray Switching • Extended Auto Tray Switching Host Interface All the settings can be specified. PCL Menu All the settings can be specified. PS Menu *2 All the settings can be specified.
  • Page 846 10. Appendix Settings via Web Image Monitor The following settings can be specified. Home • Reset Device • Reset Printer Job Device Settings • System Spool Printing Protect Printer Display Panel Print Priority Function Reset Timer Permit Firmware Update Permit Firmware Structure Change Display IP Address on Device Display Panel Output Tray Paper Tray Priority...
  • Page 847 Machine Administrator Settings • File Transfer All the settings can be specified. • User Authentication Management All the settings can be specified. • Administrator Authentication Management Machine Administrator Authentication Available Settings for Machine Administrator • Program/Change Administrator You can specify the following administrator settings as the machine administrator. Login User Name Login Password Encryption Password...
  • Page 848 10. Appendix • Virtual Printer Settings All the settings can be specified. • PDF Group Password *1 All the settings can be specified. • PDF Fixed Password *1 All the settings can be specified. *1 The PostScript 3 Unit option must be installed. •...
  • Page 849 Machine Administrator Settings Security • User Lockout Policy All the settings can be specified. RC Gate • Set up RC Gate Request No. Update RC Gate Firmware • Remote Communication Gate Proxy Server Webpage • Download Help File Extended Feature Settings •...
  • Page 850: Network Administrator Settings

    10. Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. Interface Settings If DHCP is set to On, the settings that are automatically obtained via DHCP cannot be specified. •...
  • Page 851 Network Administrator Settings Network Administrator • Extended Security Driver Encryption Key Settings by SNMP V1 and V2 Restrict Use of Simple Encryption • Network Security Level Facsimile Features The following settings can be specified. Send Settings • Max. E-mail Size Initial Settings •...
  • Page 852 10. Appendix • E-mail Reception SMTP E-mail Communication Port • Auto E-mail Notification Groups to notify • Administrator Authentication Management Network Administrator Authentication Available Settings for Network Administrator • Program/Change Administrator You can specify the following administrator settings for the network administrator. Login User Name Login Password Encryption Password...
  • Page 853 Network Administrator Settings SSID Channel Security Method WEP Authentication WEP Key Number WEP Key WPA Encryption Method WPA Authentication Method WPA-PSK/WPA2-PSK • Bluetooth *1 Operation Mode *1 The Bluetooth interface unit option must be installed. Network • IPv4 All the settings can be specified. •...
  • Page 854 10. Appendix All the settings can be specified. • Access Control All the settings can be specified. • IPP Authentication All the settings can be specified. • SSL/TLS All the settings can be specified. • ssh All the settings can be specified. •...
  • Page 855: File Administrator Settings

    File Administrator Settings File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. Administrator Tools • Address Book Management Search Switch Title • Address Book: Program / Change / Delete Group Search Switch Title •...
  • Page 856 10. Appendix • Delete All Stored Print Jobs System • Auto Delete Temporary Print Jobs • Auto Delete Stored Print Jobs Settings via Web Image Monitor The following settings can be specified. Document Server All the settings can be specified. Printer: Print Jobs The file administrator can Edit/Delete the Print Job List and Unlock the print job.
  • Page 857: User Administrator Settings

    User Administrator Settings User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. Administrator Tools • Address Book Management • Address Book: Program / Change / Delete Group •...
  • Page 858 10. Appendix Device Settings • Auto E-mail Notification Groups to notify • Administrator Authentication Management User Administrator Authentication Available Settings for User Administrator • Program/Change Administrator You can specify the following administrator settings for the user administrator. Login User Name Login Password Encryption Password Webpage...
  • Page 859: Document Server File Permissions

    Document Server File Permissions Document Server File Permissions The authorities for using the files stored in Document Server are as follows. The authority designations in the list indicate users with the following authorities. • Read-only This is a user assigned "Read-only" authority. •...
  • Page 860 10. Appendix Full File Settings Read-only Edit Edit / Delete Owner Control Admin. Unlocking Files *1 This setting can be specified by the owner.
  • Page 861 The Privilege for User Account Settings in the Address Book The Privilege for User Account Settings in the Address Book The authorities for using the Address Book are as follows: The authority designations in the list indicate users with the following authorities. •...
  • Page 862 10. Appendix Read- Edit / Edit Full Registere User only Delete Settings Control d User Admin. (User) (User) (User) Login Password SMTP Authentication Folder Authentication LDAP Authentication Available Functions *1 You can only enter the password. Tab Name: Protection Read- Edit / Edit Full...
  • Page 863 The Privilege for User Account Settings in the Address Book Read- Edit / Edit Full Register only Delete Settings User Admin. Control ed User (User) (User) (User) International TX Mode Fax Header Label Insertion Tab Name: E-mail Address Read- Edit / Edit Full Registere...
  • Page 864: User Settings - Control Panel Settings

    10. Appendix User Settings - Control Panel Settings This section displays the user settings that can be specified on the machine when user authentication is specified. Settings that can be specified by the user vary according to the menu protect level and available settings specifications.
  • Page 865: Copier / Document Server Features

