Вы находитесь на странице: 1из 1780

Operating Instructions

About This Machine

1 Simple Search
2 Getting Started
3 Adding Paper
4 Adding Toner
5 Entering Text
6 Operating Instructions
7 Remarks
8 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in this manual before using the machine.
Documentation for This Machine

About This Machine (This manual) .........................................................................................................


Troubleshooting .......................................................................................................................................
Copy Reference ..............................................................................................................................................
Using the various copier functions ............................................................................................................
Changing the default settings of the copier function, and related information .....................................
Facsimile Reference ........................................................................................................................................
Sending and receiving faxes .....................................................................................................................
Using the fax function through a computer ..............................................................................................
Changing the default settings of the fax function, and related information ...........................................
Printer Reference .............................................................................................................................................
Installing the driver for the printer function ...............................................................................................
Changing the default settings of the printer function, and related information .....................................
Scanner Reference .........................................................................................................................................
Sending scan files .......................................................................................................................................
Storing scan files ........................................................................................................................................
Changing the default settings of the scanner function, and related information ...................................
Network and System Settings Guide ............................................................................................................
Connecting to a network ...........................................................................................................................
Registering addresses for fax/scanner functions ....................................................................................
Changing the default settings of the system, and related information ...................................................
Security Reference ..........................................................................................................................................
PostScript 3 Supplement ................................................................................................................................
UNIX Supplement .........................................................................................................................................
Quick Reference Copy Guide ...............................................................................................................
Quick Reference Fax Guide ...................................................................................................................
Quick Reference Printer Guide ..............................................................................................................
Quick Reference Scanner Guide ...........................................................................................................

1
TABLE OF CONTENTS
Documentation for This Machine.......................................................................................................................1
Manuals for This Machine.................................................................................................................................6
Manuals List.........................................................................................................................................................8
What You Can Do with This Machine...............................................................................................................9
Using This Machine as a Copier...................................................................................................................9
Using This Machine as a Printer....................................................................................................................9
Paperless Fax Transmission.........................................................................................................................10
Fax Transmission and Reception Over the Internet...................................................................................11
Using the Scanner in a Network Environment...........................................................................................12
Administrating the Machine (Security Functions)......................................................................................12
Monitoring the Machine Via Computer.....................................................................................................13
Notice................................................................................................................................................................14
Important......................................................................................................................................................14
How to Read This Manual...............................................................................................................................15
Symbols........................................................................................................................................................15
Name of Major Item....................................................................................................................................15
Note..............................................................................................................................................................16
Safety Information............................................................................................................................................17
Safety During Operation.............................................................................................................................17
Safety Precautions to be Followed.............................................................................................................17
Safety Labels of This Machine.........................................................................................................................22
Positions of WARNING and CAUTION labels.........................................................................................22
Power Switch Symbols.................................................................................................................................22
ENERGY STAR Program..................................................................................................................................23
Energy Saving Functions..................................................................................................................................24
Laws and Regulations......................................................................................................................................26
Legal Prohibition..........................................................................................................................................26
Laser Safety..................................................................................................................................................26
Notes to users in the United States of America..........................................................................................26
1. Simple Search
Searching by what you want to do.................................................................................................................29
I want to save my paper document!...........................................................................................................29
I want to convert documents to electronic formats easily!........................................................................30

2
I want to register destinations!....................................................................................................................30
I want to operate the machine more effectively!.......................................................................................31
Searching by Keyword....................................................................................................................................33
Paper.............................................................................................................................................................33
Register/Change/Delete............................................................................................................................33
Settings..........................................................................................................................................................34
Forwarding...................................................................................................................................................34
Install.............................................................................................................................................................34
2. Getting Started
Guide to Components......................................................................................................................................37
Other Items.......................................................................................................................................................40
External Items...............................................................................................................................................40
Internal Items................................................................................................................................................40
Control Panel....................................................................................................................................................42
Display Panel....................................................................................................................................................46
Reading the Display and Using Keys.........................................................................................................46
Changing the Display Language................................................................................................................47
When the Authentication Screen is Displayed...............................................................................................48
User Code Authentication (Using the Control Panel)................................................................................48
User Code Authentication (Using a Printer Driver)....................................................................................49
Login (Using the Control Panel)..................................................................................................................49
Logout (Using the Control Panel)................................................................................................................49
Login (Using a Printer Driver)......................................................................................................................50
Login (Using Web Image Monitor)............................................................................................................50
Logout (Using Web Image Monitor)..........................................................................................................50
Changing Modes.............................................................................................................................................52
System Reset.................................................................................................................................................52
Turning On/Off the Power..............................................................................................................................54
Turning On the Main Power........................................................................................................................54
Turning On the Power..................................................................................................................................55
Turning Off the Power..................................................................................................................................55
Turning Off the Main Power........................................................................................................................56
Saving Energy..............................................................................................................................................56

3
3. Adding Paper
Loading Paper..................................................................................................................................................59
Loading Paper into the Paper Trays...........................................................................................................59
Orientation-Fixed Paper or Two-Sided Paper...........................................................................................61
Changing the Paper Size.................................................................................................................................64
Changing the Paper Size in the Paper Tray (Tray 1)................................................................................64
Changing the Paper Size in the Optional Paper Tray Unit (Tray 2 and Tray 3)....................................67
Selecting the Paper Size with User Tools...................................................................................................69
Recommended Paper Sizes and Types..........................................................................................................71
Envelopes..........................................................................................................................................................74
Unusable Paper................................................................................................................................................76
Paper Storage..................................................................................................................................................77
4. Adding Toner
Adding Toner....................................................................................................................................................79
Replacing Toner...........................................................................................................................................80
Sending Faxes or Scanned Documents When Toner Has Run Out.........................................................81
Used Toner...................................................................................................................................................82
5. Entering Text
Entering Text.....................................................................................................................................................83
Available Characters...................................................................................................................................83
Keys...............................................................................................................................................................83
How to Enter Text.........................................................................................................................................84
6. Operating Instructions
Installing Operating Instructions......................................................................................................................93
PDF Manuals................................................................................................................................................93
How to Use the Operating Instructions...........................................................................................................95
Opening from the Icon................................................................................................................................95
Opening from the [Start] Menu..................................................................................................................95
Opening from the CD-ROM.......................................................................................................................96
7. Remarks
Dos and Don'ts.................................................................................................................................................97
Where to Put Your Machine............................................................................................................................99
Machine Environment..................................................................................................................................99

4
Power Connection.....................................................................................................................................101
Maintaining Your Machine...........................................................................................................................103
Cleaning the Exposure Glass...................................................................................................................103
Cleaning the ADF......................................................................................................................................103
Cleaning the Power Cable Plug...............................................................................................................104
Counter...........................................................................................................................................................105
Displaying the Total Counter....................................................................................................................105
8. Appendix
Software and Utilities Included on the CD-ROM........................................................................................107
Viewing the Contents of the CD-ROM.....................................................................................................107
Printer Drivers for This Machine................................................................................................................107
TWAIN Driver............................................................................................................................................109
LAN-Fax Driver..........................................................................................................................................109
DeskTopBinder Lite....................................................................................................................................110
SmartDeviceMonitor for Admin...............................................................................................................110
DeskTopBinder-SmartDeviceMonitor for Client......................................................................................112
Specifications for the Main Unit...................................................................................................................113
Specifications for Auto Document Feeder...................................................................................................117
Specifications for Paper Tray Unit (Tray 2 and Tray 3)..............................................................................118
Specifications for Wireless LAN Board........................................................................................................119
Trademarks.....................................................................................................................................................120
INDEX...........................................................................................................................................................123

5
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.

• Media differ according to manual.


• The printed and electronic versions of a manual have the same contents.
• Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files.
• A Web browser must be installed in order to view the html manuals.
About This Machine
Before using the machine, be sure to read the section of this manual entitled Safety Information.
This manual introduces the machine's various functions. It also explains the control panel, preparation
procedures for using the machine, how to enter text, how to install the CD-ROMs provided, and how
to replace paper, toner, and other consumables.
Troubleshooting
Provides a guide for resolving common usage-related problems.
Copy Reference
Explains Copier functions and operations. Also refer to this manual for explanations on how to place
originals.
Facsimile Reference
Explains Facsimile functions and operations.
Printer Reference
Explains Printer functions and operations.
Scanner Reference
Explains Scanner functions and operations.
Network and System Settings Guide
Explains how to connect the machine to a network, configure and operate the machine in a network
environment, and use the software provided. Also explains how to change User Tools settings and
how to register information in the Address Book.
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. For enhanced
security, we recommend that you first make the following settings:
• Install the Device Certificate.
• Enable SSL (Secure Sockets Layer) Encryption.

6
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product name General name

DeskTopBinder Lite and DeskTopBinder


DeskTopBinder
Professional *1

ScanRouter EX Professional *1 and ScanRouter


the ScanRouter delivery software
EX Enterprise *1

*1 Optional

7
Manuals List
Printed Manuals HTML Manuals PDF Manuals
Manual Name
Provided Provided Provided

About This Machine Yes Yes Yes

Troubleshooting Yes Yes Yes

Copy Reference No Yes Yes

Facsimile Reference No Yes Yes

Printer Reference No Yes Yes

Scanner Reference No Yes Yes

Network and System Settings Guide No Yes Yes

Security Reference No Yes Yes

PostScript 3 Supplement No Yes Yes

8
What You Can Do with This Machine
This section introduces the features of this machine.

• For details about additional items, see “Other Items”.


• Some functions may not be available depending on your machine type.

• p.40 "Other Items"

Using This Machine as a Copier

You can make copies of originals.

BRA002S

• You can reduce or enlarge the copy image.


• Copier functions such as Duplex and Combine allow you to save on paper by copying multiple pages
onto single sheets.
• You can copy onto various types of paper such as envelopes, and OHP transparencies.

• See Copy Reference .

Using This Machine as a Printer

You can print documents created in applications.

9
BRA003S

• This machine supports network and local connections.


• You can send PDF files directly to the machine for printing, without having to open a PDF application.
• You can print or delete print jobs stored on the machine's hard disk, which have been previously sent
from computers using the printer driver. The following types of print jobs can be selected: Sample
Print, Locked Print, Hold Print, and Stored Print.

• See Printer Reference .

Paperless Fax Transmission

You can send a file by fax without printing it.


You can send a fax from your computer over the network (Ethernet or wireless LAN) to this machine, which
then forwards the fax via its telephone connection (LAN-Fax).

BRA004S

• To send a fax, print from the Windows application you are working with, select LAN-Fax as the printer,
and then specify the destination.
• You can also check the sent image data.
• For details about the machine's settings, see “Network Settings Required to Use the Printer/LAN-Fax”,
Network and System Settings Guide .

10
• For details about how to use the function, see “Fax via Computer”, Facsimile Reference .

Fax Transmission and Reception Over the Internet

You can send and receive faxes over your LAN and the Internet.

BRA043S

Internet Fax
This machine converts scanned document images to e-mail format, and transmits and receives this
data over the Internet.
• To send a document, specify an e-mail address instead of dialing the destination telephone
number (Internet Fax Transmission).
• This machine can receive e-mail messages via Internet Fax or from computers (Internet Fax
Reception).
• Internet Fax compatible machines and computers that have e-mail addresses can receive e-mail
messages via Internet Fax.
IP-Fax
The IP-Fax function sends or receives documents between two facsimiles directly via a TCP/IP network.
• To send a document, specify an IP address or host name instead of a fax number (IP-Fax
Transmission).
• This machine can receive documents sent via Internet Fax (IP-Fax Reception).
• Using a VoIP gateway, this machine can send to G3 facsimiles connected to the public switched
telephone network (PSTN).

• For details about settings, see “Network Settings Required to Use Internet Fax”, Network and System
Settings Guide .
• For details about how to transmit and receive documents over the Internet, see “Transmission” and
“Reception”, Facsimile Reference .

11
Using the Scanner in a Network Environment

You can use a scanner over the network.

BRA044S

• You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See
“Sending Scan Files by E-mail”, Scanner Reference .
• You can send scan files directly to folders (Sending scan files by Scan to Folder). See “Sending Scan
Files to Folder”, Scanner Reference .
• You can use this machine as a delivery scanner for the ScanRouter delivery application (Network
delivery scanner). You can save scan files in the delivery server or send them to a folder in a computer
on the same network. For details about the machine's settings, see “Network Settings Required to Use
the Network Delivery Scanner”, Network and System Settings Guide . For details about how to
use the function, see “Delivering Scan Files”, Scanner Reference .
• Client computers can use this machine as a network TWAIN scanner.
• You can scan originals in full color using the scanner function.
• You can use Web Services on Devices (WSD) to send scan files to a client computer.
• You can save scan files on a removable memory device such as a USB memory stick or an SD card.

Administrating the Machine (Security Functions)

You can prevent information leakage by managing the machine.

12
BRA005S

• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.

• See Security Reference .

Monitoring the Machine Via Computer

You can change the machine's settings and monitor its status from a connected computer.

BRA006S

• Web Image Monitor lets you configure and operate the machine using a Web browser on a computer.
You can also install SmartDeviceMonitor for Admin on a computer to configure and operate the
machine.
• Using Web Image Monitor, you can register information in the address book, specify the machine's
settings, and check the machine's status with ease.
• Using Web Image Monitor, you can check and specify the initial settings (system settings, printer
features, network settings, and security settings/certificate management), control print jobs, and
display the print job journal.
• You can also use SmartDeviceMonitor for Admin to register information in the address book.

13
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

14
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.

[]
Indicates the names of keys that appear on the machine's display panel.

[]
Indicates the names of keys on the machine's control panel.

Indicates instructions in book form.

Indicates instructions in sheet form.

Indicates instructions stored in a file on a provided CD-ROM.

Indicates instructions provided on this company's Web site.

Name of Major Item

Major item of this machine is referred to as follows in this manual:


• Auto document feeder ADF

15
Note

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

16
Safety Information
When using this machine, the following safety precautions should always be followed.

Safety During Operation

In this manual, the following important symbols are used:

Indicates a potentially hazardous situation which, if instructions are not followed, could result in death
or serious injury.

Indicates a potentially hazardous situation which, if instructions are not followed, may result in minor or
moderate injury or damage to property.

Safety Precautions to be Followed

This section explains safety precautions that should always be followed when using this machine.

Environments where the machine can be used


This section explains safety precautions about environments where the machine can be used.

• Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock
might occur.

• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur.

• Make sure the room where you are using the machine is well ventilated and spacious. Good
ventilation is especially important when the machine is used heavily.

17
Handling power cords and power plugs
This section explains safety precautions about handling power cords and power plugs.

• Connect this machine only to a power source that matches the specifications shown in
“Specifications for the Main Unit” in this manual and do not use an extension cord.
• Use of this machine with extension cords and power sources other than those that match the
specifications shown constitutes an electric shock and fire hazard.

• Power cords that are damaged, broken, modified, trapped under heavy objects, pulled hard, or
bent severely are electric shock and fire hazards.

• Disconnect the power plug (by pulling the plug, not the cable) if the power cable or plug becomes
frayed or otherwise damaged.
• If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service
representative to change a new one. Operating the machine with a damaged power cord may
cause an electric shock or fire.
• It is dangerous to handle the plug with wet hands. Doing this may result in receiving an electric
shock.
• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.

• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).

• To disconnect the power cord, pull it out by plug. Do not drag the cord itself. Doing so may result
in damage to the cord, leading to fire or electric shock.
• For safety reason, unplug the power cord from the wall outlet if the machine will not be used for
an extended period of time such as holidays.

Handling the main machine


This section explains safety precautions about handling the main machine.

18
• Turn off the power and disconnect the power plug (by pulling the plug, not the cable) if any of the
following occurs:
• You spill something into the machine.
• You suspect that your machine needs service or repair.
• The external housing of your machine has been damaged.

• Protect the machine from dampness or wet weather, such as rain and snow.

• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.

• If you have to move the machine when the optional paper tray unit is attached, do not push on the
main unit's top section. Doing so can cause the optional paper tray unit to detach, possibly resulting
in injury.

• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine’s upper surfaces can result in malfunctions and/or user injury.

• Contact your service representative if you need to lift the machine (such as when relocating it to
another floor). Do not attempt to lift the machine without the assistance of your service
representative. The machine will be damaged if it topples or is dropped, resulting in malfunction
and risk of injury to users. The machine's various handling areas are for service engineer use only.
Do not touch these areas.

• Do not allow paper clips, staples, or other small metallic objects to fall inside the machine.
• Do not look into the lamp. It can damage your eyes.
• For environmental reasons, do not dispose of the machine or expended supply waste at household
waste collection points. Disposal can take place at an authorized dealer.

19
Handling the machine's interior
This section explains safety precautions about handling the machine's interior.

• To avoid hazardous electric shock or laser radiation exposure, do not remove any covers or
screws other than those specified in this manual.

• The fusing section of this machine might be very hot. Caution should be taken when removing misfed
paper.

• The inside of the machine could be very hot. Do not touch the parts with a label indicating the “hot
surface”. Otherwise, an injury might occur.
• When loading paper, take care not to trap or injure your fingers.
• During operation, rollers for transporting the paper and originals revolve. A safety device has
been installed so that the machine can be operated safely. But take care not to touch the machine
during operation. An injury might occur.
• Fire and breakdown can result from heavy accumulation of dust inside this machine. Consult your
service representative for details about and charges for cleaning the machine's interior.

Handling the machine's supplies


This section explains safety precautions about handling the machine's supplies.

• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open
flame. Dispose of used toner containers in accordance with local regulations.

• Do not incinerate spilled toner or used toner. Toner dust might ignite when exposed to an open
flame.

• Do not store toner, used toner, or toner containers in a place with an open flame. The toner might
ignite and cause burns or a fire.

20
• Disposal can take place at our authorized dealer.

• Keep the polythene materials (bags, gloves, etc.) supplied with this machine away from babies
and small children at all times. Suffocation can result if polythene materials are brought into contact
with the mouth or nose.

• To avoid fire or machine failure, do not use aluminum foil, carbon paper, or similar conductive
paper.

• Do not open toner containers forcefully. Toner can spill, dirtying your clothes or hands, and possibly
resulting in accidental ingestion.

• Keep toner (used or unused) and toner containers out of reach of children.

• If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment.
Consult a doctor if necessary.

• If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult
a doctor if necessary.

• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor
if necessary.

• Avoid getting toner on your clothes or skin when removing a paper jam or replacing toner. If your
skin comes into contact with toner, wash the affected area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and
may make removing the stain impossible.

21
Safety Labels of This Machine
This section explains the machine's safety information labels.

Positions of WARNING and CAUTION labels

This machine has labels for WARNING and CAUTION at the positions shown below. For safety,
please follow the instructions and handle the machine as indicated.

BRA007S

High temperature. Be careful of hot parts when clearing paper jams.

Power Switch Symbols

The meanings of the symbols for the switches on this machine are as follows:
• :POWER ON.
• :STANDBY.

22
Energy Saving Functions
To reduce its power consumption, this machine has the following functions:
Low Power Mode
• If this machine remains idle for a specified period, it automatically reduces its electrical
consumption.
• The default period the machine waits before entering Low Power Mode is 1 minute. This default
time can be changed.
Off Mode (on machines with only copier function)
• If this machine remains idle for a specified period, it automatically turns off its power.
• The default delay time the machine waits before entering Off Mode is 1 minute. This default time
can be changed.
Sleep Mode (on machines with facsimile, printer, or scanner functions)
• If this machine is already in Low Power Mode and remains idle for a specified period, it
automatically enters Sleep Mode to further reduce its electrical consumption.
• The default delay time the machine waits before entering Sleep Mode is 1 minute. This default
time can be changed.
• The machine can print jobs from computers and receive faxes while in Sleep Mode.

Machines with only copier Machines with facsimile, printer,


function or scanner functions

Reduced Electrical Consumption


25 W or less 35 W or less
by Low Power Mode

Time of Switch into Low Power


1 minute 1 minute
Mode

Time of Switch out from Low


10 seconds or less 10 seconds or less
Power Mode

Reduced Electrical Consumption


10 W or less
by Sleep Mode

Time of Switch into Sleep Mode 1 minute

Time of Switch out from Sleep


10 seconds or less
Mode

Reduced Electrical Consumption


1 W or less
by Off Mode

24
Machines with only copier Machines with facsimile, printer,
function or scanner functions

Time of Switch into Off Mode 1 minute

Time of Switch out from Off Mode 10 seconds or less

• For details about how to change the default interval, see “Timer Settings”, Network and System
Settings Guide .

25
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.

Laser Safety

CDRH Regulations
This equipment complies with requirements of 21 CFR Subchapter J for class 1 laser products. This
equipment contains a GaAlAs laser diode, 6.2-milliwatt, 760 - 800 nanometer wavelength for each
emitter. This equipment does not emit hazardous light, since the beam is totally enclosed during all customer
modes of operation and maintenance.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual might
result in hazardous radiation exposure.