    Copier / Document Server Features Copier / Document Server Features If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. •...
  • Page 866 10. Appendix Reproduction Ratio Settings Level 1 Level 2 Shortcut Reduce/Enlarge Reproduction Ratio Reduce/Enlarge Ratio Priority Ratio for Create Margin Edit Settings Level 1 Level 2 Front Margin: Left / Right Back Margin: Left / Right Front Margin: Top / Bottom Back Margin: Top / Bottom 1 Sided 2 Sided Auto Margin: T to T...
  • Page 867 Copier / Document Server Features Stamp Background Numbering Settings Level 1 Level 2 Size Density Stamp Colour Preset Stamp Settings Level 1 Level 2 Stamp Language Stamp Priority Stamp Format: COPY*1 Stamp Format: URGENT*1 Stamp Format: PRIORITY*1 Stamp Format: For Your Info.*1 Stamp Format: PRELIMINARY*1 Stamp Format: For Internal Use Only*1 Stamp Format: CONFIDENTIAL*1...
  • Page 868 10. Appendix Settings Level 1 Level 2 Stamp Colour: DRAFT *1 The print position can be adjusted but not specified. User Stamp Settings Level 1 Level 2 Program / Delete Stamp Stamp Format: 1 Stamp Format: 2 Stamp Format: 3 Stamp Format: 4 Stamp Colour: 1 Stamp Colour: 2...
  • Page 869 Copier / Document Server Features Settings Level 1 Level 2 Stamp Format Font Size Duplex Back Page Stamping Position Page Numbering in Combine Stamp on Designating Slip Sheet Stamp Position: P1, P2...*1 Stamp Position: 1/5, 2/5... *1 Stamp Position: -1-, -2-...*1 Stamp Position: P.1, P.2...*1 Stamp Position: 1, 2...*1 Stamp Position: 1-1, 1-2...*1...
  • Page 870 10. Appendix Settings Level 1 Level 2 Simplified Screen: Finishing Types Adjust Colour Image Settings Level 1 Level 2 Background Density of ADS (Full Colour / Two- colour) Colour Sensitivity A.C.S Sensitivity A.C.S Priority...
  • Page 871: Printer Functions

    Printer Functions Printer Functions If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available.
  • Page 872 10. Appendix Printer Features If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available.
  • Page 873 Printer Features Settings Level 1 Level 2 4 Colour Graphic Mode System Settings Level 1 Level 2 Print Error Report Auto Continue Memory Overflow Error Display Setting Job Separation Rotate by 180 Degrees Auto Delete Temporary Print Jobs Auto Delete Stored Print Jobs Initial Print Job List Memory Usage Duplex...
  • Page 874 10. Appendix Settings Level 1 Level 2 Tray Switching Extended Auto Tray Switching Host Interface Settings Level 1 Level 2 I/O Buffer I/O Timeout PCL Menu Settings Level 1 Level 2 Orientation Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font...
  • Page 875 Printer Features Settings Level 1 Level 2 Data Format Resolution Colour Setting Colour Profile Process Colour Model *1 The PostScript 3 Unit option must be installed. PDF Menu *1 Settings Level 1 Level 2 Change PDF Password PDF Group Password Resolution Colour Setting Colour Profile...
  • Page 876 10. Appendix Scanner Features If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available.
  • Page 877 Scanner Features Settings Level 1 Level 2 Background Density of ADS (Full Colour) Send Settings Settings Level 1 Level 2 Compression (Black & White) Compression (Gray Scale / Full Colour) High Compression PDF Level Insert Additional E-mail Info No. of Digits for Single Page Files Stored File E-mail Method...
  • Page 878 10. Appendix Facsimile Features If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available.
  • Page 879 Facsimile Features Settings Level 1 Level 2 Program/Change/Delete Standard Message Memory File Transfer Backup File TX Setting Reception Settings Settings Level 1 Level 2 Switch Reception Mode Reception Mode Auto Switch Time Reception Mode Timer Switch Program Special Sender Program Special Sender: Print List Forwarding Reception File Setting Stored Reception File User Setting...
  • Page 880 10. Appendix Initial Settings Settings Level 1 Level 2 Parameter Setting Parameter Setting: Print List Program Closed Network Code Program Memory Lock ID Internet Fax Settings Select Dial/Push Phone Program Fax Information Enable H.323 Enable SIP H.323 Settings SIP Settings Program/Change/Delete Gateway E-mail Setting Folder Setting...
  • Page 881 System Settings System Settings When administrator authentication has been specified, the settings available to the user depend on whether or not Available Settings has been specified. • Abbreviations in the table heads A = Authorized user when Available Settings have not been specified. B = Authorized user when Available Settings have been specified.
  • Page 882 10. Appendix Tray Paper Settings Settings Paper Tray Priority: Copier Paper Tray Priority: Facsimile Paper Tray Priority: Printer Tray Paper Size: Tray 1-4 Printer Bypass Paper Size Paper Type: Bypass Tray Paper Type: Tray 1-4 Paper Type: LCT Cover Sheet Tray Slip Sheet Tray Timer Settings Settings...
  • Page 883 System Settings Interface Settings Settings Print List Network Settings Machine IPv4 Address*1 IPv4 Gateway Address IPv6 Stateless Address Autoconfiguration DNS Configuration*1 DDNS Configuration IPsec Domain Name*1 WINS Configuration*1 Effective Protocol NCP Delivery Protocol NW Frame Type SMB Computer Name SMB Work Group Ethernet Speed IEEE 802.1X Authentication For Ethernet Restore IEEE 802.1X Authentication to Defaults...
  • Page 884 10. Appendix Settings Host Name Machine Name *1 If you select [Auto-Obtain (DHCP)], you can only read the setting. Parallel Interface *2 Settings Parallel Timing Parallel Communication Speed Selection Signal Status Input Prime Bidirectional Communication Signal Control *2 The IEEE 1284 interface board option must be installed. Wireless LAN *3 Settings Communication Mode...
  • Page 885 System Settings Settings Capture server IP Address *5 Fax RX File Transmission SMTP Server SMTP Authentication*6 POP before SMTP Reception Protocol POP3 / IMAP4 Settings Administrator's E-mail Address E-mail Communication Port E-mail Reception Interval Max. Reception E-mail Size E-mail Storage in Server Default User Name / Password (Send)*6 Program / Change / Delete E-mail Message Auto Specify Sender name...
  • Page 886 10. Appendix Settings Address Book: Program / Change / Delete Group Address Book: Change Order Print Address Book: Destination List Address Book: Edit Title Address Book: Switch Title Back Up / Restore Address Book Display / Print Counter Display / Clear / Print Counter per User User Authentication Management Enhanced Authentication Management Administrator Authentication Management...
  • Page 887 System Settings Settings Network Security Level Auto Erase Memory Setting *8 Erase All Memory *8 Delete All Logs Transfer log Setting Data Security for copying *9 Fixed USB Port *7 Only the password can be specified. *8 The DataOverwriteSecurity Unit option must be installed. *9 The Copy Data Security Unit option must be installed.
  • Page 888: User Settings - Web Image Monitor Settings

    10. Appendix User Settings - Web Image Monitor Settings This section displays the user settings that can be specified on Web Image Monitor when user authentication is specified. Settings that can be specified by the user vary according to the menu protect level and available settings specifications.
  • Page 889: Device Settings

    Device Settings Device Settings When administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. • Abbreviations in the table heads A = Authorized user when Available functions have not been specified. B = Authorized user when Available functions have been specified.
  • Page 890 10. Appendix Settings Slip Sheet Tray : Tray to set Slip Sheet Tray : Apply Duplex Slip Sheet Tray : Display Time Paper Settings Tray1 : Paper Type Tray1 : Paper Thickness Tray1 : Apply Auto Paper Select Tray1 : Apply Duplex Tray2 : Paper Size Tray2 : Paper Type Tray2 : Paper Thickness...
  • Page 891 Device Settings Settings Large Capacity Tray : Paper Type Large Capacity Tray : Paper Thickness Large Capacity Tray : Apply Auto Paper Select Large Capacity Tray : Apply Duplex Bypass Tray : Paper Size Bypass Tray : Custom Paper Size Bypass Tray : Paper Type Bypass Tray : Paper Thickness Date/Time...
  • Page 892 10. Appendix Settings Printer Auto Reset Timer Auto Logout Timer Logs Settings Collect Job Logs Job Log Collect Level Collect Access Logs Access Log Collect Level Transfer Logs Encrypt Logs Classification Code Delete All Logs E-mail Settings Administrator E-mail Address Reception Protocol E-mail Reception Interval Max.
  • Page 893 Device Settings Settings SMTP Auth. Password SMTP Auth. Encryption POP before SMTP POP E-mail Address POP User Name POP Password Timeout setting after POP Auth. POP3/IMAP4 Server Name POP3/IMAP4 Encryption POP3 Reception Port No. IMAP4 Reception Port No. Fax E-mail Address Receive Fax E-mail Fax E-mail User Name Fax E-mail Password...
  • Page 894 10. Appendix Settings Out of Toner Toner Almost Empty Paper Misfeed Cover Open Out of Paper Almost Out of Paper Paper Tray Error Output Tray Full Unit Connection Error Duplex Unit Error Waste Toner Bottle is Full Waste Toner Bottle is Almost Full Add Staple Hole Punch Receptacle is Full File Storage Memory Full Soon...
  • Page 895 Device Settings Settings Restriction to Device Status Info. Receivable E-mail Address/Domain Name Language...
  • Page 896 10. Appendix Printer If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available. R (Read) = Reading only.
  • Page 897 Printer Settings Level 1 Level 2 Sub Paper Size Page Size Letterhead Setting Bypass Tray Setting Priority Edge to Edge Print Default Printer Language Tray Switching Extended Auto Tray Switching Virtual Printer Host Interface Settings Level 1 Level 2 I/O Buffer I/O Timeout PCL Menu Settings...
  • Page 898 10. Appendix Settings Level 1 Level 2 Append CR to LF Resolution PS Menu*1 Settings Level 1 Level 2 Job Timeout Wait Timeout Data Format Resolution Color Setting Color Profile Process Color Model *1 The PostScript 3 Unit option must be installed. PDF Menu *1 Settings Level 1...
  • Page 899 Printer PDF Temporary Password *1 Settings Level 1 Level 2 PDF Temporary Password Confirm Password *1 The PostScript 3 Unit option must be installed. PDF Group Password *1 Settings Level 1 Level 2 Current PDF Group Password New PDF Group Password Confirm PDF Group Password *1 The PostScript 3 Unit option must be installed.
  • Page 900 10. Appendix Scanner If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available. R (Read) = Reading only.
  • Page 901 Scanner Send Settings Settings Level 1 Level 2 Compression (Black & White) Compression (Gray Scale/Full Color) High Compression PDF Level Max. E-mail Size Divide & Send E-mail Insert Additional E-mail Info No. of Digits for Single Page Files Stored File E-mail Method Default Settings for Normal Screens on Device Settings Level 1...
  • Page 902 10. Appendix If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. • Abbreviations in the table columns R/W (Read and Write) = Both reading and modifying the setting are available. R (Read) = Reading only.
  • Page 903 Settings Level 1 Level 2 Checkered Mark Centre Mark Print Reception Time Reception File Print Quantity Paper Tray Memory Lock Reception IP-Fax Settings Settings Level 1 Level 2 Enable H.323 Enable IP-Fax Gatekeeper Gatekeeper Address (Main) Gatekeeper Address (Sub) Own Fax No. Enable SIP Enable Server User Name...
  • Page 904 10. Appendix IP-Fax Gateway Settings Settings Level 1 Level 2 Prefix 1-50 Select Protocol 1-50 Gateway Address 1-50 Parameter Settings Settings Level 1 Level 2 Just Size Printing Combine 2 Originals Convert to PDF When Transferring to Folder Journal Immediate Transmission Result Report Communication Result Report Memory Storage Report SEP Code RX Result Report...
  • Page 905 Interface Interface When administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. • Abbreviations in the table heads A = Authorized user when Available functions have not been specified. B = Authorized user when Available functions have been specified.
  • Page 906 10. Appendix Settings MAC Address Available Wireless LAN Communication Mode SSID Channel Security Method WEP Authentication WEP Key Number WEP Key WPA Encryption Method WPA Authentication Method WPA-PSK/WPA2-PSK WPA/WPA2 Settings *2 The Wireless LAN interface unit option must be installed.
  • Page 907: Network