Notes to users in the United States of America

FCC Rules
Declaration of Conformity
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired
operation.
Responsible party: Ricoh Americas Corporation
Address: 5 Dedrick Place, West Caldwell, NJ 07006
Telephone number: 973-882-2000

26
Product Name: Multi Function Peripheral
Model Number:
• 917/LD117/MP 171/Aficio MP 171
• 917F/LD117F/MP 171F/Aficio MP 171F
• 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF
Note:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that interference will not occur
in a particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is encouraged to
try to correct the interference by one more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio /TV technician for help.
Caution:
Changes or modifications not expressly approved by the party responsible for compliance could void
the user's authority to operate the equipment.

Notes to users in the state of California


Perchlorate Material - special handling may apply, See www.dtsc.ca.gov/hazardouswaste/perchlorate

27
28
1. Simple Search
You can search for a procedure either by keyword or by what you want to do.

1
Searching by what you want to do
You can search for a procedure by what you want to do.

I want to save my paper document!

You can find explanations of the functions and procedures that you can use to save your paper document
easily.

BRL059S

Printing multi-page documents on both sides of sheets (Duplex Copy)


See “Duplex Copying”, Copy Reference .
Printing multi-page documents and received faxes on a single sheet (Combine (Copier/Fax))
See “Combined Copying”, Copy Reference .
See “Combine Two Originals”, Facsimile Reference .
Printing received faxes on both sides of sheets (Two-Sided Print)
See “Two-Sided Printing”, Facsimile Reference .
Converting received faxes to electronic formats (Paperless Fax)
See “Viewing, Printing, and Deleting Received Fax Documents Using Web Image Monitor”,
Facsimile Reference .

29
1. Simple Search

Sending files from the computer without printing them (LAN-Fax)


See “Sending Fax Documents from Computers”, Facsimile Reference .
Avoiding unwanted faxes
1 See “Program Special Sender”, Facsimile Reference .

I want to convert documents to electronic formats easily!

You can find explanations of the functions and procedures that you can use convert documents to electronic
formats easily.

BQX138S

Sending scan files


See “Basic Procedure for Sending Scan Files by E-mail”, Scanner Reference .
Storing scan files in a shared folder
See “Basic Procedure When Using Scan to Folder”, Scanner Reference .
Storing scan files on media
See “Basic Procedure for Saving Scan Files on a Removable Memory Device”, Scanner Reference
.
Converting received faxes to electronic formats and sending them to a computer
See “Forwarding”, Facsimile Reference .

I want to register destinations!

You can find explanations of the functions and procedures that you can use to register destinations easily.

30
Searching by what you want to do

BRL060S

Using the control panel to register destinations in the address book


See “Programming Destinations from Check Destination Screen”, Facsimile Reference .
See “Programming Destinations from Redial Screen”, Facsimile Reference .
See “Registering a Directly-Entered Destination in the Address Book”, Scanner Reference .
Using Web Image Monitor to registering destinations from a computer
See “To add new receiver”, Facsimile Reference .
Downloading destinations registered in the machine to the LAN-Fax driver destination list
See “Using the Machine's Address Book as the LAN-Fax Destination List”, Facsimile Reference
.

I want to operate the machine more effectively!

You can find explanations of the functions and procedures that you can use to operate the machine more
effectively.

31
1. Simple Search

BQX139S

Registering and using frequently-used facsimile functions (User Function)


See “General Settings/Adjust”, Facsimile Reference .
Changing the initial settings (Copier/Fax/Scanner)
See “Accessing User Tools”, Copy Reference .
See “Accessing User Tools”, Facsimile Reference .
See “Accessing User Tools”, Scanner Reference .
Converting received faxes to electronic formats and sending them to a computer
See “Forwarding”, Facsimile Reference .

32
Searching by Keyword

Searching by Keyword
You can search for a procedure by keyword.
1
Paper

I want to load paper.


p.59 "Loading Paper"
I want to change the paper size.
p.64 "Changing the Paper Size"
I want to know what the paper specifications are.
p.71 "Recommended Paper Sizes and Types"
The paper has jammed.
See “Removing Jammed Paper”, Troubleshooting .
I want to change the initial paper settings.
See “Tray Paper Settings”, Network and System Settings Guide .

Register/Change/Delete

I want to register a fax number.


See “Registering a Fax Destination”, Network and System Settings Guide .
See “Programming Destinations in the Address Book”, Facsimile Reference .
I want to register an IP-Fax number.
See “Registering an IP-Fax Destination”, Network and System Settings Guide .
I want to register an e-mail address.
See “Registering an E-mail Destination”, Network and System Settings Guide .
I want to register an SMB folder.
See “Registering an SMB Folder”, Network and System Settings Guide .
I want to register multiple addresses as a group.
See “Registering Names to a Group”, Network and System Settings Guide .
I want to change the initial settings.
See “Accessing User Tools”, Copy Reference .
See “Accessing User Tools”, Facsimile Reference .
See “Accessing User Tools”, Scanner Reference .

33
1. Simple Search

I want to copy the contents of the machine's address book to the LAN-Fax address book.
See “Using the Machine's Address Book as the LAN-Fax Destination List”, Facsimile Reference
.

1
Settings

I want to specify the forwarding settings.


See “Forwarding”, Facsimile Reference .
I want to specify the Scan to Folder settings.
See “Network Settings Required to Use Scan to Folder Function”, Network and System Settings
Guide .
See “Send Settings”, Scanner Reference .
I want to specify the Scan to E-mail settings.
See “Network Settings Required to Use E-mail Function”, Network and System Settings Guide
.
See “Accessing User Tools”, Scanner Reference .

Forwarding

I want to forward received fax documents to another fax destination.


See “Forwarding”, Facsimile Reference .
I want to forward received fax documents to a folder destination on a computer.
See “Forwarding”, Facsimile Reference .
I want to forward received fax documents to an e-mail address.
See “Forwarding”, Facsimile Reference .
I want to forward received fax documents without printing them.
See “Parameter Settings”, Facsimile Reference .

Install

I want to install the printer driver so I can use the SmartDeviceMonitor for Client port.
See “Using the SmartDeviceMonitor for Client Port”, Printer Reference .
I want to install the printer driver so I can use the Standard TCP/IP port.
See “Using the Standard TCP/IP Port”, Printer Reference .

34
Searching by Keyword

I want to install the printer driver so I can use a Windows Network Printer.
See “Using as a Windows Network Printer”, Printer Reference .
I want to install the printer driver so I can use the machine by USB.
See “Installing the Printer Driver Using USB”, Printer Reference . 1

35
1. Simple Search

36
2. Getting Started
This chapter describes how to start using this machine.

Guide to Components
This section introduces the names and functions of the components. 2
• Do not obstruct the ventilation holes by placing objects near them or leaning things against them. If
the machine overheats, a fault might occur.

BRA045S

1. ADF
If you load a stack of originals in the ADF, the ADF will automatically feed the originals one by one. See “External
items”.
This document feeder can be used for two-sided originals.
2. Exposure glass
Place originals here face down.
3. Internal tray guide
Open out and raise the end fence to support large paper.

37
2. Getting Started

4. Ventilation holes
Prevent overheating.
5. Main power switch
If the machine does not operate after turning on the operation switch, check if the main power switch is turned
on. If it is off, turn it on. See “Turning On/Off the Power”.
6. Main power indicator
2 Lights when the main power switch is turned on, and goes off when the switch is turned off.
7. Operation switch
Press to turn the power on (the operation switch indicator lights up). To turn the power off, press again (the
operation switch indicator goes off). See “Turning On/Off the Power”.
8. Control panel
See “Control Panel”.
9. Internal tray
Copied/printed paper and fax messages are delivered here.
10. Front cover
Open to access the inside of the machine.
11. Paper tray
Load paper here.
12. Paper tray unit (Tray 2 and Tray 3)
See “External items”.

BRA009S

1. Right cover
Open this cover to remove jammed paper fed from the paper tray.
2. Bypass tray
Use to copy or print onto OHP transparencies, adhesive labels, translucent paper, envelopes, and custom size
paper.
3. Lower right covers
Open these covers to remove jammed paper fed from the paper tray unit (Tray 2 and Tray 3).

38
Guide to Components

• p.40 "External Items"


• p.42 "Control Panel"
• p.54 "Turning On/Off the Power"

39
2. Getting Started

Other Items
This section introduces the names and functions of the other main items.

External Items
2 This section provides explanations about external items.

BRA046S

1. Handset
Used as a receiver when a fax unit is installed.
2. Paper tray unit (Tray 2 and Tray 3)
Each paper tray holds up to 500 sheets of paper. Up to two units.
3. Media slot
With this media slot, you can save scan files on a removable memory device.

Internal Items

This section describes the items that can be installed in the machine.
• Printer/Scanner unit
Allows you to use the printer and scanner functions.
• Hard Disk Drive Option
Allows you to use functions such as Collate and sample print in printer mode.
Allows you to send scan files by E-mail or by Scan to Folder in scanner mode.
Allows you to use the Internet fax, and IP-Fax functions in facsimile mode.

40
Other Items

• DataOverWriteSecurity Unit
Allows you to erase data that is stored on the hard disk.
• HDD Encryption Unit
Allows you to encrypt data that is stored on the hard disk.
• VM card
With this card, you can install embedded software architecture applications. 2
• IEEE 1284 Interface Board
Allows you to connect to an IEEE 1284 cable.
• Wireless LAN board
Allows you to install a wireless LAN interface.
• Gigabit Ethernet (1000BASE-T)
Allows you to communicate over 1000BASE-T.

• Only one of the following items can be installed on the machine at any one time: IEEE 1284 Interface
Board, Wireless LAN board.

41
2. Getting Started

Control Panel
This section introduces the names and functions of the components on the control panel.

• Do not turn off the main power switch while the operation switch indicator is lit or blinking. Doing so
2 may damage the hard disk.
This illustration shows the control panel of the machine that has fax and printer/scanner installed.

BRA048S

1. Receive File indicator (facsimile mode)


Remains lit when fax memory receives a file. Flashes for Memory Lock files. See “Types of Reception”, Facsimile
Reference .
2. Communicating indicator (facsimile mode)
Lit during data transmission or reception.
3. [Memory Trans.] key (facsimile mode)
Press to carry out memory transmission. See “Transmission Modes”, Facsimile Reference .
4. [On Hook Dial] key (facsimile mode)
Press this to hear dial and data tones on the fax line while dialing, as if the handset were off the hook. For details,
see “On Hook Dial”, Facsimile Reference .
5. [Facsimile] key
Press to activate the facsimile function. See Facsimile Reference .
6. [Search Destination] key (scanner and facsimile mode)
Press to search for a destination registered in the destination list.
7. [Check Destination] key (scanner and facsimile mode)
Press to check the specified destination.
8. [Job Information] key (scanner and facsimile mode)
Press to obtain status information on transmitted data.
9. [Color Scan] key
Press to scan originals in full color.

42
Control Panel

10. [Scanner] key


Press to activate the scanner function. See Scanner Reference .
11. [Copy] key
Press to activate the copy function. See Copy Reference .
12. [Printer] key
Press to activate the printer function. See Printer Reference
13. Indicators
.
2
Display errors and machine status.
: Alert indicator. See Network and System Settings Guide or “Clearing Misfeeds”, Troubleshooting .
: Load Paper indicator.
: Add Toner indicator.
14. Selection keys
Correspond to items on the display. Press to select the corresponding item.
15. Display panel
Displays operational statuses and messages. See “Display Panel”.
16. Scroll keys
Press to select an item.
[ ]: scrolls upward
[ ]: scrolls downward
[ ]: scrolls right
[ ]: scrolls left
17. Number keys
Press to enter numeric values.
18. [User Tools/Counter] key
• User Tools
Press to change default or operation parameters according to requirement. See “Accessing User Tools”,
Network and System Settings Guide .
• Counter
Press to check or print the counter value. See “Counter”.
19. [Clear Modes] key
Press to clear the current settings.
20. Main power indicator
The main power indicator goes on when you turn on the main power switch.
21. User Function keys (facsimile mode)
You can program frequently used functions in these keys under [Set User Function Key]. See “Fax Features”,
Facsimile Reference .
By default, the following functions are registered:

43
2. Getting Started

[F1] key: Start manual reception


[F2] key: Switch reception mode
[F3] key: Print journal
22. [Resolution] key (facsimile mode)
Press to specify the resolution of the fax. See “Scan Settings”, Facsimile Reference .
23. [Pause/Redial] key (facsimile mode)
2 • Pause
Press to insert a pause in a fax dialing sequence. You cannot insert a pause at the beginning of a sequence.
The pause is indicated by “-”.
• Redial
Press this to select a recently-dialed destination. For details, see “Specifying a Destination”, Facsimile
Reference .
24. Quick Dial keys
Press to enter letters and symbols. See “Entering Text”.
Press to select the registered destination at a single touch.
25. [Online] key (printer mode)
Press to switch between on-line and off-line modes.
26. Data In indicator (printer mode)
Flashes when the machine is receiving print jobs or LAN-Fax documents from a computer. See Facsimile Reference
and Printer Reference .
27. [Combine/Series] key (copier mode)
• Combine
Combines and prints the pages of a multiple-sheet original onto a single sheet. For details, see “Copying”,
Copy Reference .
• Series
Prints each page of a double-page spread as a single-page copy.
28. [Duplex] key (copier mode)
Perform duplex printing when copying a multiple-sheet original. For details, see “Copying”, Copy Reference
.
29. [Sort] key (copier mode)
Press to automatically sort printed copies. See “Copying”, Copy Reference .
30. [Lighter] key, [Darker] key (copier, scanner and facsimile mode)
Press to adjust the scanning density under the copier, scanner and fax functions.
31. [Escape] key
Press to cancel an operation or return to the previous display.
32. [Original] key (copier, scanner and facsimile mode)
Press to select the most suitable scanning method for the original. See “Copying”, Copy Reference , “Scan
Settings”, Facsimile Reference and “Original Type”, Facsimile Reference .

44
Control Panel

33. [OK] key


Press to set a selected item or an entered numeric value.
34. [ ] key (Enter key)
Press to set a selected item or an entered numeric value.
35. [Start] key
Press to start copying, printing, scanning, or sending.
36. [Clear/Stop] key
2
• Clear
Clears an entered numeric value.
• Stop
Stops a job in progress, such as copying, scanning, faxing, or printing.
37. Operation switch
Press to turn the power on (the operation switch indicator goes on). To turn the power off, press again (the
operation switch indicator goes off). See “Turning On/Off the Power”.

• p.46 "Display Panel"


• p.52 "Changing Modes"
• p.54 "Turning On/Off the Power"
• p.83 "Entering Text"
• p.105 "Counter"

45
2. Getting Started

Display Panel
The display panel shows machine status, error messages, and function menus.

• Don't apply strong impact or force to the screen. Or it may be damaged. Maximum force allowable
2 is approx. 30N (approx. 3 kgf). (N = Newton, kgf = Kilogram force. 1 kgf = 9.8N.)
When you select or specify an item on the display panel, it is highlighted like .

• The display panels shown in this manual's illustrations are taken from a machine that has fax and
printer/scanner installed.

Reading the Display and Using Keys

This section explains reading the display panel and using the keys.

BRA050S

1. Selection keys
Correspond to items at the bottom line on the display.
Example: initial copy display
• When the instruction “press [Reduce]” appears in this manual, press the left selection key.
• When the instruction “press [Enlarge]” appears in this manual, press the center selection key.
• When the instruction “press [Zoom]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press to set a selected item or an entered numeric value.

46
Display Panel

4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ],or [ ] appears in this manual, press the scroll key of the same direction.

Changing the Display Language

You can change the language used on the display. English is set as default. 2
1. Press the [User Tools/Counter] key.

BRA052S

2. Select [Language] using [ ] or [ ], and then press the [OK] key.

3. Select the language using [ ] or [ ], and then press the [OK] key.

4. Press the [User Tools/Counter] key.

47
2. Getting Started

When the Authentication Screen is Displayed


This section explains the authentication screen.

• Ask the user administrator for the login user name, login password, and user code. For details about
2 user authentication, contact your administrator.
• User code to enter on User Code Authentication is the numerical value registered in the address book
as “login user name”.
If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication
is active, the authentication screen appears on the display. The machine only becomes operable after
entering your own login user name and login password. If User Code Authentication is active, you cannot
use the machine until you enter the user code.
If you can use the machine, you can say that you are logged in. When you go out of the operable state,
you can say that you are logged out. After logging in the machine, be sure to log out of it to prevent
unauthorized usage.

• If authentication fails, the "Authentication failed." message appears. Check that the login user name
and login password are correct.

User Code Authentication (Using the Control Panel)

This section explains the procedure for logging in to the machine using the control panel while User Code
Authentication is active.
If User Code Authentication is active, a screen prompting you to enter a user code appears.

1. Enter a user code (up to eight digits), and then press the [OK] key.

• To log off, press the operation switch.

48
When the Authentication Screen is Displayed

User Code Authentication (Using a Printer Driver)

This section explains the procedure for logging in to the machine using a printer driver while User Code
Authentication is active.
If User Code Authentication is active, specify the user code in the printer properties of the printer driver.
For details, see the printer driver Help.
2
• When logged in through User Code Authentication, you do not have to log out.

Login (Using the Control Panel)

This section explains the procedure for logging in to the machine when Basic Authentication, Windows
Authentication, LDAP Authentication, or Integration Server Authentication is set.

1. Enter the login user name and then press the [OK] key.

2. Enter the login password and then press the [OK] key.

When the user is authenticated, the screen for the function you are using appears.

• If authentication fails, the "Authentication failed." message appears. Check that the login user name
and login password are correct.

Logout (Using the Control Panel)

This section explains the procedure for logging out the machine when Basic Authentication, Windows
Authentication, LDAP Authentication, or Integration Server Authentication is set.

• To prevent use of the machine by unauthorized persons, always log out when you have finished using
the machine.

49
2. Getting Started

1. Press the [User Tools/Counter] key.


2. Press [Logout].

2
3. Press [Yes].

Login (Using a Printer Driver)

This section explains the procedure for logging in to the machine using a printer driver.
If Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication
is active, make encryption settings in the printer properties of the printer driver, and then specify a login
user name and password. For details, see the printer driver Help.

• When logged in using a printer driver, you do not have to log out.

Login (Using Web Image Monitor)

This section explains the procedure for logging in to the machine via Web Image Monitor.

1. Click [Login].
2. Enter a login user name and password, and then click [Login].

• For user code authentication, enter a user code in [User Name], and then click [OK].

Logout (Using Web Image Monitor)

This section explains the procedure for logging out the machine via Web Image Monitor.

1. Click [Logout] to log out.

50
When the Authentication Screen is Displayed

• Delete the cache memory of a Web browser after logging out.

51
2. Getting Started

Changing Modes
This section explains how to change modes.
The following illustration shows screens that appear when the fax and printer/scanner unit are installed.

BRA054S

• You cannot switch modes in any of the following situations:


• When scanning a fax message for transmission
• During immediate transmission
• When accessing User Tools / Counter
• During On-hook dialing for fax transmission
• While scanning an original
• The copy display is set as the default screen when the machine is turned on. You can change this
default setting under Function Priority. See “System Settings”, Network and System Settings Guide
.

System Reset

This section explains System Reset.


After finishing a job, the machine waits a specified length of time and then restores its settings to the default
values specified under Function Priority. This function is called “System Reset”. For the procedure for
specifying default settings under Function Priority, see “System Settings”, Network and System Settings
Guide .

52
Changing Modes

To change the length of time that the machine waits before restoring its settings to their default values, use
the System Auto Reset Timer setting. See “System Settings”, Network and System Settings Guide .

53
2. Getting Started

Turning On/Off the Power


This section discusses how to turn on/off the power.
Power supply
This machine has two power switches: operation switch and main power switch.

2 • Operation switch (right side of the control panel)


Press to activate the machine. When the machine has finished warming up, you can make use
of each function.
• Main power switch (left side of the machine)
Turning off this switch makes the main power indicator on the right side of the control panel go
off. When this is done, machine power is completely off. When the fax unit is installed, fax files
in memory may be lost if you turn this switch off. Use this switch only when necessary.

• This machine automatically enters Energy Saver mode or turns itself off if you do not use it for a while.
To specify the time that the machine waits before it enters Energy Saver mode and/or turns itself off,
configure the Energy Saver Timer and/or Auto Off Timer setting, respectively. See “System Settings”,
Network and System Settings Guide .

Turning On the Main Power

This section explains how to turn on the main power.

• Do not turn off the main power switch immediately after turning it on. Doing so may result in damage
to the memory, leading to malfunctions.

1. Make sure the power cord is firmly plugged into the wall outlet.
2. Turn on the main power switch.
The main power indicator goes on.

BRA056S

54
Turning On/Off the Power

• After you switch the main power on, a screen may appear to indicate that the machine is initializing.
Do not switch the power off during this process. Initialization takes about three minutes.

Turning On the Power

This section explains how to turn on the power.