    Network Network When administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. • Abbreviations in the table heads A = Authorized user when Available functions have not been specified. B = Authorized user when Available functions have been specified.
  • Page 908 10. Appendix Settings RSH/RCP DIPRINT sftp WSD (Device) WSD (Printer) WSD (Scanner) WSD (Printer)/IPP Timeout RHPP IPv6 Settings IPv6 Host Name Domain Name Link-local Address Stateless Address Manual Configuration Address DCHPv6-lite DDNS Default Gateway Address DNS Server RSH/RCP...
  • Page 909 Network Settings DIPRINT sftp WSD (Device) WSD (Printer) WSD (Scanner) WSD (Printer)/IPP Timeout RHPP NetWare Settings NetWare Print Server Name Logon Mode File Server Name NDS Tree NDS Context Name Operation Mode Remote Printer No. Job Timeout Frame Type Print Server Protocol NCP Delivery Protocol...
  • Page 910 10. Appendix AppleTalk Settings AppleTalk Network No. Printer Name Printer Type Zone Name Settings Protocol Workgroup Name Computer Name Comment Share Name Notify Print Completion Bonjour Settings Bonjour Computer Name Location DIPRINT...
  • Page 911: Webpage

    Webpage Webpage When administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. • Abbreviations in the table heads A = Authorized user when Available functions have not been specified. B = Authorized user when Available functions have been specified.
  • Page 912 10. Appendix Download Help File Settings Download Help Page...
  • Page 913: Functions That Require Options

    Functions That Require Options Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erase function DataOverwriteSecurity Unit • Data security for copying function Copy Data Security Unit • PDF Direct Print function PostScript 3 Unit •...
  • Page 914: Trademarks

    ® The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Ricoh Company, Ltd. is under license. NetWare is a registered trademark of Novell, Inc. UPnP is a trademark of the UPnP Implementers Corporation.
  • Page 915 Trademarks ® ® Microsoft Windows Vista Business ® ® Microsoft Windows Vista Home Premium ® ® Microsoft Windows Vista Home Basic • The product names of Windows Server 2003 are as follows: ® ® Microsoft Windows Server 2003 Standard Edition ®...
  • Page 916 10. Appendix...
  • Page 917: Index

    INDEX Encryption Key Auto Exchange Security Level..................Access Control............. Encryption Key Auto Exchange Setting Items..................Access Permission..........Encryption Auto Exchange Settings Address Book Access Permission....... Configuration Flow..........Address Book Privileges........Encryption Key Manual Settings Configuration Administrator............Flow..............Administrator Authentication....17, 25, 27 Encryption Key Manual Settings Items....
  • Page 918 LDAP Authentication..........LDAP Authentication - Operational Requirements S/MIME.............. for LDAP Authentication........Scanner..............Locked Print............Scanner Features..........Log off (Administrator).......... Security Functions..........Log on (Administrator).......... Self-Signed Certificate........Login............... Service Mode Lock..........Logout..............Settings by SNMP v1 and v2......SNMPv3.............. Machine Administrator......... SSL................
  • Page 919 WSD scanner function........
  • Page 920 MEMO...
  • Page 921 MEMO...
  • Page 922 MEMO D029...
  • Page 923 Copyright © 2008...
  • Page 924 Type for C2828/MP C2800/LD528C/Aficio MP C2800 Type for C3333/MP C3300/LD533C/Aficio MP C3300 Type for C4040/MP C4000/LD540C/Aficio MP C4000 Type for C5050/MP C5000/LD550C/Aficio MP C5000 Type for C2828G/LD528CG/Aficio MP C2800G Type for C3333G/LD533CG/Aficio MP C3300G Type for C4040G/LD540CG/Aficio MP C4000G Type for C5050G/LD550CG/Aficio MP C5000G...
  • Page 925 PostScript 3 Supplement Windows Configuration Mac OS Configuration Using PostScript 3 Printer Utility for Mac Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 927 TABLE OF CONTENTS Manuals for This Machine..........................5 Notice..................................7 Important.................................7 How to Read This Manual..........................8 Symbols................................8 Note................................8 About IP Address............................8 Laws and Regulations............................9 Legal Prohibition.............................9 1. Windows Configuration Using the DeskTop Binder-SmartDeviceMonitor for Client Port..............11 Installing DeskTop Binder-SmartDeviceMonitor for Client...............11 Installing the PostScript 3 Printer Driver (Windows 2000 - TCP/IP)............12 Installing the PostScript 3 Printer Driver (Windows 2000 - IPP)..............13 Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - TCP/IP) ..................................14...
  • Page 928 Using as the NetWare Print Server / Remote Printer..................35 When using the PostScript 3 Printer Driver....................35 Installing the Printer Driver Using USB......................36 Windows 2000 - USB..........................36 Windows XP, Windows Server 2003 / 2003 R2 - USB.................37 Windows Vista - USB..........................38 Troubleshooting for using USB........................39 Printing with Parallel Connection........................40 Installing the PostScript 3 printer driver (Windows 2000)...............40...
  • Page 929 Using Bonjour (Rendezvous)........................63 Changing to EtherTalk..........................63 Configuring the Printer.............................65 3. Using PostScript 3 Setting Up Options............................67 Printing a Document............................69 Job Type...............................69 User Code..............................84 Paper Size..............................85 Fit to Paper..............................85 Input Slot...............................86 Resolution..............................86 Rotate by 180 degrees..........................87 Orientation Override...........................87 Gradation..............................88 Toner Saving..............................88 Duplex Printing.............................89 Collate................................90 Paper Type..............................90...
  • Page 930 Dithering...............................98 CMYK Simulation Profile..........................99 Image Smoothing............................99 Separate into CMYK..........................100 Color Control.............................100 4. Printer Utility for Mac Installing Printer Utility for Mac........................103 Starting Printer Utility for Mac........................104 Mac OS..............................104 Mac OS X..............................104 Printer Utility for Mac Functions........................105 Downloading PS Fonts..........................106 Displaying Printer's Fonts..........................106 Deleting Fonts............................107 Initializing the Printer Disk.........................107 Page Setup..............................108...
  • Page 931: Manuals For This Machine