2
1. Press the operation switch.
The operation switch indicator goes on.

BRA057S

• If the power does not come on when the operation switch is pressed, check the main power switch is
on. If it is off, turn it on.

Turning Off the Power

This section explains how to turn off the power.

1. Press the operation switch.


The operation switch indicator goes off.

55
2. Getting Started

2
BRA057S

• Even if you press the operation switch, the operation switch indicator does not go out, but blinks during
communication with external equipment.

Turning Off the Main Power

This section explains how to turn off the main power.

• Do not turn off the main power switch when the operation switch indicator is lit or blinking. Doing so
may result in damage to the memory.
• Make sure to turn off the main power switch before pulling out the power plug. Not doing so may
result in damage to the memory.

1. Make sure the operation switch indicator is not lit.


2. Turn off the main power switch.
The main power indicator goes out.

• When the main power switch is turned off while using the fax function, waiting fax and print jobs may
be cancelled, and incoming fax documents not received. If you have to turn off this switch for some
reason, make sure 100% is shown as available memory on the screen before turning off the main
power switch or unplugging the power cord. Fax files in memory are deleted twelve hours after you
turn off the main power switch or unplug the power cord.
• For details, see “Turning Off the Main Power / In the Event of Power Failure”, Troubleshooting
.

Saving Energy

This section explains the machine's energy saving functions.

56
Turning On/Off the Power

This machine has the following energy saving function.


Auto Off (Copier only)
The machine automatically turns itself off when the job is finished, after a certain period of time has
elapsed. This function is called “Auto Off”. You can change the Auto Off time under Auto Off Timer.

• See “System Settings”, Network and System Settings Guide . 2


• The Energy Saver and Auto Off functions will not operate in the following cases:
• When a warning message appears
• When the service call message appears
• When paper is jammed
• When the cover is open
• When the "Add toner." message appears
• When toner is being replenished
• When the User Tools screen is displayed
• When fixed warm-up is in progress
• When data is being processed
• When operations are suspended during printing
• When the On-hook dialing function is in use
• When a recipient is being registered in the address list or group dial list
• When the Data In indicator is on or blinking

57
2. Getting Started

58
3. Adding Paper
This chapter describes recommended paper sizes and types, and how to load paper into the paper tray.

Loading Paper
This section describes how to load paper into the paper tray.

• When loading paper, take care not to trap or injure your fingers. 3

• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine’s upper surfaces can result in malfunctions and/or user injury.

• Fan the paper before loading.


• Straighten curled or warped paper before loading.
• For details about paper sizes and types, see “Recommended Paper Sizes and Types”.
• To load paper in the bypass tray, see “Copying from the Bypass Tray”, Copy Reference .

• p.71 "Recommended Paper Sizes and Types"

Loading Paper into the Paper Trays

This section describes how to load paper into the paper trays.

• Various sizes of paper can be loaded in the paper trays by adjusting the positions of side fences and
end fence.
• Check the paper edges are aligned with the right side.
• Do not stack paper over the limit mark.

59
3. Adding Paper

1. Carefully pull out the paper tray until it stops.

3
BRA017S

2. Press the metal plate down until it clicks.

BRA018S

3. Square the paper and load it print side up.


Do not stack paper over the limit mark.

BRA019S

4. Carefully push the paper tray fully in.

• The illustrations above show Tray 1.


• When using the optional paper tray unit (Tray 2 and Tray 3), load paper flush against the right side
of the tray. Space between the paper and the tray's sides can cause misfeeds.

60
Loading Paper

• p.64 "Changing the Paper Size"

Orientation-Fixed Paper or Two-Sided Paper

This section describes loading paper that has a specified orientation and printing side (such as letterhead
paper).
Orientation-fixed (top to bottom) or two-sided paper (for example, letterhead paper, punched paper, or
copied paper) might not print correctly, depending on how the originals and paper are placed. Set 3
[Letterhead Setting] to [On] under [Copier Features], and then place the original and paper as shown
below. For details about Letterhead Setting, see “Copier Features”, Copy Reference . For details about
printing with the printer function, see “Printer Features”, Printer Reference .
Original Orientation

Exposure glass ADF

• Copier *2

• Scanner
*1 *1

*1 When making copies using the duplex function in this orientation by setting [Always Specify] for
[Orientation] with [Copier Features] in User Tools, specify for the original orientation.
*2 When making copies using the duplex function in this orientation, and loaded paper orientation is ,
place originals as shown below.

Under [Copier Features], if [Orientation] is set to [Always Specify], load paper in orientation.

61
3. Adding Paper

Paper Orientation

BRA020S

62
Loading Paper

BRA021S

• In [Tray Paper Settings] under [System Settings], specify [Letterhead] for “Paper Type” of the paper
tray you want to use. This setting is only available when the printer/scanner and fax units are installed.
See “Tray Paper Settings”, Network and System Settings Guide .

63
3. Adding Paper

Changing the Paper Size


This section describes how to change the paper size.
Procedures for changing the paper size differ depending on the paper tray (Tray 1 or the optional paper
tray unit). Make sure you are following the appropriate procedure before you begin.

• Be sure to select the paper size with User Tools. If you do not, misfeeds might occur. For details, see
“Selecting the Paper Size with User Tools”.
3 • Fan the paper before loading.
• Straighten curled or warped paper before loading.
• For details about paper sizes and types, see “Recommended Paper Sizes and Types”.

• p.69 "Selecting the Paper Size with User Tools"


• p.71 "Recommended Paper Sizes and Types"

Changing the Paper Size in the Paper Tray (Tray 1)

This section describes how to change the paper size in the paper tray (Tray 1).

• If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side
fences may slip out of place.
• Do not stack paper over the limit mark.
• Check the paper edges are aligned with the right side.

1. Check that paper in the paper tray is not being used, and then pull the tray carefully out
until it stops.

BRA017S

2. Remove paper if loaded.

64
Changing the Paper Size

3. While pinching the release levers, pull the end fence off from the tray.

3
BRA022S

4. While pressing down the release levers, slide the side fences until they are aligned with the
paper size you want to load.
Make sure there are no gaps between the paper and side fences.

BRA024S

5. While pinching the release levers, set the end fence to the paper size you want to load.
Make sure there are no gaps between the paper and end fence.

BRA025S

To load A4 size paper, place the end fence in the corner pocket on the left.

65
3. Adding Paper

3 BRA023S

6. Press the metal plate down until it clicks.

BRA018S

7. Square the paper and load it print side up.


Do not stack paper over the limit mark.

BRA019S

8. Carefully slide the paper tray fully in.

• When setting small quantities of paper, be careful not to squeeze in the side fence too much. Paper
might not feed in properly if the side fences are too tight against the paper's edges.

66
Changing the Paper Size

Changing the Paper Size in the Optional Paper Tray Unit (Tray 2 and Tray 3)

This section describes how to change the paper size in the optional paper tray unit (Tray 2 and Tray 3).

• If a paper tray is pushed vigorously when putting it back into place, the position of the tray's side
fences may slip out of place.
• Do not stack paper over the limit mark.
• Check the paper edges are aligned with the right side.
3
1. Check that paper in the paper tray is not being used, and then pull the tray carefully out
until it stops.

BRA026S

2. Remove paper if loaded.


3. While pressing down the release lever, slide the side fence until it is aligned with the paper
size you want to load.
Make sure there are no gaps between the paper and side fence.

BRA027S

4. While pinching the release levers, slide the end fence until it is aligned with the paper size
you want to load.
Make sure there are no gaps between the paper and end fence.

67
3. Adding Paper

3 BRA028S

To load 81/4×14 or 81/2×14 size paper, pull the end fence out of the tray and place it in the
corner pocket on the left.

BRA042S

5. Press the metal plate down until it clicks, and then square the paper and load it print side
up.
Do not stack paper over the limit mark.

BRA029S

6. Carefully slide the paper tray fully in.

• When setting small quantities of paper, be careful not to squeeze in the side fence too much. Paper
might not feed in properly if the side fence is too tight against the paper's edge.

68
Changing the Paper Size

Selecting the Paper Size with User Tools

This section describes how to select a paper size with User Tools.

1. Press the [User Tools / Counter] key.

BRA052S

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Tray Paper Settings] using [ ] or [ ], and then press the [OK] key.

4. Select “Paper Size” for the paper tray of which paper size will be changed using [ ] or
[ ], and then press the [OK] key.

5. Select the paper size using the scroll keys, and then press the [OK] key.

69
3. Adding Paper

6. Press the [User Tools / Counter] key.


The initial display is shown.
7. Load the paper, and then gently push the paper tray all the way in.
8. Check the paper size on the display panel.

70
Recommended Paper Sizes and Types

Recommended Paper Sizes and Types


This section describes recommended paper sizes and types.

• If you use damp or curled paper, a staple clogging or paper jam may occur.
Paper tray (Tray 1)

Paper type and weight Metric version Inch version Paper capacity

Standard paper A4 , A5 , B5 JIS (Japanese Industrial 250 sheets


3
Standard) , 81/ × 11 , 51/ × 81/ , 16K
2
60 - 90 g/m , 16 - 24 2 2 2
lb.

Paper tray unit (Tray 2 and Tray 3)

Paper type and weight Metric version Inch version Paper capacity

Standard paper A4 , 81/2 × 14 , 81/2 × 13 , 81/2 × 11 500 sheets


60 - 90 g/m2, 16 - 24 , 81/4 × 14 , 81/4 × 13
lb.

Bypass tray

Paper type and weight Metric version Inch version Paper capacity

Standard paper A4 , A5 , B5 JIS , 81/2 × 14 , 81/2 × 100 sheets


60 - 157 g/m2, 16 - 11 , 5 /2 × 81/2
1 , 71/4 × 101/2 , 8 ×
42 lb. 13 , 8 /2 × 13 , 8 /4 × 14 , 81/4 × 13
1 1

, 41/8 × 91/2 , 37/8 × 71/2 , 16K

Standard paper Custom size Custom size 100 sheets


60 - 157 g/m2, 16 - Vertical: 90.0 - 216.0 Vertical: 3.55 - 8.50
42 lb. mm inches
Horizontal: 139.0 - Horizontal: 5.48 -
600.0 mm *1 23.62 inches *1

Translucent paper A4 10 sheets

OHP transparencies A4 , 81/2 × 11 10 sheets

Label paper (adhesive A4 1 sheet


labels)

71
3. Adding Paper

Paper type and weight Metric version Inch version Paper capacity

Envelope *2 Com10 , Monarch , C5 , C6 , DL Env. Up to 10.5 mm (0.4


inches) high

*1 Press the [ ] key, select [Custom Size], and then enter the paper size using the number keys.
*2 Press the [ ] key, and then select the paper size.

3 • Certain types of paper produce noise when delivered. This noise does not indicate a problem and
print quality is unaffected. (Glossy paper and OHP transparencies can produce noise when
delivered.)
• When using translucent paper or label paper, make sure to select the appropriate paper type. For
details about Paper Type: Bypass Tray, see “System Settings”, Network and System Settings Guide
.
• When loading paper in the paper tray and the optional paper tray unit, place the print side face up.
• When loading paper in the bypass tray, place the print side face down.
• When you use the bypass tray, it is recommended to set the paper direction to .
• Do not use paper designed for inkjet printers, as these may stick to the fusing unit and cause a misfeed.
• When loading thick paper (91 - 157 g/m2, 25 - 42 lb.), or adhesive labels, make sure the top of
the stack is no higher than the upper limit of the bypass tray. Paper capacity varies depending on the
thickness and condition of the paper.
• When using thick paper (91 - 157 g/m2, 25 - 42 lb.), select [Thick Paper] as the paper type for the
bypass tray. For details, see “Copying from the Bypass Tray”, Copy Reference .
• When copying onto adhesive labels, in bypass settings, select [Thick Paper] for the special paper
setting.
• When loading OHP transparencies, select [OHP (Transparency)] as the paper type for the bypass
tray. For details, see “Copying from the Bypass Tray”, Copy Reference .
• When you load OHP transparencies, check the front and back of the sheets, and place them correctly,
or a misfeed might occur. Use A4 or 81/2 × 11 size transparencies, and specify their size. For
details, see Copy Reference and Printer Reference .
• When you use OHP transparencies, fan them for each use.
• We recommend you load OHP transparencies and sheets of label paper and translucent paper one
by one. This prevents them becoming jammed inside the machine.
• Also, be sure to remove printed OHP transparencies and sheets of translucent paper one by one as
they are delivered. This prevents them sticking together.
• We recommend that you use a 4000ANSI lumen or brighter overhead projector to project OHP
transparencies.

72
Recommended Paper Sizes and Types

• If multiple sheet feeding occurs, load sheets one by one.


• Flatten out curled sheets before loading them.
• To print on envelopes from the bypass tray: select [System Settings], [Tray Paper Settings], and then,
for the [Paper Type: Bypass Tray] setting, specify [Thick Paper].
• When copying or printing onto letterhead paper, the paper placing orientation is different depending
on which function you are using. See “Orientation-Fixed Paper or Two-Sided Paper”.
• If you load paper of the same size in two or more trays, the machine automatically shifts to another
tray when the first tray in use runs out of paper. This function is called Auto Tray Switching. (However,
if the paper type of one tray is recycled or special paper, the settings of the other trays must be the
same for the Auto Tray Switching function to work.) This saves interrupting a copy run to replenish
3
paper when making a large number of copies. You can set the paper type of the paper trays under
Paper Type: Tray 1 - 3. See “System Settings”, Network and System Settings Guide . For the setting
procedure of the Auto Tray Switching function, see “Copier Features”, Copy Reference .
• When copying or printing onto prepunched paper, the copy/print speed is slower than usual.
• The paper types you can select in [System Settings] are only general classifications. Copy quality for
every kind of paper in a classification is not guaranteed. See “Unusable Paper” for more information.

• p.61 "Orientation-Fixed Paper or Two-Sided Paper"


• p.76 "Unusable Paper"

73
3. Adding Paper

Envelopes
This section describes loading envelopes.

• This machine can print only on the envelopes listed below. Note that even the envelopes listed here
can still become jammed if their flaps are too long or unusually shaped.

Envelope types Supported


3
Supported

BAV026S

Supported

BAV027S

Supported

BAV028S

• To print on envelopes, load them on the bypass tray and be sure to specify the appropriate paper
type. See “Copying from the Bypass Tray”, Copy Reference and “Setting Paper on the Bypass
Tray”, Printer Reference .
• Specifications for envelopes are as follows:

Metric version Inch version

Weight 72 - 90 g/m2 19 - 24 lb.

74
Envelopes

Metric version Inch version

Recommended weight and 80 g/m2, 114 × 229 mm 24 lb., 41/8 × 91/2 (Com10)
size (C5/6)
80 g/m2, 114 × 162 mm (C6)
95 g/m2, 162 × 229 mm (C5)

• Before loading envelopes, flatten their leading edges (the edge going into the printer) by running a
pencil or ruler across them. 3
• Some kinds of envelope might cause misfeeds, wrinkles or print poorly.
• Print quality on envelopes may be uneven if parts of an envelope have differing thicknesses. Print one
or two envelopes to check print quality.
• In a hot and humid environment, the envelope might be output creased or improper printing quality.

75
3. Adding Paper

Unusable Paper
This section describes paper unusable on this machine.

• To avoid fire or machine failure, do not use aluminum foil, carbon paper, or similar conductive
paper.

3 • To prevent faults, do not use any of the following kinds of treated paper:
• Paper for inkjet printers
• Thermal fax paper
• Art paper
• Aluminum foil
• Carbon paper
• Conductive paper
• Paper with perforated lines
• Hemmed-edge paper
• Tab stock
• Certain types of OHP transparencies for color printing cannot be used. For details about types that
can be used, contact your sales or service representative.
• Faults can occur if you copy or print onto sides that are already printed. Take care to copy or print
onto unprinted sides only.

• To prevent misfeeds, do not use the following kinds of paper:


• Bent, folded, or creased paper
• Perforated paper
• Slippery paper
• Torn paper
• Rough paper
• Thin paper with little stiffness
• Paper with a dusty surface
• If you copy or print onto rough grain paper, the output image might be blurred.
• Do not load sheets that have already been printed onto by another machine. (Sheets can become
jammed if they have been improperly stored.)

76
Paper Storage

Paper Storage
This section describes how to store paper.
• When storing paper, the following precautions should always be followed:
• Do not store paper where it will be exposed to direct sunlight.
• Avoid storing paper in humid areas (humidity: 70% or less).
• Store on a flat surface.
• Do not store paper vertically.
3
• Under high temperature and humidity conditions, or low temperature and humidity conditions, store
paper in plastic bags.

77
3. Adding Paper

78
4. Adding Toner
This chapter explains how to replenish toner when it runs out.

Adding Toner
This section describes how to add and store toner.

• Do not incinerate used toner or toner containers. Toner dust might ignite when exposed to an open
flame. Dispose of used toner containers in accordance with local regulations.

4
• Keep toner (used or unused) and toner containers out of reach of children.

• If toner or used toner is inhaled, gargle with plenty of water and move into a fresh air environment.
Consult a doctor if necessary.

• If toner or used toner gets into your eyes, flush immediately with large amounts of water. Consult
a doctor if necessary.

• If toner or used toner is swallowed, dilute by drinking a large amount of water. Consult a doctor
if necessary.

• Avoid getting toner on your clothes or skin when removing a paper jam or replacing toner. If your
skin comes into contact with toner, wash the affected area thoroughly with soap and water.
• If toner gets on your clothing, wash with cold water. Hot water will set the toner into the fabric and
may make removing the stain impossible.

• Do not open toner containers forcefully. Toner can spill, dirtying your clothes or hands, and possibly
resulting in accidental ingestion.

79
4. Adding Toner

• Always add toner when the machine instructs you.


• Fault may occur if you use toner other than the recommended type.
• When adding toner, do not turn off the operation switch. If you do, settings will be lost.
• Store the toner bottles in a cool, dry place free from direct sunlight.
• Store the toner bottles on a flat surface.
• Do not repeatedly install and remove toner cartridges. This will result in toner leakage.
• Do not shake the removed toner cartridge. Remaining toner might scatter.

4 • You can make about 50 copies even after the


toner early to prevent poor copy quality.
Add Toner indicator begins flashing, but replace

Replacing Toner

This section describes how to replace the toner cartridge.

80
Adding Toner

BRA030S

• Do not remove the cap before shaking.


• Do not remove the inner cap.

Sending Faxes or Scanned Documents When Toner Has Run Out

When the machine has run out of toner, the indicator on the display lights. Note that even if there is no
toner left, you can still send faxes or scanned documents.

• If number of communications executed after the toner has run out and not listed in the automatically
output Journal exceeds 100, communication is not possible.

1. Make sure the machine is in facsimile or scanner mode.

81
4. Adding Toner

2. Press [Exit], and then perform transmission operation.


The error message disappears.

• Any reports are not printed.


• If the fax or scanner screen does not appear in step 1, press the [Facsimile] key or the [Scanner] key.

Used Toner

Toner cannot be re-used.


Bring the stored used container to your sales representative or service representative for recycling through
4 our recycling system. If you discard it on your own, treat it as general plastic waste material.

82
5. Entering Text
This chapter describes how to enter characters.

Entering Text
This section explains how to enter text.
When you enter a character, it appears at the position of the cursor. If there is a character already at the
cursor position, the entered character appears before that.

Available Characters

This section explains which characters are available.


You can enter the following characters: 5
• Alphabetic characters
• Symbols
• Numerals
0123456789

Keys

This section explains the keys for entering text.

BRA059S

1. [Shift] key ([Quick Dial 13] key)


Press to switch between lowercase, uppercase, User Text, and Cyrillic characters.
2. [Space] key ([Quick Dial 14] key)
Press to enter a space.

83
5. Entering Text

3. [Symbols] key ([Quick Dial 15] key)


Press to enter symbols.
Number keys
Use to enter numbers.
[Quick Dial 01] key to [Quick Dial 09] key (A to Z)
Press these to enter upper and lower case letters.
[Clear/Stop] key
Deletes a character at the cursor position. You can delete a character at the right end of a line even
if the cursor is placed to the right of the character.
Scroll keys
Shifts the cursor up, down, left and right.

5 • Cyrillic characters are available with the Keyboard Type D only.

How to Enter Text

You can enter characters using the [Quick Dial 01] to [Quick Dial 09] keys. To enter a letter, press the key
repeatedly until the required letter appears.
The language selected using the control panel determines which characters can be entered. There are four
types of keyboard. For each type, you can enter the characters used in the following languages:

Keyboard Type Language

Type A English, Turkish

English, French, German, Italian, Spanish, Dutch, Norwegian, Danish, Swedish,


Type B
Portuguese, Finnish, Catalan

Type C Polish, Hungarian, Czech

Type D Russian

• Depending on the machine type or function you are using, some characters may not be available.