    Manuals for This Machine Read this manual carefully before you use this machine. Refer to the manuals that are relevant to what you want to do with the machine. • Media differ according to manual. • The printed and electronic versions of a manual have the same contents. •...
  • Page 932 • Enable SSL (Secure Sockets Layer) Encryption. • Change the user name and password of the administrator using Web Image Monitor. For details, see “Setting Up the Machine”, Security Reference. Be sure to read this manual when setting the enhanced security functions, or user and administrator authentication.
  • Page 933: Notice

    Notice Important In no event will the company be liable for direct, indirect, special, incidental, or consequential damages as a result of handling or operating the machine. For good copy quality, the supplier recommends that you use genuine toner from the supplier. The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products.
  • Page 934: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates points to pay attention to when using the machine, and explanations of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure to read these explanations. Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
  • Page 935: Laws And Regulations

    Laws and Regulations Legal Prohibition Do not copy or print any item for which reproduction is prohibited by law. Copying or printing the following items is generally prohibited by local law: bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses. The preceding list is meant as a guide only and is not inclusive.
  • Page 937: Windows Configuration

    1. Windows Configuration Using the DeskTop Binder-SmartDeviceMonitor for Client Port Installing DeskTop Binder-SmartDeviceMonitor for Client • To install DeskTop Binder-SmartDeviceMonitor for Client under Windows 2000 / XP Professional / Vista and Windows Server 2003 / 2003 R2, you must have an account that has Manage Printers permission.
  • Page 938: Installing The Postscript 3 Printer Driver (Windows 2000 - Tcp/Ip)

    1. Windows Configuration • To stop installation of the selected software, click [Cancel] before installation is complete. • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on the CD-ROM root directory. Installing the PostScript 3 Printer Driver (Windows 2000 - TCP/IP) •...
  • Page 939: Installing The Postscript 3 Printer Driver (Windows 2000 - Ipp)

    Using the DeskTop Binder-SmartDeviceMonitor for Client Port Specify whether or not to print a test page, and then click [Next >]. Click [Finish]. The printer driver installation starts. • A user code can be set after the printer driver installation. For information about user code, see the printer driver Help.
  • Page 940: Installing The Postscript 3 Printer Driver (Windows Xp, Windows Server 2003 / 2003 R2 - Tcp/Ip)

    1. Windows Configuration http://192.168.15.16/printer https://192.168.15.16/printer You can enter “http://machine's IP address or host name/ipp” as the printer's address. If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the name of any existing port.
  • Page 941 Using the DeskTop Binder-SmartDeviceMonitor for Client Port Quit all applications currently running. Insert the CD-ROM into the CD-ROM drive. The installer starts. Select an interface language, and then click [OK]. The default interface language is English. The printer driver with the selected language will be installed. The English printer driver is installed when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian, Catala, Turkce.
  • Page 942: Installing The Postscript 3 Printer Driver (Windows Vista - Tcp/Ip)

    1. Windows Configuration Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - IPP) • Installing this printer driver requires Administrators permission. Log on using an account that has Administrators permission. • You can install the printer driver from the CD-ROM provided with this machine or download it from the supplier's Web site.
  • Page 943 Using the DeskTop Binder-SmartDeviceMonitor for Client Port If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the one of any existing port.
  • Page 944: Installing The Postscript 3 Printer Driver (Windows Vista - Ipp)

    1. Windows Configuration Select an interface language, and then click [OK]. The default interface language is English. The printer driver with the selected language will be installed. The English printer driver is installed when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian, Catala, Turkce.
  • Page 945 Using the DeskTop Binder-SmartDeviceMonitor for Client Port • If your operating system is Windows Vista x64, you must download the printer driver from the manufacturer's Web site. Select this printer and the operating system you are using, and then download it. Quit all applications currently running.
  • Page 946: Windows 2000