84
Entering Text

Entering letters

1. Press the [Shift] key to switch between lowercase, uppercase, User Text, and Cyrillic
characters.

2. Press the appropriate Quick Dial key repeatedly until the letter that you require appears.

5
3. To enter additional letters, repeat step 2.
If the next letter you want to enter is assigned to the same Quick Dial key, move the cursor by pressing
[ ], and then press the Quick Dial key. The cursor moves to the right and the next letter appears on
the display.
Keyboard Type A

BRA032S

Keyboard Type B
Press one of the following Quick Dial keys to display a basic letter, and then press the [Quick Dial
16] key to select one of its variations.

85
5. Entering Text

BRA033S

Keyboard Type C
This keyboard type allows you to enter Polish, Hungarian, and Czech letters. Press one of the following
Quick Dial keys to display a basic letter, and then press the [Quick Dial 16] key to select one of its
variations.

86
Entering Text

BRA034S

Keyboard Type D
This keyboard type allows you to enter Russian letters. Press the [Shift] key to enter Cyrillic character
mode. To enter a letter, press the corresponding Quick Dial key indicated in the table below. Press
the key repeatedly until the required letter is displayed.

87
5. Entering Text

5 BRA035S

• To enter a character repeatedly, press a Quick Dial key again.


• To insert a character, press [ ] or [ ] to move the cursor to the position you want to insert.

Entering symbols

1. Press the [Symbols] key.


2. Select a symbol using the scroll keys.

3. Press the [OK] key.


This will enter the symbol and shift the cursor.
Depending on the selected keyboard type, you can enter the following symbols.

88
Entering Text

Keyboard Type A

BRA036S

Keyboard Type B

BRA037S

89
5. Entering Text

Keyboard Type C

5
BRA038S

Keyboard Type D

BRA039S

90
Entering Text

Entering numbers

1. Press the number keys.

BRA060S

The number is entered and the cursor moves.


5
Deleting characters

1. Use [ ] or [ ] to move the cursor to the character you want to delete.

2. Press the [Clear/Stop] key.

This will delete the character at the cursor position. You can delete a character at the right end of a
line even if the cursor is placed to the right of the character.

Adding user text


You can select and use a User Text that is registered in [Prog/Change/Del User Text].
For the registration procedure under [Prog/Change/Del User Text], see “System Settings”, Network and
System Settings Guide .

91
5. Entering Text

1. Press the [Shift] key repeatedly to display [User Text].

2. Select the text you want to add using [ ] or [ ], and then press the [OK] key.

3. To modify the selected text, press the Quick Dial keys to enter letters, and then press the
[OK] key.
5

92
6. Operating Instructions
This chapter describes the Operating Instructions of this machine.

Installing Operating Instructions


The supplied CD-ROMs contain HTML format manuals. For easy access, we recommend you install the
manuals on a computer.

• The “Manuals for Administrators” CD-ROM that includes Security Reference is for administrators of
the machine.
• The system requirements for installing the manuals are as follows:
• Operating system: Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008
• Minimum display resolution: 800 × 600 pixels
• Recommended browser: Microsoft Internet Explorer 4.01 SP2 or later
• Non-recommended browsers can display the simplified manual only. 6
• HTML manuals can also be viewed on a Macintosh.
• Hyperlinks might not work and referenced sections might not appear unless all the HTML manuals
have been installed. To display referenced sections, be sure to install all the HTML manuals.

1. Select a language and a product, and then click [OK].


2. Click [Install manuals].
If you want to read manuals from the CD-ROM, click [Read HTML manuals] or [Read PDF manuals].
3. Install the manual you require according to the displayed instructions.
4. When installation is complete, click [Finish].
5. Click [Finish].

• If you cannot install a manual, copy the “MANUAL_HTML” folder to your computer's hard drive, and
then run “Setup.exe”.
• To delete an installed manual, on the [Start] menu, click [Programs], then [Product Name], and then
uninstall the data.
• If you are installing the manuals on a Macintosh, open the “Manuals.htm” file on the CD-ROM.

PDF Manuals

The supplied “Manuals” CD-ROM contains PDF manuals.

93
6. Operating Instructions

File path
The PDF manuals are in the following folder on the CD-ROM:
MANUAL_PDF\ENGLISH

• To view the PDF manuals, you need to have Adobe Acrobat Reader/Adobe Reader installed on your
computer.

94
How to Use the Operating Instructions

How to Use the Operating Instructions


This section explains how to use manuals.

Opening from the Icon 6


This section explains how to open a manual using its desktop icon.

1. Double-click the icon on your desktop.

The browser opens and the manual appears.

Opening from the [Start] Menu

This section explains how to open a manual from the [Start] menu.

1. On the [Start] menu, point to [Programs] (Windows XP: [All Programs]), then [Product
Name], and then click the manual you want to view.
The browser opens, and then the manual appears.

• Depending on the settings made during installation, menu folder names may differ.

95
6. Operating Instructions

Opening from the CD-ROM

This section explains how to open a manual from the supplied CD-ROMs.

1. Click [Read HTML manuals].


2. Click the title of the manual you want to view.
The browser opens, and then the manual appears.

96
7. Remarks
This chapter describes how to maintain and operate the machine.

Dos and Don'ts


The following items should be followed during use of this machine.

• Keep the machine away from flammable liquids, gases, and aerosols. A fire or an electric shock
might occur.

• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.

• Do not turn the power off while the operation switch indicator is lit or blinking. Doing so may damage
the memory.
• Before unplugging the power cord or turning off the main power switch, make sure remaining memory 7
space is at 100%, as shown on the screen. See “Turning On/Off the Power”.
• Do not touch areas on or around the fusing unit. These areas get hot.
• After scanning originals continuously, the exposure glass may become warm - this is not a malfunction.
• The area around the ventilation holes might feel warm. This is caused by exhaust air and is not a
malfunction.
• When the machine is not in use and in stand-by mode, you may hear a small noise inside. This is
caused by the image stabilization process and is not a malfunction.
• When you use this machine for a long time in a confined space without good ventilation, you may
detect an odd smell. To keep the workplace comfortable, we recommend that you keep it well
ventilated.
• If the machine is moved from a cold to a warm place, condensation may form inside it. After moving
the machine, do not use it for at least an hour. The machine requires this time to adapt to its new
environment.
• The machine will malfunction if its internal temperature becomes too high. Be sure not to block the
intake and exhaust vents.
• Do not turn off the power while the machine is in operation. See “Turning On/Off the Power”.
• Do not open the covers of the machine when it is in operation. If you do, misfeeds might occur.
• Do not move or tilt the machine when the power is on.

97
7. Remarks

• Do not allow small objects such as paperclips to fall into or become stuck inside the machine.
• Do not knock the machine while it is operating (for instance, do not use the machine's surfaces to
knock stacks of paper into square).
• Depending on the ambient temperature and humidity, steam may come from the exhaust vent behind
the control panel during printing. This is water vapor from the paper, not a sign of malfunction.
• The machine might not produce good copy images if condensation forms inside as a result of rapid
temperature change.
• Be sure to make a note of the registered machine settings in case they are lost due to accident or
malfunction.
• The supplier shall not be liable for any loss or damage resulting from a failure of the machine, loss of
settings, or use of the machine.

• p.54 "Turning On/Off the Power"

98
Where to Put Your Machine

Where to Put Your Machine


This section describes precautions for installation and movement.

Machine Environment

Choose your machine's location carefully.


Environmental conditions greatly affect its performance.

Moving
This section describes precautions when moving the machine.

• Contact your service representative if you need to lift the machine (such as when relocating it to
another floor). Do not attempt to lift the machine without the assistance of your service
representative. The machine will be damaged if it topples or is dropped, resulting in malfunction
and risk of injury to users. The machine's various handling areas are for service engineer use only.
Do not touch these areas.
7
• Before moving the machine, be sure to disconnect all external connections, especially the power
cord from the wall outlet. Damaged power cords are a fire and electric shock hazard.

• If you have to move the machine when the optional paper tray unit is attached, do not push on the
main unit's top section. Doing so can cause the optional paper tray unit to detach, possibly resulting
in injury.

• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.

• Be careful when moving the machine. Take the following precautions:


• Turn off the main power. For details about how to turn the main power off, see “Turning On/Off
the Power”.

99
7. Remarks

• Unplug the power cord from the wall outlet. When you pull out the plug from the socket, grip
the plug to avoid damaging the cord, thereby reducing the risk of fire or electric shock.
• Close all covers and trays, including the front cover and bypass tray.
• Keep the machine level and carry it carefully, taking care not to jolt or tip it. Rough handling
may cause a malfunction or damage the memory, resulting in loss of stored files.
• Do not take off the holding stand.

• p.54 "Turning On/Off the Power"

Optimum environmental conditions


This section describes precautions when locating the machine.

• Keep the machine away from humidity and dust. Otherwise a fire or an electric shock might occur.
• Do not place the machine on an unstable or tilted surface. If it topples over, an injury might occur.

7 • Make sure the room where you are using the machine is well ventilated and spacious. Good
ventilation is especially important when the machine is used heavily.

• Temperature: 10-32 °C (50-89.6 °F) (humidity to be 54% at 32 °C, 89.6 °F)


• Humidity: 15-80% (temperature to be 27 °C, 80.6 °F at 80%)
• A strong and level base.
• The machine must be level within 5 mm, 0.2 inches: both front to rear and left to right.
• To avoid possible buildup of ozone, make sure to locate this machine in a large well ventilated room
that has an air turnover of more than 30 m3/hr/person.

Environments to avoid
This section describes precautions about environments to avoid.
• Locations exposed to direct sunlight or other sources of strong light (more than 1,500 lux).
• Locations directly exposed to cool air from an air conditioner or heated air from a heater. (Sudden
temperature changes can cause condensation to form inside the machine.)
• Locations close to machines generating ammonia, such as a diazo copy machine.
• Places where the machine will be subject to frequent strong vibration.
• Dusty areas.

100
Where to Put Your Machine

• Areas with corrosive gases.

Access to the machine


This section describes the clearance areas to be provided when placing the machine.
Place the machine near the power source, providing the clearance areas shown.

BJB012S

1. Rear: 6 cm (2.4 inches) or more


2. Right: 1 cm (0.4 inches) or more
3. Front: 75 cm (29.6 inches) or more
4. Left: 1 cm (0.4 inches) or more 7
• For the required space when additional items are installed, contact your service representative.

Power Connection

This section describes power supply.

• Connect this machine only to a power source that matches the specifications shown in
“Specifications for the Main Unit” in this manual and do not use an extension cord.
• Use of this machine with extension cords and power sources other than those that match the
specifications shown constitutes an electric shock and fire hazard.

• Power cords that are damaged, broken, modified, trapped under heavy objects, pulled hard, or
bent severely are electric shock and fire hazards.

101
7. Remarks

• If the power cord is damaged (exposure of the core, disconnection, etc.), contact your service
representative to change a new one. Operating the machine with a damaged power cord may
cause an electric shock or fire.

• Unplug the power cord from the wall outlet before you move the machine. While moving the
machine, you should take care that the power cord will not be damaged under the machine.

• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).

• To disconnect the power cord, pull it out by plug. Do not drag the cord itself. Doing so may result
in damage to the cord, leading to fire or electric shock.

• Make sure the plug is inserted firmly in the wall outlet.


• Voltage must not fluctuate by more than 10%.
7 • The wall outlet shall be installed near the machine and shall be easily accessible.

• p.113 "Specifications for the Main Unit"

102
Maintaining Your Machine

Maintaining Your Machine


If the exposure glass, scanning glass, or ADF is dirty, copy clarity may be reduced. Clean these parts if
they are dirty.

• Do not use chemical cleaners or organic solvents, such as thinner or benzene. If such substances get
inside the machine or melt plastic parts, a failure might occur.
• Do not clean parts other than those explicitly specified in this manual. Other parts should only be
cleaned by your service representative.
How to maintain
Cleaning the machine: Wipe the machine with a soft, dry cloth. If this does not remove the dirt, wipe
the machine with a damp and tightly wrung cloth. If a damp cloth still does not remove the dirt, try
using a mild detergent. Wipe the machine with a dry cloth to remove the moisture, after using a damp
cloth.

Cleaning the Exposure Glass

This section describes how to clean the exposure glass and the scanning glass.
7
1. Wipe the exposure glass and the scanning glass.

BJA048S

1. Scanning glass
2. Exposure glass

Cleaning the ADF

This section describes how to clean the ADF.

103
7. Remarks

1. Wipe the sheet and guiding plate of the ADF.

BRA041S

1. Sheet
2. Guiding plate

Cleaning the Power Cable Plug

• Be sure to disconnect the plug from the wall outlet and clean the prongs and the area around the
7 prongs at least once a year. Allowing dust to build up on the plug constitutes a fire hazard.

104
Counter

Counter
This section explains the counter.

Displaying the Total Counter

You can display the total counter value used for all functions.

1. Press the [User Tools/Counter] key.

BRA052S

2. Select [Counter] using [ ] or [ ], and then press the [OK] key. 7

3. To print a counter list, press [Print].

4. Press the [Start] key.

A counter list prints out.

105
7. Remarks

106
8. Appendix
This chapter describes the provided software and utilities CD-ROMs, and specifications.

Software and Utilities Included on the CD-ROM


This section explains the software and utilities CD-ROMs provided with this machine.
Two CD-ROMs come with this machine: “Printer Drivers and Utilities”, and “Scanner Driver and Utilities”.
The following are included in these CD-ROMs:
SmartDeviceMonitor for Admin
For the system administrator to manage network printers.
DeskTopBinder-SmartDeviceMonitor for Client
For users to manage their network print status.

• Some documentation about using the machine is included on the CD-ROM in PDF format. For details
about using Adobe Acrobat Reader/Adobe Reader, see Adobe Acrobat Reader/Adobe Reader
online Help.

Viewing the Contents of the CD-ROM

This section explains how to view the contents of the CD-ROMs. 8


1. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
2. Click [Browse This CD-ROM].
Explorer starts and displays the contents of the CD-ROM.

Printer Drivers for This Machine

This section explains printer drivers for this machine.

• You can install the PCL printer drivers (PCL 5e and PCL 6) from the CD-ROM provided with this machine
or download them from the supplier's Web site. If your operating system is Windows XP x64/Vista
x64, or Windows Server 2003/2003 R2/2008 x64, you must download the printer drivers from
the supplier's Web site. Select this machine and the operating system you are using, and then
download them.

107
8. Appendix

Printing requires installation of a printer driver for your operating system. The following drivers are included
on the CD-ROM labeled “Printer Drivers and Utilities”.

Printer Language PCL 6 PCL 5e PostScript 3

Windows 2000 *1 Yes Yes Yes

Windows XP *2 Yes Yes Yes

Windows Vista *3 Yes Yes Yes

Windows Server 2003 *4 Yes Yes Yes

Windows Server 2008 *5 Yes Yes Yes

Mac OS *6 No No Yes

Mac OS X *7 No No Yes

*1 Microsoft Windows 2000 Professional/Microsoft Windows 2000 Server/Microsoft Windows 2000


Advanced Server
*2 Microsoft Windows XP Professional/Microsoft Windows XP Home Edition
*3 Microsoft Windows Vista Ultimate/Microsoft Windows Vista Enterprise/Microsoft Windows Vista Business/
Microsoft Windows Vista Home Premium/Microsoft Windows Vista Home Basic
*4 Microsoft Windows Server 2003 Standard Edition/Microsoft Windows Server 2003 Enterprise Edition/

8 Microsoft Windows Server 2003 Web Edition/Microsoft Windows Server 2003 Datacenter Edition/Microsoft
Windows Server 2003 R2 Standard Edition/Microsoft Windows Server 2003 R2 Enterprise Edition/Microsoft
Windows Server 2003 R2 Datacenter Edition
*5 Microsoft Windows Server 2008 Standard/Microsoft Windows Server 2008 Enterprise/Microsoft Windows
Server 2008 Datacenter
*6 Versions 8.6 to 9.2 of the Mac OS (Mac OS X Classic mode is supported.)
*7 Mac OS X 10.1 or later (Native mode)
PCL printer drivers
Two kinds of PCL printer driver (PCL 5e and PCL 6) are included. These drivers allow your computer
to communicate with this machine via a printer language.

• Some applications may require installation of the PCL 5e printer driver. In this case, you can install
PCL 5e without having to install PCL 6.
• For details, see “Preparing the Machine”, Printer Reference .

108
Software and Utilities Included on the CD-ROM

TWAIN Driver

This section describes the file path and system requirements of the TWAIN driver.
This driver is required to scan an original using a scanner. To use the machine as a network TWAIN scanner,
this driver must be installed.
File path
The driver is included in the following folder on the CD-ROM labeled “Scanner Driver and Utilities”
provided with this machine:
\DRIVERS\TWAIN
System requirements
• Hardware
PC/AT-compatible machines that support the following operating system properly
• Operating system
Windows 2000/XP/Vista
Windows Server 2003/2003 R2/2008
• Display resolution
800 × 600 pixels, 256 colors or higher

LAN-Fax Driver
8
This section describes the file path and system requirements of the LAN-Fax driver.

• You can install the LAN-Fax driver from the CD-ROM provided with this machine or download it from
the supplier's Web site. If your operating system is Windows XP x64/Vista x64, or Windows Server
2003/2003 R2/2008 x64, you must download the LAN-Fax driver from the supplier's Web site.
Select this machine and the operating system you are using, and then download it.
This driver is required to use LAN-Fax functions.
File path
The driver is included in the following folders on the CD-ROM labeled “Printer Drivers and Utilities”:
\DRIVERS\LAN-FAX\XP_VISTA
System requirements
• Hardware
PC/AT-compatible
• Operating systems
Windows 2000/XP/Vista

109
8. Appendix

Windows Server 2003/2003 R2/2008


• Display
VGA 640 × 480 pixels or more

• Before beginning installation, exit all other applications.

DeskTopBinder Lite

This section describes the file path and system requirements of DeskTopBinder Lite.
DeskTopBinder is to be installed on the client computers for integration and management of various kinds
of files such as scan files, files created with applications, and existing scan files. This software allows you
to use various functions for stored scan files such as viewing stored files. Also, with the ScanRouter delivery
software, you can view the files stored in in-trays of the delivery server, or use other functions for stored
files.
For details about the software installed with DeskTopBinder Lite, see “Scanning Originals with the Network
TWAIN Scanner”, Scanner Reference .
File path
The software is included in the following folder on the CD-ROM labeled “Scanner Driver and
Utilities” provided with this machine:
\UTILITY\DESKV2
8 System requirements
• Hardware
PC/AT-compatible machines that support the operating system properly
• Operating system
• When installing all functions of DeskTopBinder:
Windows 2000 Professional SP1 or later/2000 Server SP1 or later/2000 Advanced
Server SP1 or later/XP Professional/XP Home Edition
• When installing only SmartDeviceMonitor for Client:
Windows 2000 Professional SP1 or later/2000 Server SP1 or later/XP Professional/XP
Home Edition

SmartDeviceMonitor for Admin

This section describes the file path and available functions of SmartDeviceMonitor for Admin.

110
Software and Utilities Included on the CD-ROM

SmartDeviceMonitor for Admin is an application that uses TCP/IP and IPX/SPX to monitor network printers.
It can monitor multiple network printers using IP address. We recommend that network administrators use
this application.
File path
SmartDeviceMonitor for Admin is stored in the following folder in the CD-ROM labeled “Printer Drivers
and Utilities”:
\NETWORK\DEVMON\ADMIN\DISK1

Operating system Protocol stack

Windows 2000 TCP/IP provided with Windows 2000


IPX/SPX provided with Windows 2000
NetWare Client provided with Windows 2000
Novell Client provided with Windows 2000

Windows XP TCP/IP provided with Windows XP


IPX/SPX provided with Windows XP
NetWare Client provided with Windows XP
Novell Client provided with Windows XP

Windows Vista TCP/IP provided with Windows Vista


Novell Client provided with Windows Vista
8
Windows Server 2003 TCP/IP provided with Windows Server 2003
IPX/SPX provided with Windows Server 2003
NetWare Client provided with Windows Server 2003
Novell Client provided with Windows Server 2003

Windows Server 2008 TCP/IP provided with Windows Server 2008


Novell Client provided with Windows Server 2008

Available functions
SmartDeviceMonitor for Admin has the functions to check the followings:
• Printer supplies such as paper or toner
• Results of print jobs executed from the computer

• For details, see Network and System Settings Guide , and SmartDeviceMonitor for Admin Help.

111
8. Appendix

DeskTopBinder-SmartDeviceMonitor for Client

This section describes the file path and system requirements of DeskTopBinder-SmartDeviceMonitor for
Client.
DeskTopBinder-SmartDeviceMonitor for Client allows you to manage and print various data such as files
created with an application, images scanned with a scanner, and existing images as one document.
File path
DeskTopBinder-SmartDeviceMonitor for Client is stored in the following folder on the CD-ROM
labeled “Printer Drivers and Utilities”:
\NETWORK\DEVMON\CLIENT\DISK1
Operating environment of the printer driver
• Applicable computer
Machines which properly work with the applicable OS below. PC/AT compatible machine.
• Applicable OS
Windows 2000/XP/Vista
Windows Server 2003/2003 R2/2008

• See “Scanning Originals with the Network TWAIN Scanner”, Scanner Reference or Help of
DeskTopBinder-SmartDeviceMonitor for Client.

8 • SmartDeviceMonitor for Client is also included in DeskTopBinder and DeskTopBinder Lite. See Help
of DeskTopBinder-SmartDeviceMonitor for Client.

112
Specifications for the Main Unit

Specifications for the Main Unit


This section describes specifications for the main unit.
Configuration:
Desktop
Photosensitivity type:
OPC drum
Original scanning:
One-dimensional solid scanning system through CCD
Copy process:
Dry electrostatic transfer system
Development:
Dry two-component magnetic brush development system
Fusing:
Heating roll pressure system
Resolution:
• Scanning originals: 600 dpi
• Printing: 600 dpi
Exposure glass: 8
Stationary original exposure type
Original reference position:
Rear left corner
Warm-up time (20 °C, rated voltage):
• From the main power switch (Machines with only copier function): 10 seconds or less
• From the main power switch (Machines with facsimile, printer, or scanner functions): 30 seconds
or less
• From the operation switch: 10 seconds or less
Originals:
Sheet/book/objects
Maximum original size:
A4 , 81/2 × 14
Paper size:
• Paper tray: A4 , A5 , B5 JIS , 81/2 × 11 , 51/2 × 81/2 , 16K (195 × 267 mm)

113
8. Appendix

• Bypass tray: A4 , A5 , B5 JIS , 81/2 × 14 , 81/2 × 11 , 51/2 × 81/2 , 71/4 ×


101/2 , 8 × 13 , 81/2 × 13 , 81/4 × 13 , 81/4 × 14 , 16K (195 × 267 mm) ,
41/8 × 91/2 , 37/8 × 71/2 , C5 Env , C6 Env , DL Env
• Bypass tray (custom size):
Vertical: 90.0 - 216.0 mm, 3.55 - 8.50 inches
Horizontal: 139.0 - 600.0 mm, 5.48 - 23.62 inches
• Duplex unit: A4 , B5 JIS , 81/2 × 14 *, 81/2 × 11 , 81/2 × 13 *, 81/4 × 14 *,
81/4 × 13 *, 16K (195 × 267 mm)
* Paper tray unit (Tray 2 and Tray 3) is required.
Paper weight:
• Paper tray (Standard size): 60.0 - 90.0 g/m2, 16 lb. - 24 lb.
• Bypass tray: 60.0 - 157.0 g/m2, 16 lb. - 42 lb.
• Duplex unit: 64.0 - 90.0 g/m2, 17 lb. - 24 lb.
Non-reproduction area (Copier):
• Leading edge: 1.0 - 5.0 mm, 0.04 - 0.20 inches
• Trailing edge: 1.0 - 5.0 mm, 0.04 - 0.20 inches (Back of duplex copy: 2.2 - 6.2 mm, 0.09 -
0.25 inches)
• Left edge: 0.5 - 3.5 mm, 0.02 - 0.14 inches
• Right edge: 1.0 - 4.5 mm, 0.02 - 0.18 inches

8 First copy/print time:


7.5 seconds or less
(A4 , 81/2 × 11 , 100% reproduction, feeding from Tray 1, on the exposure glass)
Copying speed:
17 copies/minute (A4 , 81/2×11 )
Reproduction ratio:
Preset reproduction ratios:
• Enlargement

Metric version Inch version

200% 155%

141% 129%

• Full size

114
Specifications for the Main Unit

Metric version Inch version

100% 100%

• Reduction

Metric version Inch version

93% 93%

71% 78%

50% 65%

Zoom: From 50 to 200% in increments of 1%


Maximum continuous copy run:
99 sheets
Paper capacity (80 g/m2, 20 lb.):
• Tray1: 250 sheets
• Bypass tray: 100 sheets
Power source:
120 V, 60 Hz, 8 A or more
Please be sure to connect the power cord to a power source as above. For details about power
source, see “Power Connection”. 8
Power consumption:

Main unit only Complete system

Warm-up Less than 1000 W Less than 1000 W

Stand-by About 70 W About 75 W

During printing About 360 W About 360 W

Maximum Less than 1000 W Less than 1000 W

• The complete system consists of the main unit with full items installed.
Dimensions (W × D × H up to exposure glass):
485 × 450 × 371 mm, 19.1 × 17.8 × 14.7 inches
Space for main unit (W × D):
595 × 450 mm, 23.5 × 17.8 inches (including the bypass tray)

115
8. Appendix

Noise emission:
• Sound power level:

Main unit only Complete system

Stand-by 40.0 dB (A) 40.0 dB (A)

Copying 62.0 dB (A) 66.0 dB (A)

• Sound pressure level:

Main unit only Complete system

Stand-by 34.0 dB (A) 34.0 dB (A)

Copying 56.0 dB (A) 60.0 dB (A)

• Sound power level and sound pressure level are actual values measured in accordance
with ISO 7779.
• Sound power level and sound pressure level are measured from the position of the
bystander.
• The complete system consists of the main unit with full items installed.
Weight:
29 kg (64.0 lb.) or less
8
• p.101 "Power Connection"

116
Specifications for Auto Document Feeder

Specifications for Auto Document Feeder


This section describes specifications for ADF.
Mode:
ADF mode
Original size:
• Regular size:
• 1-sided originals: A4 - A5 , 81/2 × 14 - 51/2 × 81/2
• 2-sided originals: A4 - A5 , 81/2 × 14 - 51/2 × 81/2
• Custom size:
• 1-sided originals: 139 - 1260 mm, 5.5 - 49.6 inches (Horizontal)
• 2-sided originals: 160 - 356 mm, 6.3 - 14 inches (Horizontal)
Original weight:
• 1-sided originals: 52 - 105 g/m2, 14 - 28 lb.
• 2-sided originals: 52 - 105 g/m2, 14 - 28 lb. (Originals that are 310 mm (13 inches) or longer
in the feed direction should be at least 64 g/m2, 17 lb.)
Number of originals to be set (80 g/m2, 20 lb.):
50 sheets
Maximum power consumption:
Less than 50 W (Power is supplied from the main unit.)
8
Dimensions (W × D × H):
485 × 360 × 120 mm, 19.1 × 14.2 × 4.8 inches
Weight:
8 kg (17.7 lb.) or less

• Specifications are subject to change without notice.

117
8. Appendix

Specifications for Paper Tray Unit (Tray 2 and


Tray 3)
This section describes specifications for the paper tray unit.
Paper size:
A4 , 81/2 × 14 , 81/2 × 13 , 81/2 × 11 , 81/4 × 13 , 81/4 × 14
Paper weight:
60 - 90 g/m2, 16 - 24 lb.
Paper capacity (80 g/m2, 20 lb.):
500 sheets
Maximum power consumption:
15 W (Power is supplied from the main unit.)
Dimensions (W × D × H):
430 × 414 × 140 mm, 17.0 × 16.3 × 5.6 inches
Weight:
6 kg (13.3 lb.) or less

• Specifications are subject to change without notice.


8

118
Specifications for Wireless LAN Board

Specifications for Wireless LAN Board


This section describes specifications for the wireless LAN board.
Transmission spec.:
Based on IEEE 802.11a/b/g (wireless LAN)
Protocol:
TCP/IP, IPX/SPX, AppleTalk
Data transfer speed:
Auto select from the following speed:
1 Mbps, 2 Mbps, 5.5 Mbps, 6 Mbps, 9 Mbps, 11 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps,
48 Mbps, 54 Mbps
Frequency range:
IEEE 802.11a/b/g wireless LAN:
• 2412 - 2462 MHz (1 - 11 channels)
• 5180 - 5320 MHz (36, 40, 44, 48, 52, 56, 60, and 64 channels)
Transmission mode:
• Ad hoc mode
• Infrastructure mode

8
• SmartDeviceMonitor and Web Image Monitor are supported.

119
8. Appendix

Trademarks
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Macintosh® and Mac OS® are registered trademarks of Apple Inc.
Microsoft®, Windows®, Windows Server®, and Windows Vista® are registered trademarks of Microsoft
Corporation in the United States and/or other countries.
Novell and NetWare are registered trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
8 Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Enterprise
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition

120
Trademarks

Microsoft® Windows Server® 2003 R2 Enterprise Edition


Microsoft® Windows Server® 2003 R2 Datacenter Edition
• The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

121
8. Appendix

122
INDEX
A Contents of the CD-ROM...................................107
Control panel.....................................38, 42, 48, 49
Access to the machine........................................101
Copier................................................................9, 52
Add Toner indicator..............................................43
Copy key................................................................43
Adding toner..........................................................79
Counter................................................................105
Address book.........................................................13
Counter key............................................................43
ADF.................................................15, 37, 103, 117
Adhesive labels.....................................................71 D
Alert indicator........................................................43 Darker key..............................................................44
Authentication screen............................................48 Data In indicator....................................................44
Auto document feeder.........................15, 103, 117 DataOverWriteSecurity Unit................................41
Auto Off..................................................................56 Deleting characters...............................................91
Available characters.............................................83 DeskTopBinder Lite..............................................110
B DeskTopBinder-SmartDeviceMonitor for Client......
.....................................................................107, 112
Bypass tray......................................................38, 71 Display language..................................................47
C Display panel..................................................43, 46
Displaying the total counter................................ 105
CAUTION..............................................................17
Dos and Don'ts......................................................97
CAUTION labels...................................................22
Duplex......................................................................9
CD-ROM..........................................93, 95, 96, 107
Duplex key.............................................................44
Changing modes...................................................52
Changing the display language..........................47 E
Changing the paper size......................................64 E-mail transmission................................................11
Changing the paper size in the optional paper tray Energy Saver.........................................................56
unit (Tray 2 and Tray 3)........................................67
Energy saving functions..................................23, 24
Changing the paper size in the paper tray (Tray 1)
................................................................................64 ENERGY STAR Program.......................................23
Check Destination key...........................................42 Enlarge.....................................................................9
Cleaning..............................................................103 Enter key.................................................................45
Cleaning the ADF................................................103 Entering letters.......................................................85
Cleaning the exposure glass..............................103 Entering numbers...................................................91
Cleaning the power cable plug.........................104 Entering symbols....................................................88
Clear key.........................................................45, 84 Entering text.....................................................83, 84
Clear Modes key...................................................43 Envelopes...........................................................9, 74
Clear/Stop key...............................................45, 84 Environments to avoid.........................................100
Clearance areas.................................................101 Environments where the machine can be used........
................................................................................17
Color scan..............................................................12
Escape key......................................................44, 46
Color Scan key......................................................42
Ethernet...................................................................10
Combine...................................................................9
Exposure glass..............................................37, 103
Combine key.......................................................... 44
External items.........................................................40
Combine/Series key.............................................44
Communicating indicator......................................42 F
Components...........................................................37 F1 key.....................................................................43
Computer...............................................................13 F2 key.....................................................................43

123
F3 key.....................................................................43 J
Facsimile..........................................................10, 52
Job Information key...............................................42
Facsimile key.......................................................... 42
Fax reception over the Internet.............................11 K
Fax transmission over the Internet........................11 Keys........................................................................83
FCC Rules...............................................................26
L
Forwarding............................................................34
Front cover.............................................................38 Label paper (adhesive labels)..............................71
G LAN-Fax........................................................10, 109
LAN-Fax driver....................................................109
Gigabit Ethernet (1000BASE-T)..........................41 Laser safety............................................................26
H Laws........................................................................26
Legal Prohibition....................................................26
Handling power cords..........................................18
Letterhead paper...................................................61
Handling power plugs..........................................18
Lighter key..............................................................44
Handling the machine's interior............................20
Load Paper indicator.............................................43
Handling the machine's supplies..........................20
Loading paper.......................................................59
Handling the main machine..................................18
Loading paper into the paper trays.....................59
Handset..................................................................40
Local connection......................................................9
Hard Disk Drive Option........................................40
Locating the machine..........................................100
HDD Encryption Unit.............................................41
Locked Print..............................................................9
Hold Print..................................................................9
Login.................................................................49, 50
How to enter text...................................................84
Logout..............................................................49, 50
How to use the operating instructions..................95
Low power mode...................................................24
HTML manuals............................................8, 93, 95
Lower right cover...................................................38
I
M
IEEE 1284 Interface Board..................................41
Machine environment...........................................99
Important................................................................14
Main power.....................................................54, 56
Indicators................................................................43
Main power indicator.....................................38, 43
Install......................................................................34
Main power switch.........................................38, 54
Installation..............................................................99
Main unit..............................................................113
Installing operating instructions............................93
Maintaining your machine.................................103
Internal items..........................................................40
Major item..............................................................15
Internal tray............................................................38
Manuals....................................................93, 95, 96
Internal tray guide.................................................37
Manuals for this machine........................................6
Internet Fax and E-Mail Transmission..................11
Manuals list..............................................................8
Internet Fax Reception and Mail to Print.............11
Media slot..............................................................40
IP-Fax......................................................................11
Memory Trans. key................................................42
IP-Fax Reception....................................................11
Movement..............................................................99
IP-Fax Transmission...............................................11
Moving...................................................................99
Items.................................................................15, 40
N
Name of major item..............................................15

124
Network connection................................................9 Printed manuals........................................................8
Network delivery scanner....................................12 Printer.................................................................9, 52
Note..........................................................16, 26, 27 Printer driver............................................49, 50, 107
Notes to users in the state of California...............27 Printer Drivers and Utilities........107, 109, 110, 112
Notes to users in the United States of America....... Printer key...............................................................43
................................................................................26 Printer/Scanner unit..............................................40
Notice..................................................................... 14 Printing a PDF file directly.......................................9
Number keys...................................................43, 84
Q
Numbers.................................................................91
Quick Dial keys...............................................44, 84
O
R
Off mode................................................................24
OHP transparencies..........................................9, 71 Reading the display panel....................................46
OK key.............................................................45, 46 Receive File indicator............................................42
On Hook Dial key.................................................42 Recommended paper sizes and types.................71
Online key.............................................................. 44 Redial key..............................................................44
Opening manuals from the [Start] menu.............95 Reduce......................................................................9
Opening manuals from the CD-ROM..................96 Register/Change/Delete.....................................33
Opening manuals from the icon...........................95 Regulations.............................................................26
Operating instructions...........................................95 Removable memory device..................................12
Operation switch......................................38, 45, 54 Replacing toner.....................................................80
Optimum environmental conditions...................100 Required space...................................................101
Orientation-fixed paper........................................61 Resolution key........................................................44
Original key...........................................................44 Right cover.............................................................38
Other items.............................................................40 S
P Safety information.................................................17
Paper................................................................33, 59 Safety information labels......................................22
Paper sizes.......................................................64, 71 Safety precautions to be followed.......................17
Paper storage........................................................77 Sample Print.............................................................9
Paper tray..................................................38, 64, 71 Saving paper...........................................................9
Paper tray unit...........................38, 40, 67, 71, 118 Scanner..................................................................52
Paper types............................................................71 Scanner Driver and Utilities..............107, 109, 110
Paperless fax transmission....................................10 Scanner key...........................................................43
Password................................................................12 Scroll keys.................................................43, 47, 84
Pause key...............................................................44 SD card..................................................................12
Pause/Redial key..................................................44 Search Destination key.........................................42
PCL........................................................................107 Searching by Keyword.........................................33
PDF manuals......................................................8, 93 Searching by what you want to do......................29
Power...............................................................54, 55 Security functions...................................................12
Power cable plug................................................104 Selecting the paper size with User Tools.............69
Power connection................................................ 101 Selection keys..................................................43, 46
Power supply.........................................................54 Sending faxes when toner has run out................81
Power switch symbols...........................................22 Sending scan files by e-mail.................................12

125
Sending scan files by Scan to Folder...................12 User Text................................................................91
Sending scanned documents when toner has run User Tools..............................................................69
out...........................................................................81 User Tools key.......................................................43
Series key...............................................................44 User Tools/Counter key.......................................43
Settings...................................................................34 Using the keys........................................................46
Shift key..................................................................83 Using the Print Job function.....................................9
Sleep mode............................................................24 Using the Scanner in a Network Environment.........
SmartDeviceMonitor for Admin..........13, 107, 110 ................................................................................12
SmartDeviceMonitor for Client..................110, 112 Utilities included on the CD-ROM.....................107
Software included on the CD-ROM..................107 V
Sort key..................................................................44
Space key..............................................................83 Ventilation holes....................................................38
Specifications............................113, 117, 118, 119 Viewing the contents of the CD-ROM...............107
Start key.................................................................45 VM card.................................................................41
Stop key...........................................................45, 84 W
Stored Print...............................................................9
WARNING............................................................17
Storing paper.........................................................77
WARNING labels.................................................22
Symbols...........................................................15, 88
Web Image Monitor.......................................13, 50
Symbols key...........................................................84
Web Services on Devices.....................................12
System Reset..........................................................52
Where to put your machine..................................99
T Wireless LAN................................................10, 119
Text...................................................................83, 84 Wireless LAN board.....................................41, 119
Toner.......................................................................79 WSD.......................................................................12
Total counter........................................................105
Trademarks..........................................................120
Translucent paper..................................................71
Tray 1........................................................38, 64, 71
Tray 2.........................................38, 40, 67, 71, 118
Tray 3.........................................38, 40, 67, 71, 118
Turning off the main power...................................56
Turning off the power......................................54, 55
Turning on the main power...................................54
Turning on the power......................................54, 55
TWAIN...................................................................12
TWAIN driver......................................................109
Two-sided paper...................................................61
U
Unusable paper.....................................................76
USB memory stick..................................................12
Used toner..............................................................82
User Code Authentication..............................48, 49
User Function keys.................................................43

126
MEMO

127
MEMO

128 EN USA D069-6752


Copyright © 2008
Operating Instructions About This Machine

Type for 917/LD117/MP 171/Aficio MP 171


Type for 917F/LD117F/MP 171F/Aficio MP 171F
Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF
EN USA D069-6752
Operating Instructions
Copy Reference

1 Placing Originals
2 Copying
3 Copier Features
4 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................3
Notice..................................................................................................................................................................5
Important.........................................................................................................................................................5
How to Read This Manual.................................................................................................................................6
Symbols...........................................................................................................................................................6
Name of Major Item......................................................................................................................................6
Note................................................................................................................................................................6
Laws and Regulations.........................................................................................................................................7
Legal Prohibition.............................................................................................................................................7
Display.................................................................................................................................................................8
Reading the Display and Using Keys...........................................................................................................8
1. Placing Originals
Originals...........................................................................................................................................................11
Sizes and Weights of Recommended Originals.......................................................................................11
Sizes Selectable as Regular Size Originals...............................................................................................12
Missing Image Area....................................................................................................................................13
Placing Originals..............................................................................................................................................15
Original Orientation....................................................................................................................................15
Placing Originals on the Exposure Glass...................................................................................................15
Placing Originals in the ADF.......................................................................................................................16
Specifying Original Size When a Paper Tray is Selected........................................................................17
Specifying Original Size When the Bypass Tray is Selected...................................................................20
2. Copying
Basic Procedure................................................................................................................................................25
Copying from the Bypass Tray........................................................................................................................27
Copying onto Regular Size Paper..............................................................................................................29
Copying onto Custom Size Paper..............................................................................................................30
Copying onto OHP Transparencies...........................................................................................................31
Copying onto Thick Paper...........................................................................................................................32
Copying onto Envelopes.............................................................................................................................33
Reducing or Enlarging Originals.....................................................................................................................38
Preset Reduce/Enlarge...............................................................................................................................38
Zoom.............................................................................................................................................................40

1
Duplex Copying...............................................................................................................................................43
Combined Copying.........................................................................................................................................47
One-Sided Combine...................................................................................................................................47
Two-Sided Combine....................................................................................................................................51
Series Copies....................................................................................................................................................54
Finishing............................................................................................................................................................56
Sort................................................................................................................................................................56
Adjusting Copy Image Density........................................................................................................................58
Selecting the Original Type.............................................................................................................................59
Selecting Copy Paper......................................................................................................................................60
3. Copier Features
Accessing User Tools.......................................................................................................................................61
Changing Default Settings...........................................................................................................................61
Quitting User Tools......................................................................................................................................62
User Tools Menu..............................................................................................................................................63
4. Appendix
Function Compatibility.....................................................................................................................................67
Trademarks.......................................................................................................................................................69
INDEX.............................................................................................................................................................71

2
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.

4
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

5
How to Read This Manual

• For proper use of this product, be sure to read About This Machine first.

Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.

Name of Major Item

Major item of this machine is referred to as follows in this manual:


• Auto document feeder ADF

Note

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

6
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.

7
Display
This section explains how to read the display and how to use the selection keys on the initial copy display.

• The copy display is set as the default screen when the machine is turned on.
Initial copy display

BRH201S

1. Displays operational status and messages.


2. Displays the current paper tray and selected items that appear in brackets.
3. Displays the number of copies set.
4. Displays frequently used functions.