    1. Windows Configuration Check that the name of the printer driver you want to install is selected, and then click [Next >]. Change the name of the printer if you want, and then click [Next >]. Select the [Yes] check box to configure the printer as default. Specify whether or not to print a test page, and then click [Finish].
  • Page 947 Using the DeskTop Binder-SmartDeviceMonitor for Client Port • For information about these settings, see DeskTop Binder-SmartDevice-Monitor for Client Help. Windows Vista: Open the [Printers] window from [Control Panel] on the [Start] menu. The [Printers] window appears. Right - click the icon of the printer you want to use, and then click the [Properties]. The printer properties appear.
  • Page 948: Using The Standard Tcp/Ip Port

    Enter the printer name or IP address in the [Printer Name or IP Address] box. The [Port Name] text box automatically obtains a port name. Change this name if necessary. When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”. Click [Next >].
  • Page 949: Installing The Postscript 3 Printer Driver (Windows 2000)

    Using the Standard TCP/IP Port Specify whether or not to share the printer, and then click [Next >]. Specify whether or not to print a test page, and then click [Next >]. Click [Finish]. The printer driver installation starts. • A user code can be set after the printer driver installation. For information about user code, see the printer driver Help.
  • Page 950: Installing The Postscript 3 Printer Driver (Windows Vista)

    Enter the printer name or IP address in the [Printer Name or IP Address] box. The [Port Name] text box automatically obtains a port name. Change this name if necessary. When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”. Click [Next >].
  • Page 951 Enter the printer name or IP address in the [Printer Name or IP Address] box. The [Port Name] text box automatically obtains a port name. Change this name if necessary. When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”. Click [Next >].
  • Page 952: Using The Lpr Port

    1. Windows Configuration Using the LPR Port Installing the PostScript 3 Printer Driver (Windows 2000) • Installing this printer driver requires Administrators permission. Log on using an account that has Administrators permission. Quit all applications currently running. Insert the CD-ROM into the CD-ROM drive. The installer starts.
  • Page 953: Installing The Postscript 3 Printer Driver (Windows Xp, Windows Server 2003 / 2003 R2)

    Using the LPR Port • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on the CD-ROM root directory. Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2) • Installing this printer driver requires Administrators permission. Log on using an account that has Administrators permission.
  • Page 954: Installing The Postscript 3 Printer Driver (Windows Vista)

    1. Windows Configuration Change the printer name if you want, and then click [Next >]. Select the [Yes] check box to configure the printer as default. Specify whether or not to share the printer, and then click [Next >]. Specify whether or not to print a test page, and then click [Next >]. Click [Finish].
  • Page 955 Using the LPR Port Check that the name of the machine whose driver you want to install is selected, and then click [Next >]. Change the printer name if you want, and then click [Next >]. Select the [Yes] check box to configure the printer as default. Specify whether or not to print a test page, and then click [Finish].
  • Page 956: Using As The Windows Network Printer

    1. Windows Configuration Using as the Windows Network Printer Installing the PostScript 3 Printer Driver (Windows 2000) • Installing a printer driver requires Administrators permission. Log on using an account that has Administrators permission. • If you print from a print server connected to the printer using the DeskTop Binder- SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
  • Page 957: Installing The Postscript 3 Printer Driver (Windows Xp, Windows Server 2003 / 2003 R2)

    Using as the Windows Network Printer • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on the CD-ROM root directory. Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2) •...
  • Page 958: Installing The Postscript 3 Printer Driver (Windows Vista)

    1. Windows Configuration Click [Next >]. Select the [Yes] check box to configure the printer as default. Click [Finish]. Restart the computer to complete installation. • A user code can be set after the printer driver installation. For information about user code, see the printer driver Help.
  • Page 959: Using The Wsd Port

    Using as the Windows Network Printer Select [Browse for a printer], and then click [Next >]. Double-click the computer name you want to use as a print server in the [Shared printers] window. Select the printer you want to use, and then click [Next >]. The printer driver installation starts.
  • Page 960 1. Windows Configuration The [Found New Hardware] window appears. Click [Don't search online]. Click [Browse my computer for driver software (advanced)]. Insert the provided CD-ROM into the computer's CD-ROM drive. If the [AutoPlay] dialog box appears, click the [close] button and then proceed to step 8. Click [Browse...], and then specify a location for the printer driver.
  • Page 961: Using As The Netware Print Server / Remote Printer

    Using as the NetWare Print Server / Remote Printer Using as the NetWare Print Server / Remote Printer When using the PostScript 3 Printer Driver • In an IPv6 environment, Netware servers cannot be used. Follow the procedure below to set up the PostScript 3 printer driver. In the [Printers] or [Printers and Faxes] window, open the printer properties.
  • Page 962: Installing The Printer Driver Using Usb

    1. Windows Configuration Installing the Printer Driver Using USB This section explains how to install printer drivers using USB. • Make sure that machine is connected to the computer's USB ports using the USB interface cable. • Before installing, check that only the operating system is running on the computer and no print jobs are in progress.
  • Page 963: Windows Xp, Windows Server 2003 / 2003 R2 - Usb

    Installing the Printer Driver Using USB D:\DRIVERS\PS\XP_VISTA\(Language)\DISK1 Check the printer driver location, and then click [OK]. Click [Next >]. Click [Finish]. If the printer driver has already been installed, plug and play is enabled, and the icon of the printer connected to the “USB001”...
  • Page 964: Windows Vista - Usb

    1. Windows Configuration Check the printer driver location, and then click [Next >]. Click [Continue]. Click [Finish]. If installation is successful, the icon of the printer connected to the “USB001” port is added to the [Printers] window. • If Auto Run starts, click [Cancel], and then [Exit]. •...
  • Page 965: Troubleshooting For Using Usb

    Installing the Printer Driver Using USB • When a printer driver meeting this printer is found on a network, a message prompting insertion of the CD-ROM is not displayed. • The number after “USB” varies depending on the number of printers connected. Troubleshooting for using USB Problems Solutions...
  • Page 966: Printing With Parallel Connection

    1. Windows Configuration Printing with Parallel Connection To use a machine connected using a parallel interface, click [LPT1] when installing the printer driver. Installing the PostScript 3 printer driver (Windows 2000) • Installing this printer driver requires Administrators permission. Log on using an account that has Administrators permission.
  • Page 967: Installing The Postscript 3 Printer Driver (Windows Xp, Windows Server 2003 / 2003 R2)

    Printing with Parallel Connection Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2) • Installing this printer driver requires Administrators permission. Log on using an account that has Administrators permission. • You can install the printer driver from the CD-ROM provided with this machine or download it from the supplier's Web site.
  • Page 968: Installing The Postscript 3 Printer Driver (Windows Vista)

    1. Windows Configuration • A user code can be set after the printer driver installation. For information about user code, see the printer driver Help. • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on the CD-ROM root directory.
  • Page 969 Printing with Parallel Connection Restart the computer to complete installation. • A user code can be set after the printer driver installation. For information about user code, see the printer driver Help. • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on the CD-ROM root directory.
  • Page 970: Printing With Bluetooth Connection

    1. Windows Configuration Printing with Bluetooth Connection This describes how to print with Bluetooth devices. Supported Profiles The following profiles are supported: • SPP (Serial Port Profile) • HCRP (Hardcopy Cable Profile) • BIP (Basic Imaging Profile) Restrictions on SPP, HCRP •...
  • Page 971 Printing with Bluetooth Connection • To perform a printer installation, your account must have Manage Printers permission. Log on as an Administrators or Power Users group member. • To connect to a Bluetooth printer, your computer must have a Bluetooth device installed. Make sure a Bluetooth device is installed on your computer.
  • Page 972 1. Windows Configuration Windows Vista • To perform a printer installation, your account must have Manage Printers permission. Log on as an Administrators or Power Users group member. On the [Start] menu, click [Control Panel]. In the “Hardware and Sound” area, click [Printers]. In the top part of the window, click [Add a printer].
  • Page 973: If A Message Appears During Installation

    If a Message Appears during Installation If a Message Appears during Installation Message number 58 or 34 indicates the printer driver cannot be installed using Auto Run. Install the printer driver using [Add Printer] or [Install Printer]. For Windows 2000: On the [Start] menu, point to [Settings], and then click [Printers].
  • Page 974 1. Windows Configuration For Windows Vista: On the [Start] menu, click [Control Panel]. The [Control Panel] window appears. Click [Printer] in “Hardware and Sound”. Click [Install Printer]. Follow the instructions in Add Printer Wizard. • If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS \XP_VISTA\(Language)\DISK1.
  • Page 975: Making Option Settings For The Printer

    Making Option Settings for the Printer Making Option Settings for the Printer Make option settings for the machine using the printer driver when bidirectional communication is disabled. Set up option settings when bidirectional communications are disabled. • Under Windows 2000 / XP / Vista and Windows Server 2003 / 2003 R2, Manage Printers permission is required to change the printer properties in the [Printers] folder.
  • Page 976: Setting Up The Printer Driver

    1. Windows Configuration Setting Up the Printer Driver Windows 2000 - Accessing the Printer Making printer default settings - the printer properties • To change the printer default settings including option configuration settings, log on using an account that has Manage Printers permission. Members of the Administrators and Power Users groups have Manage Printers permission by default.
  • Page 977: Windows Xp, Windows Server 2003 / 2003 R2 - Accessing The Printer Properties

    Setting Up the Printer Driver Make the necessary settings, and then click [OK]. • Settings you make here are used as the default settings for all applications. • For details, see the printer driver Help. Making printer settings from an application You can make printer settings for a specific application.
  • Page 978 1. Windows Configuration • You cannot change the printer default settings for each user. Settings made in the printer properties dialog box are applied to all users. On the [Start] menu, click [Printers and Faxes]. The [Printers and Faxes] window appears. Click the icon of the printer you want to use.
  • Page 979: Windows Vista - Accessing The Printer Properties

    Setting Up the Printer Driver To make printer settings for a specific application, open the [Printing Preferences] dialog box from that application. The following explains how to make settings for the WordPad application provided with Windows XP. On the [File] menu, click [Print...]. The [Print] dialog box appears.
  • Page 980 1. Windows Configuration • For details, see the printer driver Help. Making printer default settings - Printing Preferences • You cannot change the printer default settings for each user. Settings made in the printer properties dialog box are applied to all users. On the [Start] menu, click [Control Panel].
  • Page 981 Setting Up the Printer Driver • For details, see the printer driver Help.
  • Page 982 1. Windows Configuration...
  • Page 983: Mac Os Configuration

    2. Mac OS Configuration Mac OS This section explains how to configure a Mac OS to use EtherTalk and USB. The following explains how to configure Mac OS 9.1. If you are not using Mac OS 9.1, see the manual of the Mac OS you are using for details.
  • Page 984: Setting Up Ppd Files

    2. Mac OS Configuration Drag the PPD file and the plugin file into [Printer Descriptions] in [Extensions] under [System Folder]. Restart the Mac OS. Setting Up PPD Files • Make sure that the printers are connected to an AppleTalk network before performing the following procedure.
  • Page 985: Installing Adobe Type Manager