Reading the Display and Using Keys

BRH202S

1. Selection keys
Correspond to items at the bottom line on the display.
Example:
• When the instruction “press [Reduce]” appears in this manual, press the left selection key.
• When the instruction “press [Enlarge]” appears in this manual, press the center selection key.
• When the instruction “press [Zoom]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.

8
3. [OK] key
Press to set a selected item or entered numeric value.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ], or [ ] appears in this manual, press the scroll key of the same direction.

9
10
1. Placing Originals
This chapter describes the types of originals you can set and how to place originals.

1
Originals
This section describes the types of originals that can be placed, and missing image area.

Sizes and Weights of Recommended Originals

The following describes recommended paper sizes and non-recommended originals for the ADF:
Metric version

Original location Original size Original weight

Exposure glass Up to A4 -

ADF One-sided originals: A4 - A5 52 - 105 g/m2

Two-sided originals: A4 - A5 52 - 105 g/m2

Inch version

Original location Original size Original weight

Exposure glass Up to 81/2 × 14 -

ADF One-sided originals: 81/2 × 14 - 51/2 × 81/2 14 - 28 lb.

Two-sided originals: 81/2 × 14 - 51/2 × 81/2 14 - 28 lb.

• About 50 originals (80 g/m2, 20 lb.) can be loaded in the ADF.


• Do not place 2-sided originals in the ADF if they are 64 g/m2 (17 lb.) or less in weight and 356 mm
(14 inches) or more in length. Place them on the exposure glass instead.

Non-compatible originals for the ADF


Placing unsuitable originals in the ADF can cause paper misfeeds or light and black lines, or result in
damage to the originals.
Place the following types of originals on the exposure glass instead.

11
1. Placing Originals

• Originals other than those specified on “Sizes and Weights of Recommended Originals”
• Stapled or clipped originals
• Perforated or torn originals
1 • Curled, folded, or creased originals
• Pasted originals
• Originals with any kind of coating, such as thermal fax paper, art paper, aluminum foil, carbon paper,
or conductive paper
• Originals with perforated lines
• Originals with indexes, tags, or other projecting parts
• Sticky originals such as translucent paper
• Thin or highly flexible originals
• Thick originals such as postcards
• Bound originals such as books
• Transparent originals such as OHP transparencies or translucent paper
• Originals that are still wet with ink or correction fluid

• The original might become dirty if it is written with a pencil or a similar tool.

Sizes Selectable as Regular Size Originals

You can select the following original sizes on the display:


A4 *1, B5 JIS *2, A5 , 8 1/2 × 14 , 8 1/2 × 13 , 8 1/2 × 11 *3 , 8 1/
4 × 14 , 8 1/4 ×
13 , 8 × 13 , 5 1/2 × 8 1/2
*1 Default size for the metric version
*2 JIS: Japanese Industrial Standard
*3 Default size for the inch version

12
Originals

Exposure glass

BRH010S

ADF

BRH011S

• When you copy custom size originals, make sure you specify the size of the originals. If not, the image
may not be copied properly. For details about custom size originals, see “Custom sizes”.
• For 2-sided originals that can be placed in the ADF, the horizontal size is 160-356 mm (6.3-14
inches).

• p.18 "Custom sizes"


• p.21 "Custom sizes"

Missing Image Area

Even if you place originals in the ADF or on the exposure glass correctly, margin of a few millimeters on
all four sides of the original might not be copied.

13
1. Placing Originals

BAT019S

1. 0.5 - 4.5 mm (0.02 - 0.18 inches)


2. 1.0 - 5.0 mm (0.04 - 0.20 inches) *
3. 0.5 - 3.5 mm (0.02 - 0.14 inches)
4. 1.0 - 5.0 mm (0.04 - 0.20 inches)
* Back of 2-sided copy: 2.2-6.2 mm (0.09-0.25 inches)

14
Placing Originals

Placing Originals
This section describes the procedure for placing originals on the exposure glass and in the ADF.
Take care to place originals after any correction fluid and ink has completely dried. Not taking this 1
precaution could cause marks on the exposure glass that will be copied onto paper.

• For original sizes you can place on the exposure glass and in the ADF, see “Originals”.

• p.11 "Originals"

Original Orientation

You can set the original orientation in the following ways.

BRH009S

1. ADF
2. Exposure glass

• Originals should be aligned to the rear left corner when placing them on the exposure glass. However,
some copy functions, such as Duplex, Combine, and Series Copies may produce different results
depending on the orientation of the originals. For details, see the explanations of each function.

Placing Originals on the Exposure Glass

Place originals on the exposure glass.

• Do not lift the exposure glass cover or ADF forcefully. Otherwise, it will be damaged, or the cover of
the ADF might open.

15
1. Placing Originals

1. Lift the exposure glass cover or ADF.


2. Place the original face down on the exposure glass. The original should be aligned to the
rear left corner.

1 Start with the first page to be copied.

BRH019S

1. Positioning mark
3. Lower the exposure glass cover or ADF.

Placing Originals in the ADF

Place originals in the ADF.


Settings should be made when placing custom size originals.

BRH020S

When placing custom size originals:


See “Custom sizes” and “Copying onto Custom Size Paper”.

1. Adjust the document guides to the original size.


2. Set the aligned originals face up into the ADF.
Do not stack originals beyond the limit mark.
The first page should be on the top.

16
Placing Originals

Be sure not to place originals or other objects on the top cover. Doing so may cause a malfunction.

BRH021S

1. Limit mark
2. Document guide

• Originals that are 160 mm (6.3 inches) or less along the feed direction, such as A5 or 51/2 ×
81/2 , may jam inside the ADF when you make duplex copies.
• Thin originals (64 g/m2, 17 lb. or less) that are 356 mm (14 inches) or more along the feed direction,
such as 81/2 × 14 or 8 × 13 , may jam inside the ADF when you make duplex copies.
• Straighten curls in the originals before placing them on the ADF.
• To prevent multiple sheets from being fed at once, fan the original before placing it on the ADF.
• Set the original squarely.

• p.18 "Custom sizes"


• p.21 "Custom sizes"
• p.30 "Copying onto Custom Size Paper"

Specifying Original Size When a Paper Tray is Selected

You can select either regular or custom for the size of the original when a paper tray is selected.

Regular sizes
When placing regular size originals on the exposure glass or in the ADF, specify the size of the originals
from the regular sizes shown on the display.
If you do not specify the original size, the machine will make copies on the paper size in the tray selected.
When copy paper size and original size differ, you need to specify the original size as follows:

17
1. Placing Originals

1. Select the paper tray using [ ] or [ ].

1
2. Press the [ ] key.
3. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.

4. Select the original size using the scroll keys, and then press the [OK] key.

The "Programmed" message appears.


When the regular size originals settings are registered, appears on the top of the copy
display.

• To cancel the size you have set, press the [Clear Modes] key.

Custom sizes
When placing a custom size original on the exposure glass or in the ADF, specify the size of the original
using the number keys.

• Original sizes that can be set with this function are:


• ADF: vertical 139-216 mm (5.5-8.5 inches), horizontal for 1-sided originals 139-1260 mm
(5.5-49.6 inches), horizontal for 2-sided originals 160-356 mm (6.3-14 inches)

18
Placing Originals

• Exposure glass: vertical 139-216 mm (5.5-8.5 inches), horizontal 160-356 mm (6.3-14 inches)

1. Select the paper tray using [ ] or [ ].

2. Press the [ ] key.


3. Select [Custom Size] using [ ] or [ ], and then press the [OK] key.

4. Enter the horizontal size of the original (Horiz.) with the number keys, and then press the
[OK] key.

BRH022S

1. Vertical size
2. Horizontal size

19
1. Placing Originals

5. Enter the vertical size of the original (Vert.) with the number keys, and then press the [OK]
key.

The "Programmed" message appears.


When the custom size originals settings are registered, appears on the top of the copy
display.

• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.
• To cancel the size you have set, press the [Clear Modes] key.

Specifying Original Size When the Bypass Tray is Selected

You can select either regular or custom for the size of the original when the bypass tray is selected.

Regular sizes
When placing regular size originals on the exposure glass or in the ADF, specify the size of the originals
from the regular sizes shown on the display.
If you do not specify the original size, the machine will make copies on the paper size in the tray selected.
When copy paper size and original size differ, you need to specify the original size as follows:

1. Select the bypass tray using [ ] or [ ].

2. Press the [ ] key.

20
Placing Originals

3. Select [Original Size] using [ ] or [ ], and then press the [OK] key.

1
4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.

5. Select the original size using the scroll keys, and then press the [OK] key.

The "Programmed" message appears.


When the regular size originals settings are registered, appears on the top of the copy
display.

• To cancel the size you have set, press the [Clear Modes] key.

Custom sizes
When placing a custom size original on the exposure glass or in the ADF, specify the size of the original
using the number keys.

• Original sizes that can be set with this function are:


• ADF: vertical 139-216 mm (5.5-8.5 inches), horizontal for 1-sided originals 139-1260 mm
(5.5-49.6 inches), horizontal for 2-sided originals 160-356 mm (6.3-14 inches)
• Exposure glass: vertical 139-216 mm (5.5-8.5 inches), horizontal 160-356 mm (6.3-14 inches)

21
1. Placing Originals

1. Select the bypass tray using [ ] or [ ].

1
2. Press the [ ] key.
3. Select [Original Size] using [ ] or [ ], and then press the [OK] key.

4. Select [Custom Size] using [ ] or [ ], and then press the [OK] key.

5. Enter the horizontal size of the original (Horiz.) with the number keys, and then press the
[OK] key.

6. Enter the vertical size of the original (Vert.) with the number keys, and then press the [OK]
key.

The "Programmed" message appears.


When the custom size originals settings are registered, appears on the top of the copy
display.

22
Placing Originals

1
• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.
• To cancel the size you have set, press the [Clear Modes] key.

23
1. Placing Originals

24
2. Copying
This chapter describes the basic procedure for making copies.

Basic Procedure
This section describes the basic procedure for making copies. 2
• When User Code Authentication is set, enter your user code (up to eight digits) with the number keys
so that the machine accepts copy jobs. For details about User Code Authentication, see “System
Settings”, Network and System Settings Guide.
• When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server
Authentication is set, enter your login user name and password so that the machine accepts copy
jobs. Ask the administrator for the login user name and password. For details, see “When the
Authentication Screen is Displayed”, About This Machine.
• To copy onto paper other than plain paper, specify the paper type under Tray Paper Settings in User
Tools. For details, see “System Settings”, Network and System Settings Guide.

1. Make sure "Ready" appears on the screen.


If any other function is displayed, press the [Copy] key.
Initial copy screen

2. Make sure no previous settings are still in effect.


When there are previous settings remaining, press the [Clear Modes] key.
3. Place the originals.
4. Make desired settings.
5. Enter the number of copies with the number keys.
The maximum copy quantity that can be set is 99.

25
2. Copying

6. Press the [Start] key.

BRH203S

The machine starts copying.


When placing originals on the exposure glass, press the [ ] key after all originals are scanned.
Copies are delivered face down.
7. When the copy job is finished, press the [Clear Modes] key to clear the settings.

• Always log off when you have finished using the machine to prevent unauthorized users from using
the machine.
• To stop the machine during a multi-copy run, press the [Clear/Stop] key.
• To cancel all copy functions and return the machine to the default condition, press the [Clear Modes]
key.
• To clear entered values, press the [Clear/Stop] key.
• To switch between pages or selectable functions, press the scroll keys.

26
Copying from the Bypass Tray

Copying from the Bypass Tray


The bypass tray allows you to copy non-standard paper.
Use the bypass tray to copy onto OHP transparencies, thick paper, envelopes, and paper that cannot be
loaded in the paper trays.

2
• The Duplex function cannot be performed on paper fed from the bypass tray. If [1 Sided 2 Sided]
is selected, cancel the setting.
• Paper that has a vertical length of 90 - 216 mm (3.55 – 8.50 inches) and a horizontal length of 139
- 600 mm (5.48 - 23.62 inches) can be copied from the bypass tray. However, when paper larger
than 356 mm (14.02 inches) in size is used, the paper may become wrinkled, may not be fed into
the machine, or may cause paper jams.
• When copying onto OHP transparencies, paper of 59.9 g/m2 (about 16 lb.) or less, or paper of
above 90g/m2 (about 24 lb.), you need to specify the type and size of paper under Tray Paper
Settings in User Tools. For details about Tray Paper Settings, see “System Settings”, Network and
System Settings Guide.
• The maximum number of sheets you can load at the same time depends on paper type. Load only as
much paper as can be held between the paper guides on the bypass tray.

1. Pull the bypass tray.

BRH023S

27
2. Copying

2. Push up the release lever.

BRH024S

1. Release lever
3. Align the paper guides to the paper size, and then insert the paper face down.
If the guides are not flush against the paper, images might be skewed or paper misfeeds might occur.

BRH025S

1. Horizontal size
2. Vertical size
3. Extender
4. Paper guides
4. Push down the release lever.

BRH026S

28
Copying from the Bypass Tray

1. Release lever
The bypass tray is selected on the display.

2
5. Select the size and type of the paper.
6. Press the [OK] key.
7. Place the originals, and then press the [Start] key.
8. When the copy job is finished, press the [Clear Modes] key to clear the settings.
9. Close the bypass tray.

• If the bypass tray is not selected on the display in step 4, select using [ ] or [ ], and then press
the [ ] key.
• Certain types of paper might not be detected properly when placed on the bypass tray. If this happens,
remove the paper and place it on the bypass tray again.
• Load only as much paper as can be held between the guides on the bypass tray. Overloading the
bypass tray can result in misfeeds and skewed images.
• To support A4 , 81/2 × 11 or larger paper sizes, pull out the extender.
• To prevent multiple sheets from being fed at once, fan paper before placing it on the tray.
• When the Sort function is selected, press the [ ] key after all originals have been scanned.
• When the Panel Key Sound is turned off, it will not sound if you insert paper into the bypass tray. For
details about Panel Key Sound, see “System Settings”, Network and System Settings Guide.
• Depending on the environment where the machine is being used, you might at times hear a rustling
noise from paper moving through the machine. This noise does not indicate a malfunction.
• The following paper sizes can be selected as the regular sizes:
• A4 , A5 , B5 JIS , 81/2 × 14 , 81/2 × 13 , 81/4 × 14 , 81/4 × 13 , 8 × 13 ,
8 /2 × 11 , 71/4 × 101/2 , 51/2 × 81/2
1 , 16K , C6 Envelope , C5 Envelope , DL
Envelope , 41/8 × 91/2 , 37/8 × 71/2

Copying onto Regular Size Paper

Makes copies onto regular size paper from the bypass tray.

1. Insert the paper face down on the bypass tray.


2. Press the [ ] key.

29
2. Copying

3. Select [Paper Size] using [ ] or [ ], and then press the [OK] key.

2 4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.

5. Select the paper size using the scroll keys, and then press the [OK] key.

The "Programmed" message appears.


6. Place the originals, and then press the [Start] key.
7. When the copy job is finished, press the [Clear Modes] key to clear the settings.

Copying onto Custom Size Paper

Makes copies onto custom size paper from the bypass tray.

1. Insert the paper face down on the bypass tray.


2. Press the [ ] key.
3. Select [Paper Size] using [ ] or [ ], and then press the [OK] key.

30
Copying from the Bypass Tray

4. Select [Custom Size] using [ ] or [ ], and then press the [OK] key.

5. Enter the horizontal size of the paper (Horiz.) with the number keys, and then press the [OK] 2
key.

6. Enter the vertical size of the paper (Vert.) with the number keys, and then press the [OK]
key.

The "Programmed" message appears.


7. Place the originals, and then press the [Start] key.
8. When the copy job is finished, press the [Clear Modes] key to clear the settings.

• To change the value you entered, press the [Clear/Stop] key, and then enter a new value.

Copying onto OHP Transparencies

When copying onto OHP transparencies, select the type and size of paper.

• OHP transparencies must be loaded face down in the tray.


• Load OHP transparencies one at time in the bypass tray. This prevents multiple sheets being fed in
together, which can cause jams and misprints.
• Remove copied sheets one by one.

1. Insert the OHP transparencies face down on the bypass tray.


2. Press the [ ] key.

31
2. Copying

3. Select [Paper Type] using [ ] or [ ], and then press the [OK] key.

2 4. Select [OHP (Transparency)] using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.


5. Select the paper size, if required.
6. Place the originals, and then press the [Start] key.
7. When the copy job is finished, press the [Clear Modes] key to clear the settings.

• Printing on OHP transparencies may be slower than printing on plain paper.

Copying onto Thick Paper

When copying onto thick paper, select the type and size of paper.

1. Insert the paper face down on the bypass tray.


2. Press the [ ] key.
3. Select [Paper Type] using [ ] or [ ], and then press the [OK] key.

4. Select [Thick Paper] using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.

32
Copying from the Bypass Tray

5. Select the paper size, if required.


6. Place the originals, and then press the [Start] key. 2
7. When the copy job is finished, press the [Clear Modes] key to clear the settings.

• Printing on thick paper may be slower than printing on plain paper.


• To prevent multiple sheets from being fed at once, fan paper before placing it on the tray.

Copying onto Envelopes

When copying onto envelopes, specify the paper type and paper size.

• Before loading envelopes, use a pen or similar to flatten their edges.

BRH013S

BRH014S

33
2. Copying

Printable area
The following areas of envelopes can be printed on:

BRH015S

1. Feeding direction
2. Printable area
3. 10 mm (0.4 inches)
4. 10 mm (0.4 inches)
5. 10 mm (0.4 inches)
Orientation of Originals and Envelopes
Originals and envelopes must be placed in the same orientation.
To minimize waste and time, check that originals and envelopes are loaded in the same orientation.

BRH016S

The illustration shows the orientation of originals and envelopes.


1. Original on the exposure glass
2. Envelope on the bypass tray
3. Top
4. Bottom
5. Horizontal size
6. Vertical size

34
Copying from the Bypass Tray

1. Insert the envelopes with the side you want to copy face down.

BRH027S

1. Release lever
2. Press the [ ] key.
3. Select [Paper Size] using [ ] or [ ], and then press the [OK] key.

4. Select [Regular Size] using [ ] or [ ], and then press the [OK] key.

5. Select the envelope size using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.

6. Press the [ ] key.

35
2. Copying

7. Select [Paper Type] using [ ] or [ ], and then press the [OK] key.

2 8. Select [Thick Paper] using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.

9. Place the original, and then press the [Start] key.


10. When the copy job is finished, press the [Clear Modes] key to clear the settings.

• Load only as many envelopes on the bypass tray as can be stacked up to 10.5 mm (0.4 inches) high.
Check the envelopes are not damp. Load only as many envelopes as can be held between the paper
guides on the bypass tray.
• When copying on a small-sized envelope, align the flap to the paper guide on the left.

BRH028S

• Check there is no air in the envelopes before loading.


• To get better print quality, it is recommended that you set the right, left, top, and bottom print margin,
to at least 15 mm (0.6 inches) each.
• You cannot print envelopes with the Duplex function.

36
Copying from the Bypass Tray

• Load only one size and type of envelope at a time.


• Before loading envelopes, check they are rectangular in shape.
• For details about supported envelope types, see “Envelopes”, About This Machine.

37
2. Copying

Reducing or Enlarging Originals


This section describes methods of reducing or enlarging images by specifying a reproduction ratio.

Preset Reduce/Enlarge
2 This function allows you to reduce or enlarge images by selecting a preset ratio.

BAS030S

Base Point
The base point of Reduce/Enlarge differs depending on how the original is scanned. When the
original is placed on the exposure glass, the upper left corner will be the base point. When it is placed
in the ADF, the bottom left corner will be the base point.
The figure below is the resulting copy images that differ depending on how the original is scanned.

BAT031S

1. Base point when placed on the exposure glass


2. Base point when placed in the ADF

38
Reducing or Enlarging Originals

1. Press [R/E].

2. Press [Enlarge] or [Reduce]. 2

3. Select a ratio using [ ] or [ ], and then press the [OK] key.


The "Programmed" message appears.
4. Place your originals, and then press the [Start] key.

• You can select one of five preset ratios (two enlargement ratios, three reduction ratios).
• Following shows the relation between the original and paper sizes at respective scaling factors.
• Metric version
200% (Area ratio 4 times): A6 A4
141% (Area ratio 2 times): A5 A4
93%: -
71% (Area ratio 1/2 times): A4 A5
50% (Area ratio 1/4 times): A4 A6
• Inch version
155% (Area ratio 2 times): 51/2 × 81/2 81/2 × 14
129%: 51/2 × 81/2 81/2 × 11
93%: -
78%: 81/2 × 14 81/2 × 11
65%: 81/2 × 11 51/2 × 81/2
• You can select a ratio regardless of the size of an original or copy paper. With some ratios, parts of
the image might not be copied or margins will appear on copies.
• You can change reproduction ratios shown on the initial display under Reproduction Ratio in User
Tools. For details about Reproduction Ratio, see “User Tools Menu”.

39
2. Copying

• p.63 "User Tools Menu"

Zoom

2 You can specify the reproduction ratio in increments of 1%.

BAS032S

• The reproduction ratios you can specify are 50 - 200%.


• You can select a ratio regardless of the size of an original or copy paper. With some ratios, parts of
the image might not be copied or margins will appear on copies.

Selecting a ratio using the scroll keys


Select a ratio using [ ] or [ ].

1. Press [R/E].

2. Press [Reduce] or [Enlarge], and then select a preset ratio which is close to the desired ratio.
3. Press [Zoom].

40
Reducing or Enlarging Originals

4. Specify a ratio using [ ] or [ ], and then press the [OK] key.

Pressing [ ] or [ ] changes the ratio in increments of 1%. Pressing and holding down the relevant key 2
changes the ratio in increments of 10%.
The "Programmed" message appears.
5. Place the original, and then press the [Start] key.

• To change the value you specified in step 3, readjust it using [ ] or [ ].

Entering a ratio using the number keys


Select a ratio using the number keys.

1. Press [R/E].

2. Press [Zoom].

3. Enter the desired ratio with the number keys, and then press the [OK] key.

The "Programmed" message appears.


4. Place the original, and then press the [Start] key.

41
2. Copying

• To change the value you entered in step 3, press the [Clear/Stop] key, and then enter a new value.

42
Duplex Copying

Duplex Copying
This section describes how to make duplex copies.
Copies two 1-sided pages or one 2-sided page onto a 2-sided page.

• You cannot use the bypass tray with this function. 2


1 Sided 2 Sided
Copies two 1-sided pages on one 2-sided page.

BAS034S

2 Sided 2 Sided
Copies one 2-sided page on one 2-sided page.

BAS035S

Original orientation and completed copies


The resulting copy image will differ according to the orientation in which you place your originals
( or ).
The table shows the orientation of images on the front and back of copies, not the orientation of
delivery.

43
2. Copying

BAT036S

1. Press the [Duplex] key.

BRH204S

The indicator goes on.


2. Select the duplex mode using [ ] or [ ], and then press the [OK] key.

44
Duplex Copying

3. Select the original orientation using [ ] or [ ], and then press the [OK] key.

4. Select the duplex orientation using [ ] or [ ], and then press the [OK] key. 2

The "Programmed" message appears.


5. Place the originals, and then press the [Start] key.

• When placing an original on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set so that the first page is on the top.
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• To display the screens in steps 3 and 4, select [Always Specify] for [Orientation] with Copier Features
in User Tools. If [Do not Specify] is selected, proceed to step 5. For details about Orientation, see
“User Tools Menu”.
• You can change the margins of duplex copies under Duplex Margin in User Tools. If you set a binding
margin that is too wide, parts of the image may not be copied. For details about Duplex Margin, see
“User Tools Menu”.
• You can use the following copy paper with this function:
• A4 , B5 JIS , 81/2 × 14 , 81/2 × 13 , 81/2 × 11 , 81/4 × 14 , 81/4 × 13 , 16K

• You cannot use the following copy paper with this function:
• Paper smaller than B5 JIS or 81/2 × 11
• Paper thicker than 90 g/m2 (24 lb.)
• Paper thinner than 64 g/m2 (17 lb.)
• Translucent paper
• Label paper (adhesive labels)
• OHP transparencies
• Thick paper
• Envelopes

45
2. Copying

• When an odd number of originals are placed in the ADF, the back of the last page of copied paper
is blank.
• During copying, the image is shifted to allow for the binding margin.
• By default, a binding margin is made on the back side.

2 • p.63 "User Tools Menu"

46
Combined Copying

Combined Copying
This section describes how to make combined copies.

• When placing originals on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set the first page on top. 2
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• In this mode, the machine selects the reproduction ratio automatically. This reproduction ratio depends
on copy paper sizes and the number of originals.
• The reproduction ratios selectable by the machine are 50-200%.
• If the calculated ratio is under the minimum ratio, it is automatically adjusted to within available range.
However, with some ratios, parts of the image might not be copied.
• You cannot use custom size paper.
• If the orientation of originals is different from that of the copy paper, the machine will automatically
rotate the image by 90° to make copies properly.
• If the number of originals placed is less than the number specified for combining, the last page segment
is left blank as shown.

BAS149S

One-Sided Combine

Combines several pages onto one side of a sheet.


There are four types of One-Sided Combine.
1 Sided 2 Pages Combine 1 Side
Copies two 1-sided originals to one side of a sheet.

47
2. Copying

2
BAS038S

1 Sided 4 Pages Combine 1 Side


Copies four 1-sided originals to one side of a sheet.

BAS039S

2 Sided 1 Page Combine 1 Side


Copies one 2-sided original to one side of a sheet.

BAS041S

2 Sided 2 Pages Combine 1 Side


Copies two 2-sided originals to one side of a sheet.

48
Combined Copying

2
BAS042S

Orientation of the original and image position of combine


Portrait ( ) originals

BLF013S

Landscape ( ) originals

BLF014S

Placing originals (originals placed in the ADF)


• Originals read from left to right

BAT046S

• Originals read from top to bottom

BAT047S

49
2. Copying

1. Press the [Combine/Series] key.

BRH205S

The indicator goes on.


2. Select the combine mode using [ ] or [ ], and then press the [OK] key.

3. Select the original orientation using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.


4. Select the paper size using [ ] or [ ], and then press the [OK] key.

5. Place the originals, and then press the [Start] key.

• You cannot apply this function to sheets of 357 mm (14 inches) or longer that are fed from the bypass
tray.
• To cancel the One-Sided Combine function in step 1, press the [Combine/Series] key again. Make
sure the indicator goes off.

50
Combined Copying

• To display the screen in step 3, select [Always Specify] for [Orientation] with Copier Features in User
Tools. If [Do not Specify] is selected, proceed to step 4. For details about Orientation, see “User Tools
Menu”.

• p.63 "User Tools Menu"

2
Two-Sided Combine

Combines various pages of originals onto two sides of one sheet.

• You cannot use the bypass tray with this function.


There are four types of Two-Sided Combine.
1 Sided 4 Pages Combine 2 Sides
Copies four 1-sided originals to one sheet with two pages per side.

BAS047S

1 Sided 8 Pages Combine 2 Sides


Copies eight 1-sided originals to one sheet with four pages per side.

BAT048S

1. Front
2. Back

51
2. Copying

2 Sided 2 Pages Combine 2 Sides


Copies two 2-sided originals to one sheet with two pages per side.

BAS050S

2 Sided 4 Pages Combine 2 Sides


Copies four 2-sided originals to one sheet with four pages per side.

BAT051S

1. Front
2. Back

1. Press the [Combine/Series] key.

BRH205S

The indicator goes on.

52
Combined Copying

2. Select the combine mode using [ ] or [ ], and then press the [OK] key.

3. Select the original orientation using [ ] or [ ], and then press the [OK] key. 2

4. Select the duplex orientation using [ ] or [ ], and then press the [OK] key.

The "Programmed" message appears.


5. Select the paper size using [ ] or [ ], and then press the [OK] key.

6. Place the originals, and then press the [Start] key.

• To cancel the Two-Sided Combine function in step 1, press the [Combine/Series] key again. Make
sure the indicator goes off.
• If you set a binding margin that is too wide, parts of the image may not be copied.
• When making copies using the Combine function, a binding margin is added to copies after the
images are combined.
• To display the screens in steps 3 and 4, select [Always Specify] for [Orientation] with Copier Features
in User Tools. If [Do not Specify] is selected, proceed to step 5. For details about Orientation, see
“User Tools Menu”.

• p.63 "User Tools Menu"

53
2. Copying

Series Copies
Separately copies the front and back of a 2-sided original onto two sheets.
2 Sided 1 Sided
You can make 1-sided copies from 2-sided originals.

BAS104S

1. Press the [Combine/Series] key.

BRH205S

The indicator goes on.


2. Select [Series:2Sided Orig.] using [ ] or [ ], and then press the [OK] key.

3. Select the original orientation using [ ] or [ ], and then press the [OK] key.

54
Series Copies

The "Programmed" message appears.

4. Place the originals, and then press the [Start] key. 2


• To cancel the Series Copies function in step 1, press the [Combine/Series] key again. Make sure the
indicator goes off.
• To display the screen in step 3, select [Always Specify] for [Orientation] with Copier Features in User
Tools. If [Do not Specify] is selected, proceed to step 4. For details about Orientation, see “User Tools
Menu”.

• p.63 "User Tools Menu"

55
2. Copying

Finishing
You can sort your copies.

Sort
2 The machine assembles copies as sets in sequential order.

BAS053S

1. Press the [Sort] key.

BRH206S

The indicator goes on.


2. Enter the number of copy sets using the number keys.
3. Place the originals, and then press the [Start] key.

• When placing an original on the exposure glass, start with the first page to be copied. When placing
originals in the ADF, set so the first page is on the top.
• When placing originals on the exposure glass, press the [ ] key after all the originals have been
scanned.
• To cancel the Sort function in step 1, press the [Sort] key again. Make sure the indicator goes off.
• The number of copies that can be placed on the internal tray is as follows. When the number of copies
exceeds capacity, remove copies from the tray. (paper weight: 80 g/m2, 20 lb.)
• Internal tray
250 sheets

56
Finishing

Changing the number of sets


You can change the number of copy sets during copying.

• This function can only be used when the Sort function is selected.

1. While "Copying..." is displayed, press the [Clear/Stop] key.


2. Press [Sets].
2

3. Enter the number of copy sets with the number keys, and then press [Resume].

Copying starts again.

• The number of sets you can enter in step 3 differs depending on when the [Clear/Stop] key is pressed.

57
2. Copying

Adjusting Copy Image Density


You can adjust the density of the overall original in five steps.

1. Press the [Lighter] or [Darker] key to adjust the image density.


The density indicator moves.
2

BRH207S

The image density changes in five increments as follows:

BRH017S

58
Selecting the Original Type

Selecting the Original Type


Select an original type that is suitable for your originals.
There are three original types available:
Text
Select this mode when your originals contain only text (no pictures). 2
Photo
Delicate tones of photographs and pictures can be reproduced with this mode.
• When copying developed photographs
• When copying photographs or pictures that are printed on paper (e.g. magazines)
• When copying originals generated by color copiers

1. Press the [Original Type] key to select the original type.


The indicator of the selected original type goes on.

BRH208S

Upper indicator: Text


Lower indicator: Photo

59
2. Copying

Selecting Copy Paper


Select the tray containing the paper you want to copy onto: a paper tray or the bypass tray.

1. Select the desired tray using [ ] or [ ].


The selected tray and paper size are displayed.
2

60
3. Copier Features
This chapter describes user tools in the Copier Features menu.

Accessing User Tools


This section describes how to access User Tools menu.
User Tools allow you to change or set defaults.

3
• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished. For details about how to end User Tools, see “Quitting User Tools”.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or [Clear Modes] key is pressed.

• p.62 "Quitting User Tools"

Changing Default Settings

This section describes how to change the settings of User Tools.

• If Administrator Authentication Management is specified, contact your administrator.

1. Press the [User Tools/Counter] key.

BRH209S

2. Select the menu using [ ] or [ ], and then press the [OK] key.
To change the Copier Features, select [Copier Features].
3. Select the item using [ ] or [ ], and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.

61
3. Copier Features

• Press the [Escape] key to return to the previous display.


• To cancel changes made to settings and return to the initial display, press the [User Tools/Counter]
key.

Quitting User Tools

This section describes how to quit the settings of User Tools.


3 1. Press the [User Tools/Counter] key.

BRH209S

62
User Tools Menu

User Tools Menu


This section describes the User Tools in Copier Features.
Default settings are shown in bold type.
Auto Tray Switching
If you load paper of the same size and in the same orientation in two trays, the machine automatically
shifts to the other when the first tray runs out of paper (when “On” is selected). This function is called
“Auto Tray Switching”. This setting specifies whether to use Auto Tray Switching or not.
The default setting is On. 3
• Off
When a paper tray runs out of paper, copying is interrupted and the message "Load paper." is
displayed.
Original Type Setting
You can adjust copy finish quality level according to original type. You can choose these functions
after selecting Original Type 1 (Text) or Original Type 2 (Photo).
• Text Mode 1
normal text originals
• Text Mode 2
newspapers, semi-transparent originals (reverse side print faintly visible)
• Photo Mode 1
text / photo images containing mostly photo areas
• Photo Mode 2
text / photo images containing mostly text areas
• Photo Mode 3
actual photographic paper
• Special Mode 1
highly transparent originals (reverse side clearly visible), or light text on a colored background.
Also for originals with very grainy backgrounds (some newspapers) and light text.
• Special Mode 2
originals with colored text and lines
• Special Mode 3
photo images created by dithering (visible dots), such as newspaper photos - normal resolution
• Special Mode 4
photo images created by dithering (visible dots), such as newspaper photos - coarse resolution

63
3. Copier Features

• Special Mode 5
normal text originals (reproducing the background)
The default setting for “Original Type 1 (Text)” is Text Mode 1.
The default setting for “Original Type 2 (Photo)” is Photo Mode 1.
Duplex Mode Priority
You can select the type of Duplex function effective when the machine is turned on, reset, or modes
are cleared.
The default setting is 1 Sided 1 Sided.
3 Orientation
You can select the original orientation when using the Combine/Series, or Duplex function.
The default setting is Do not Specify.
Max. Number of Sets
The maximum copy quantity can be set between 1 and 99 using the number keys.
The default setting is 99 sheets.
Original Count Display
You can set to display the count of originals and copying pages on the display when “On” is selected.
The default setting is Off.
Reproduction Ratio
You can select which reduce, enlarge, or input ratio is shown on the display with priority when
“Reduce” or “Enlarge” is selected.
Reduce or Enlarge ratios for setting are as follows:
The default setting for "Ratio 1" is 50% (Metric version) / 65% (Inch version).
The default setting for "Ratio 2" is 71% (Metric version) / 78% (Inch version).
The default setting for "Ratio 3" is 93% (Metric version) / 93% (Inch version).
The default setting for "Ratio 4" is 141% (Metric version) / 129% (Inch version).
The default setting for "Ratio 5" is 200% (Metric version) / 155% (Inch version).
You can set a ratio other than the above.
1. Select [Reproduction Ratio] using [ ] or [ ], and then press the [OK] key.
2. Select the ratio you want change using [ ] or [ ], and then press the [OK] key.
3. Select [User R/E Ratio] using [ ] or [ ], and then press the [OK] key.
4. Enter a ratio using the number keys from "50-200", and then press the [OK] key.
The "Programmed" message appears.
Preset R/E Priority
You can set the ratio with priority when [R/E] is pressed.

64
User Tools Menu

The default setting is 71% (Metric version) / 65% (Inch version).


Duplex Margin
You can specify left margin on the back side of copies, and top margin on the front side.
The default setting for “Top Margin” is 5 mm (Metric version) / 0.2 inch (Inch version).
The default setting for “Left Margin” is 5 mm (Metric version) / 0.2 inch (Inch version).
Letterhead Setting
If you select “On” for this function, the machine rotates the image correctly.
The default setting is Off.
3
Menu Protect
You can prevent unauthenticated users from changing the user tools settings. For details, consult the
administrator.
The default setting is Level 2.

65
3. Copier Features

66
4. Appendix
This chapter describes the copy machine's specifications and the function compatibility.

Function Compatibility
The combination chart given below shows which modes can be used together.
Blank: These modes can be used together.
: These modes cannot be used together. The second mode selected will be the mode you are working
in.
The following shows the combinations of functions:
4

BRH018S

*1 A function incompatibility message appears if you load a sheet that exceeds 357 mm (14 inches) with the two-
sided original function. Copying is not possible until one of the functions is disabled.

67
4. Appendix

*2 A function incompatibility message appears if you load a sheet that exceeds 357 mm (14 inches). Copying is
not possible until one of the functions is disabled.
*3 The mode selected second changes the reduce/enlarge ratio.
*4 A function incompatibility message appears if you select two conflicting functions. Copying is not possible until
one of the functions is disabled.

68
Trademarks

Trademarks
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and /or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.

69
4. Appendix

70
INDEX
A I
Accessing User Tools............................................61 Image density........................................................58
ADF..............................................................6, 11, 16 Image position of combine...................................47
Adjusting copy image density..............................58 Initial display............................................................8
Auto document feeder.............................................6 L
Auto Tray Switching..............................................63
Legal Prohibition......................................................7
B Letterhead Setting..................................................65
Base point of Reduce/Enlarge.............................38 M
Basic procedure....................................................25
Bypass tray......................................................20, 27 Manuals for this machine........................................3
Max. Number of Sets............................................64
C
Menu Protect.......................................................... 65
Changing default settings.....................................61 Missing image area..............................................13
Changing the number of sets................................57 N
Combined Copying...............................................47
Copying.................................................................25 Name of Major Item...............................................6
Copying from the bypass tray..............................27 Non-compatible originals.....................................11
Copying onto envelopes......................................33 Note..........................................................................6
Copying onto OHP transparencies......................31 Notice.......................................................................5
Copying onto thick paper.....................................32 O
Custom size originals......................................18, 21
OHP transparencies..............................................31
Custom size paper.................................................30
One-Sided Combine.............................................47
D Orientation.............................................................64
Display...................................................................... 8 Original Count Display.........................................64
Display panel...........................................................8 Original orientation...............................................15
Duplex copying.....................................................43 Original size..........................................................11
Duplex Margin......................................................65 Original type..........................................................59
Duplex Mode Priority............................................64 Original Type Setting............................................63
Original weight...................................................... 11
E Originals................................................................11
Enlarging originals................................................38 P
Entering a ratio using the number keys................41
Envelopes...............................................................33 Paper tray...............................................................17
Exposure glass................................................11, 15 Photo.......................................................................59
Placing custom size originals.........................18, 21
F Placing originals..............................................11, 15
Finishing.................................................................56 Placing originals in the ADF..................................16
Function compatibility...........................................67 Placing originals on the exposure glass..............15
H Placing regular size originals.........................17, 20
Preset R/E Priority..................................................64
Horizontal size..........................................18, 21, 30 Preset Reduce/Enlarge.........................................38
How to read this manual.........................................6

71
Q
Quitting User Tools................................................62
R
Reading the display and using keys.......................8
Recommended originals.......................................11
Reducing originals.................................................38
Regular size originals.....................................17, 20
Regular size paper................................................29
Reproduction Ratio................................................64
S
Selectable original size......................................... 12
Selecting a preset ratio.........................................38
Selecting a ratio using the scroll keys..................40
Selecting copy paper.....................................60, 61
Series Copies.........................................................54
Sort.........................................................................56
Specifying original sizes................................. 17, 20
Symbols....................................................................6
T
Text.........................................................................59
Thick paper............................................................32
Trademarks............................................................69
Two-Sided Combine.............................................51
U
User Tools Menu...................................................63
V
Vertical size...............................................18, 21, 30
Z
Zoom......................................................................40

72 EN USA D069-6801
Copyright © 2008
Operating Instructions Copy Reference

Type for 917/LD117/MP 171/Aficio MP 171


Type for 917F/LD117F/MP 171F/Aficio MP 171F
Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF
EN USA D069-6801
Quick Reference Copy Guide

cPlease put this guide above your machineg


D0696804

1. Indicators 6. {Clear/Stop} key 11. {#} key 18. {Duplex} key


2. Display panel • Clear: Clears an entered numeric 12. Number keys Perform duplex printing when
3. Selection keys value. 13. {OK} key copying a multiple-sheet original.
Correspond to items on the display. • Stop: Stops a job in progress, Press to set a selected item or an 19. {Combine/Series} key
Press to select the corresponding such as copying, scanning, entered numeric value. • Combine: Combines and prints
item. faxing, or printing. 14. {Original} key the pages of a multiple-sheet
4. Scroll keys 7. {Clear Modes} key 15. {Escape} key original onto a single-sheet.
Press to select an item. Press to clear the current settings. Press to cancel operation or return • Series: Prints each page of a
{U}: scrolls upward 8. Main power indicator to the previous display. double-page spread as a single-
{T}: scrolls downward 9. Operation switch 16. {Lighter} key, {Darker} key page copy.
{V}: scrolls right 10. {Start} key 17. {Sort} key
{W}: scrolls left Press to start copying, printing, Press to automatically sort printed
5. {User Tools/Counter} key scanning, or sending. copies.

1 2 3 4 5 6 7 8
Copier

Tips
Facsimile
Paper Size

Scanner
Paper Size
You can check the paper size
Printer
using the scale on the exposure glass.