    Mac OS Installing Adobe Type Manager • Quit all applications currently running before installation. Install ATM after you restart the computer. Start a Mac OS. Insert the CD-ROM into the CD-ROM drive. Double-click the CD-ROM drive con. Double-click the [Mac OS 8 and 9] folder. Double-click the [ATM] folder.
  • Page 986: Changing To Ethertalk

    2. Mac OS Configuration Copy the fonts you want to install in [System Folder]. A confirmation message appears. Click [OK]. The fonts are installed. Restart the Mac OS. Changing to EtherTalk Follow the procedure below to configure to a Mac OS to use EtherTalk. Open [Control Panel], and then double-click the AppleTalk icon.
  • Page 987: Mac Os X

    Mac OS X Mac OS X This section explains how to configure a Mac OS X to use EtherTalk, USB and TCP/IP. Follow the procedure below to configure Mac OS X 10.3.8. If you are not using Mac OS X 10.3.8, see the manual of the Mac OS X you are using for details.
  • Page 988: Setting Up Options

    2. Mac OS Configuration Select the printer, and then select its manufacturer from the [Printer Model:] pop-up menu. Under Mac OS X 10.4 or later, you are using from the [Print Using] popup menu. A list of printer types appears. Select the PPD file for the model you are using, and then click [Add].
  • Page 989: Using Bonjour (Rendezvous)

    Mac OS X • When printing with a USB connection to a Macintosh computer, printer language does not change automatically. Use the control panel on this printer to change printer language to [Auto Detect] or [PS] before printing. • USB2.0 can be used only with Mac OS X 10.3.3 or higher. Using Bonjour (Rendezvous) Follow the procedure below to print using Bonjour (Rendezvous) under Mac OS X 10.2.3 or higher.
  • Page 990 2. Mac OS Configuration Click the [AppleTalk] tab. Select the [Make AppleTalk Active] check box. To change AppleTalk zones, select a name from the [AppleTalk Zone:] pop-up menu. When the settings are made, click [Apple Now]. • For information about installing applications required for EtherTalk, see the Mac OS manuals.
  • Page 991: Configuring The Printer

    Configuring the Printer Configuring the Printer Use the control panel to enable AppleTalk. (The default is active.)
  • Page 992 2. Mac OS Configuration...
  • Page 993: Using Postscript

    3. Using PostScript 3 Setting Up Options To use installed options correctly, first set up the printer driver. If the options are not recognized, you cannot use them, even though they are physically installed. The procedure to set up a printer driver varies depending on the operating system.
  • Page 994 3. Using PostScript 3 • See, Making Option Settings for the Printer, Setting Up Options or Setting Up Options for the installation method appropriate to your printing environment.
  • Page 995: Printing A Document

    Printing a Document Printing a Document This documentation describes the specific printer functions and menus that are added by installing the PPD file. • On a Macintosh, Mac OS 8.6 or higher (Mac OS X Classic environment is supported.), or Mac OS X 10.1 or higher is required.
  • Page 996 3. Using PostScript 3 Windows 2000 / XP / Vista, Windows Server [Job Type:] on the [Job/Log] tab in the Printing 2003 / 2003 R2 Preferences dialog box. Mac OS [Job Type:] on [Job Log] in the print dialog box. Mac OS X [Job Type:] on [Job Log] in the print dialog box.
  • Page 997 Printing a Document • For details about how to use Hold Print, see Job Type. Stored Print Use this function to store a file in the machine, and then print it from the computer or the machine's control panel later. •...
  • Page 998 3. Using PostScript 3 How to Use Sample Print Follow the procedure below to print a document using the Sample Print function. Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 In the application, on the [File] menu, click [Print]. The [Print] dialog box appears.
  • Page 999 Printing a Document When multiple files are selected without setting a quantity, 1 page less than the minimum number of all settings is applied. Press [Yes]. The remaining sets are printed. • Press [Stop] to cancel printing. • When printing finishes, the stored file is deleted. •...
  • Page 1000: Deleting A Sample Print File

    3. Using PostScript 3 Enter the new number of sets using the number keys. If you do not want to change the set quantity, perform the following steps. You can enter up to 999 sets. Press [Clear/Stop] to correct any entry mistakes. When multiple files are selected without setting a quantity, 1 page less than the minimum number of all settings is applied.
  • Page 1001 Printing a Document Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 In the application, on the [File] menu, click [Print]. The [Print] dialog box appears. Right-click the printer icon, and then click [Printing Preference] on the command menu. If you are using Windows 2000, select the printer, and then perform the following steps.
  • Page 1002 3. Using PostScript 3 Press [Yes]. The locked file is printed. • Press [Stop] to cancel printing. • To cancel printing, press [Exit]. Then, press [Job Reset]. After it has started, the file is deleted. • If the application has a collate option, make sure it is not selected before sending a print job. The printer driver automatically collates Locked Print jobs by default.
  • Page 1003: Deleting A Locked Print File

    Printing a Document When multiple print files are selected, the machine prints only files that correspond to the entered password. The number of files is displayed on the confirmation screen. Press [Yes]. The locked file is printed. • Press [Stop] to cancel printing. •...
  • Page 1004 3. Using PostScript 3 Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 In the application, on the [File] menu, click [Print]. The [Print] dialog box appears. Right-click the printer icon, and then click [Printing Preference] on the command menu. If you are using Windows 2000, select the printer, and then perform the following steps.
  • Page 1005 Printing a Document • When printing finishes, the stored file is deleted. • If the application has a collate option, make sure it is not selected before sending a print job. The printer driver automatically collates Hold Print files by default. If a collate option is selected from the application's Print dialog box, there may be more prints than required.

Table of Contents