How to make a Copy... (1. Placing Originals) Advanced features (2. Copying)

Reduce/Enlarge
A Press the {Clear Modes} key.
• Zoom: you can change the reproduction ratio in increments
B Place the originals. 19 18 17 16 15 14 13 12 11 10 9 of 1%.
• Exposure Glass
(Face down)
Series Copies
• Orientation: [Top to Top] / [Top to Bottom]
• Series: copies the front and back of a 2-sided original on 2
sheets.
• ADF (Face up)

How to save paper... (2. Copying)


How to sort your copies... (2. Copying)
A See if the original is 1- Duplex
sided or 2-sided (duplex). Duplex A Press the {Sort} key.

B Press the {Duplex} key 1-Sided → 2-Sided 2-Sided → 2-Sided


C Enter the number of copies. or the {Combine/Series} Copies two 1-sided originals on one Copies one 2-sided original on one
D Press the {Start} key. key. 2-sided page. 2-sided page.

C Select one of the settings


using {U} or {T}, and
How to Reduce/Enlarge... (2. Copying)
then press the {OK} key. B Enter the number of copy sets using the number keys.
Preset Reduce/Enlarge D Place the originals, and Combine/Series Combine
A Press [R/E]. then press the {Start} C Place the originals.
1-Sided Combine 2-Sided Combine
key. Copies multiple 1-sided originals on Copies multiple 1-sided originals on Copies multiple 2-sided originals on
B Press [Enlarge] or [Reduce]. one side of copy paper. two sides of copy paper. two sides of copy paper. D Press the {Start} key.

C Select a ratio using {U} or {T}, and then Sort


press the {OK} key. Copies are assembled as
sets in sequential order.
D Place the originals, and then press the {Start}
key. For more functions on Combine, see “Combined Copying”.

Copyright © 2008 Printed in China EN USA D069-6804


Chapter references in this guide refer to the bundled OI CD; Copy Reference.

StellaC4_CopyQR_F1-EN.indd 1 12/8/2008 7:43:21 PM


Quick Reference Printer Guide
D4686704

cPlease follow these instructions using your PCg


How to install the printer driver... How to use Web Image Monitor...
Users of Windows 2000 / XP / Vista, and Windows Server A Start your Web browser.
2003 / 2003 R2 / 2008 can install printer driver easily using B In your browser's address bar, enter the following:
the supplied CD-ROM. http://machine's IP address/
A Insert the provided CD-ROM into the computer’s CD-ROM C Select one of the following functions:
drive.
• Home
B Select an interface language, and then click [OK]. • Fax Received File
C Click [Quick Install]. • Printer: Print Jobs
PCL6 printer driver and DeskTopBinder-SmartDeviceMonitor • Job
for Client are installed. • Configuration
D Click [I accept the agreement], and then click [Next >]. Why use Web Image Monitor?
E Select the machine model you want to use. • To access the machine anywhere via a Web browser.
F Click [Install] • To provide you with the convenience of managing certain
The printer driver installation starts. functions from your computer.
G Click [Finish], and then click [Exit].
Downloading the printer driver
• If your operating system is Windows XP Pro x64, or Windows How to receive a fax to download
Server 2003 / 2003 R2 / 2008 x64, you must download the
printer driver from the supplier’s Web site. Setting must be made before you can receive fax
For details, see “Installing the Printer Driver”, Printer documents. For details, “Fax via Computer”, Facsimile
Reference. Reference.
A Start your Web browser.
How to prepare for printing... B In your browser's address bar, enter the following:
http://machine's IP address/
A On the [Start] menu, click [Printer and Faxes].
C In the menu area to the left, click [Fax Received File].
B Right-click the icon of the printer you want to use, and then
D Click Property Icon of a fax document.
click [Set as Default Printer].
E View contents of fax documents.
C On the [File] menu, click [Properties].
F To download a fax document, click [PDF] or [TIFF].
D On the [Accessories] tab, select the options and specify the
paper trays you want to use.
E Specify the paper size of the original, and then click the
[General] tab.
F Click [Printing Preferences...]. Make your settings under
[One Click Presets], [Detailed Settings], and [Configuration/
About].
How to print a confidential document... How to print documents later (Hold Print) How to monitor your machine in the network...
G Save the One Click Presets you have made If necessary:
A On the [File] menu, click [Print], and then click [Preferences]. How to print stored documents on the hard disk (Stored Print) Use SmartDeviceMonitor, which is automatically installed
click [Register Current Settings...] on the [One Click Presets]
tab, enter a name, and then click [OK]. B In [Job Type:], select [Locked Print]. A On the [File] menu, click [Print], and then click [Preferences]. with your printer drivers.
B In [Job Type], select [Hold Print] or [Stored Print]. A Right-click the green PC icon at the bottom of your screen.
C Click [Details...]. C Click [Details...].
D Specify [User ID] and [Password]. D Specify [User ID], [File Name], and [Password] if necessary B Point to [Properties], and then click [Monitor Device
(for password protected Stored Print documents). Settings...].
How to print... E Click [OK]. E Click [OK]. C On the [Network Devices] tab, click [Browse...].
F Perform steps as described in ‘How to print...’ from step 3 F Perform steps as described in ‘How to print...’ from step 3
A Open your document. onwards. onwards. D Select your machine, and then click [OK].
B - Click the print icon directly, or G Go to the machine, and then press the {Printer} key.
G Go to the machine and then press the {Printer} key. E On the [Printers Folder] tab, click the [To be monitored] and
H Press [Prt.Jobs].
- On the [File] menu, click [Print]. [Displayed on Task Bar] check boxes.
H Press [Prt.Jobs]. I Select [Hold Print Jobs] or [Stored Print Jobs] using the [▲]
C Select the printer you want to use in the [Name] or [Select or [▼] key, and then press [Job List].
Printer] list, and then click [Preferences]. I Select [Locked Print Jobs] using the [▲] or [▼] key, and then J Select your document using the [▲] or [▼] key, and then If you select this machine from the SmartDeviceMonitor icon,
press [Job List]. press [Print]. you can see the [Status], [Configuration] and [Job History].
D Make the settings you require, and then click [OK]. K Enter the password if necessary (for password protected Next time you print, you get a message on your pc in case of
J Select your document using the [▲] or [▼] key, and then
E Set a number of copies. press [Print].
Stored Print documents). any failure.
L Enter the number of copies to print. (for Stored Print
F Click [OK]. K Enter your password, and then press [OK]. documents).
Reconfirm by pressing [Print]. M Press [Print].
The Hold Print file is printed, and deleted afterwards.
The Locked Print file is printed, and deleted afterwards. The Stored Print file is printed.
Copyright © 2008 Printed in China EN USA D468-6704

StellaC4_QuickReferencePrinterGu1 1 2008/10/28 13:21:55


Operating Instructions
Printer Reference

1 Preparing the Machine


2 Printing Documents
3 Printing Stored Document
4 Printing from DeskTopBinder Lite
5 Printer Features
6 Appendix
7
8
9
10
11

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
Model-Specific Information.............................................................................................................................10
1. Preparing the Machine
Confirming the Connection Method...............................................................................................................11
Network Connection...................................................................................................................................11
Local Connection.........................................................................................................................................13
Installing the Printer Driver...............................................................................................................................14
Quick Install..................................................................................................................................................14
Using the SmartDeviceMonitor for Client Port...........................................................................................15
Using the Standard TCP/IP Port.................................................................................................................20
Using the LPR Port.........................................................................................................................................21
Using the WSD port.....................................................................................................................................23
Using as a Windows Network Printer............................................................................................................25
Using as a NetWare Print Server/Remote Printer.........................................................................................27
Form Feed.....................................................................................................................................................28
Banner Page.................................................................................................................................................29
Printing after Resetting the Printer................................................................................................................29
Installing the Printer Driver Using USB............................................................................................................30
Windows 2000/XP, Windows Server 2003/2003 R2 - USB..............................................................30
Windows Vista, Windows Server 2008 - USB.........................................................................................31
Printing with Parallel Connection....................................................................................................................33
Making Option Settings for the Printer...........................................................................................................35
Conditions for Bidirectional Communication.............................................................................................35
If Bidirectional Communication Is Disabled...............................................................................................36
Installing Font Manager...................................................................................................................................37
Using Adobe PageMaker Version 6.0, 6.5, or 7.0......................................................................................38

1
2. Printing Documents
Displaying the Printer Driver Settings Screen.................................................................................................39
Making printer default settings - the printer properties.............................................................................39
Making printer default settings - printing preferences..............................................................................39
Making printer settings from an application..............................................................................................40
Setting Paper on the Bypass Tray...................................................................................................................41
Setting the Paper Size Using the Control Panel.........................................................................................43
Setting Custom Size Paper Using the Control Panel.................................................................................45
Setting Thick Paper or OHP Transparencies Using the Control Panel.....................................................47
Setting Envelopes Using the Control Panel................................................................................................49
Printing on Orientation-Fixed or Two-Sided Paper.......................................................................................55
Frequently Used Print Methods.......................................................................................................................57
Standard Printing.........................................................................................................................................57
Printing on both sides of sheets...................................................................................................................58
Combining Multiple Pages into Single Page.............................................................................................60
Using One Click Presets..............................................................................................................................63
Advanced Printing............................................................................................................................................65
Menu Names and Brief Overview of Each Function................................................................................65
Collate .........................................................................................................................................................65
If Error Occurs with the Specified Paper Size and Type...............................................................................67
Printing from a Selected Tray......................................................................................................................67
Canceling a Print Job...................................................................................................................................68
Spool Printing...................................................................................................................................................70
Registering Classification Codes.....................................................................................................................71
Configuring Classification Codes...............................................................................................................72
Specifying the Classification Code for a Print Job....................................................................................72
3. Printing Stored Documents
Display .............................................................................................................................................................75
Reading the Display and Using Keys.........................................................................................................75
Using the Print Job Function.............................................................................................................................77
Print Job screen............................................................................................................................................77
Printing from the Print Job Screen....................................................................................................................80
Sample Print..................................................................................................................................................80

2
Locked Print..................................................................................................................................................83
Hold Print......................................................................................................................................................87
Stored Print...................................................................................................................................................90
Printing from the User ID Screen.....................................................................................................................94
Printing the Selected Print Job.....................................................................................................................94
Printing All Print Jobs....................................................................................................................................95
Canceling a Print Job.......................................................................................................................................97
Canceling a Print Job Using the Control Panel..........................................................................................97
Windows - Canceling a Print Job from the computer...............................................................................97
Mac OS - Canceling a Print Job from the computer.................................................................................98
Checking the Error Log....................................................................................................................................99
4. Printing from DeskTopBinder Lite
Printing a PDF File Directly............................................................................................................................101
Printing Method.........................................................................................................................................101
Using DeskTopBinder Lite.........................................................................................................................101
PDF Direct Print Properties........................................................................................................................103
Using Commands......................................................................................................................................104
5. Printer Features
Accessing User Tools.....................................................................................................................................105
Changing Default Settings........................................................................................................................105
Quitting User Tools....................................................................................................................................105
Menu Protect..............................................................................................................................................106
List/Test Print..................................................................................................................................................107
Printing the Configuration Page...............................................................................................................107
Maintenance..................................................................................................................................................110
System.............................................................................................................................................................111
Host Interface.................................................................................................................................................115
PCL Menu.......................................................................................................................................................116
PS Menu.........................................................................................................................................................118
PDF Menu.......................................................................................................................................................120
6. Appendix
Using the Virtual Printer.................................................................................................................................121
Adding a Virtual Printer.............................................................................................................................121

3
Changing a Virtual Printer Configuration................................................................................................122
Confirming a Virtual Printer Configuration..............................................................................................122
Deleting a Virtual Printer...........................................................................................................................123
Printing Using a Virtual Printer..................................................................................................................123
Specifications.................................................................................................................................................125
Trademarks.....................................................................................................................................................127
INDEX...........................................................................................................................................................129

4
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For "UNIX Supplement", please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product Name General name

DeskTopBinder Lite and DeskTopBinder Professional *1 DeskTopBinder

*1 Optional

6
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

7
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.

[]
Indicates the names of keys that appear on the machine's display panel.

[]
Indicates the names of keys on the machine's control panel.

Note

Contents of this manual are subject to change without prior notice.


Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

8
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.

9
Model-Specific Information
In this manual, model-specific information is indicated by the following marks:

Indicates information that is specific to the 220 to 240 V model.

Indicates information that is specific to the 120 V model.

• Check the label on the right side of the machine to identify the model.

BRP008S

• Dimensions in this manual are given in two units of measure: metric and inch. If your machine is the
220 to 240 V model, refer to the metric units. If your printer is the 120 V model, refer to the inch units.

10
1. Preparing the Machine
This chapter describes how to connect this machine to your computer, and install the printer driver.

1
Confirming the Connection Method
This machine supports network and local connection.
Before installing the printer driver, check how the machine is connected. Follow the driver installation
procedure that is appropriate to the connection method.

Network Connection

This machine can be used as a Windows printing port or network printer.

Using this printer as the Windows printing port


Network connections can be established through Ethernet, and Wireless LAN.
Available ports are determined based on the combination of Windows operating system version and
connection method used.

BMG021S

Windows 2000/XP, Windows Server 2003/2003 R2

Connection Method Available Ports

• Ethernet • SmartDeviceMonitor for Client port

11
1. Preparing the Machine

Connection Method Available Ports


• Wireless LAN • Standard TCP/IP port
• LPR port
1
Windows Vista, Windows Server 2008

Connection Method Available Ports

• Ethernet • SmartDeviceMonitor for Client port


• Wireless LAN • Standard TCP/IP port
• LPR port
• WSD port

• See the explanation about how to install the printer driver for each type of port.
• For details about SmartDeviceMonitor for Client port, see "Installing the Printer Driver".
• For details about Standard TCP/IP port, see "Installing the Printer Driver".
• For details about LPR port, see "Installing the Printer Driver".
• For details about WSD port, see "Installing the Printer Driver".

• p.14 "Installing the Printer Driver"

Using as a network printer


This machine can be used as the Windows network printer, the NetWare print server, or the NetWare
remote printer.

12
Confirming the Connection Method

BMG020S

• In an IPv6 environment, NetWare servers cannot be used.


• See the explanation about how to install the printer driver for each type of network printer.
• For details about Windows network printer, see "Using as a Windows Network Printer".
• For details about NetWare print server and remote printer, see "Using as a NetWare Print Server/
Remote Printer".

• p.25 "Using as a Windows Network Printer"


• p.27 "Using as a NetWare Print Server/Remote Printer"

Local Connection

Local connections can be established via parallel and USB connections.

• See the explanation about how to install the printer driver for each method of connections.
• For details about USB connections, see "Installing the Printer Driver Using USB".
• For details about parallel connections, see "Printing with Parallel Connection".

• p.30 "Installing the Printer Driver Using USB"


• p.33 "Printing with Parallel Connection"

13
1. Preparing the Machine

Installing the Printer Driver


This section explains how to install the printer driver. There are two ways to install the printer driver: using
1 Quick Install, which installs the settings at once, or installing the appropriate driver according to the port
you want to use.
Downloading the Printer Driver
You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
If your operating system is Windows XP Professional x64, Windows Vista x64, or Windows Server
2003/2003 R2/2008 x64, you must download the printer driver from the supplier's Web site. Select
this machine and the operating system you are using, and then download it.

Quick Install

Users of Windows 2000/XP/Vista, and Windows Server 2003/2003 R2/2008 can install this software
easily using the supplied CD-ROM.
Using Quick Install, the PCL printer driver, DeskTopBinder - SmartDeviceMonitor for Client are installed
under network environment, and the TCP/IP port will be set.

• To install the printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an Administrator.
• If you connect using USB, see "Installing the Printer Driver Using USB" and install the printer driver.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [Quick Install].
The software license agreement appears in the [License Agreement] dialog box.
5. After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select the machine model you want to use in the [Select Printer] dialog box.
For network connection via TCP/IP, select the machine whose IP address is displayed in [Connect
To].
For parallel connection, select the machine whose printer port is displayed in [Connect To].
7. Click [Install].
The printer driver installation starts.

14
Installing the Printer Driver

The PCL6 printer driver is installed in the language specified by your operating system.
8. Click [Finish].
A message about restarting the computer appears. Restart the computer to complete installation.
9. Click [Exit] in the first dialog box of the installer, and then take out the CD-ROM. 1
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.
• Select the machine whose IP address is displayed in [Connect To] to install SmartDeviceMonitor for
Client when using TCP/IP.
• Quick Install is not available unless bidirectional communication between the machine and computer
is enabled via parallel connection. For details about bidirectional communication between the
machine and computer, see "Making Option Settings for the Printer".

• p.30 "Installing the Printer Driver Using USB"


• p.35 "Making Option Settings for the Printer"

Using the SmartDeviceMonitor for Client Port

• To install SmartDeviceMonitor for Client under Windows 2000/XP/Vista, and Windows Server
2003/2003 R2/2008, you must have an account that has Manage Printers permission. Log on as
an Administrator.
• Install SmartDeviceMonitor for Client before installing the printer driver when using the
SmartDeviceMonitor for Client port.

Installing SmartDeviceMonitor for Client

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [DeskTopBinder - SmartDeviceMonitor for Client].
5. The message to quit all other applications appears. Quit all applications, and then click [Next
>].

15
1. Preparing the Machine

6. The software license agreement appears in the [License Agreement] dialog box. After
reading through its contents, click [Yes].
7. Click [Full install] or [Custom install].

1 [Full install] installs all required applications: DeskTopBinder Lite and SmartDeviceMonitor for
Client.
[Custom install] installs selected applications.
8. Follow the instructions on the display and then click [Next >] to proceed to the next step.
9. After the installation is completed, select one of the options to restart the computer either
now or later, and click [Complete].
Restart the computer to complete installation.

• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.

Installing the PCL printer driver (TCP/IP)

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select the printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Click [Next >].
8. Select the machine model you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.
9. Double-click the printer name to display the printer settings.
The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
10. Click [Port], and then click [Add].
11. Click [SmartDeviceMonitor], and then click [OK].

16
Installing the Printer Driver

12. Click [TCP/IP], and then click [Search].


A list of printers using TCP/IP appears.
13. Select the printer you want to use, and then click [OK].
Only printers that respond to a broadcast from the computer appear. To use a machine not listed 1
here, click [Specify Address], and then enter the IP address or host name of the machine.
14. Check that the port of the selected printer is displayed in [Port].
15. Set a user code, if necessary.
Up to 8 numeric characters can be entered. No alphabetic characters or symbols can be entered.
16. Select the [Default Printer] check box to configure the printer as default.
17. Click [Continue].
Installation starts.
18. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].

• Setting a user code allows a SmartDeviceMonitor for Admin user to display and check statistics about
the number of sheets which each user prints. For details, see SmartDeviceMonitor for Admin Help.
• Auto Run may not work with certain operating system settings. If this happens, launch "Setup.exe" on
the CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.

Installing the PCL printer driver (IPP)

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select a printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Click [Next >].

17
1. Preparing the Machine

8. Select the printer model you want to use.


The printer name can be changed in the [Change settings for 'Printer Name'] box.
9. Double-click the printer name to display the printer settings.
1 The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
10. Click [Port], and then click [Add].
11. Click [SmartDeviceMonitor], and then click [OK].
12. Click [IPP].
13. In the [Printer URL] box, enter "http://printer's IP address/printer" as the printer's address.
If the server authentication is issued, to enable SSL (a protocol for encrypted communication), enter
"https://printer's IP address/printer" (Internet Explorer 5.01, or a higher version must be installed).
(example IP address: 192.168.15.16)
http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter "http://printer's IP address/ipp" as the printer's address.
14. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
one of any existing ports.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
15. Click [Detailed Settings] to make necessary settings.
For details about the settings, see SmartDeviceMonitor for Client Help.
16. Click [OK].
17. Check that the port of the selected printer is displayed in [Port].
18. Set a user code, if necessary.
Up to 8 numeric characters can be entered. No alphabetic characters or symbols can be entered.
19. Select the [Default Printer] check box to configure the printer as default.
20. Click [Continue].
Installation starts.
21. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.

• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.

18
Installing the Printer Driver

• Setting a user code allows a SmartDeviceMonitor for Admin user to display and check the number
of sheets each user prints. For details, see SmartDeviceMonitor for Admin Help.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.
1

Changing the port settings for SmartDeviceMonitor for Client


Follow the procedure below to change the SmartDeviceMonitor for Client settings, such as TCP/IP timeout,
recovery/parallel printing, and printer groups.

Windows 2000:

1. On the [Start] menu, point to [Settings], and then click [Printers].


The [Printers] window appears.
2. Click the icon of the printer you want to use. On the [File] menu, click [Properties].
3. On the [Ports] tab, click [Configure Port].
The [Configuration] dialog box appears.

Windows XP, Windows Server 2003/2003 R2:

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use. On the [File] menu, click [Properties].
3. Click the [Ports] tab, and then click [Configure Port].
The [Port Configuration] dialog box appears.

Windows Vista, Windows Server 2008:

1. On the [Start] menu, click [Control Panel].


The [Control Panel] window appears.
2. Click [Printer].
The [Printers] window appears.
3. Right-click the icon of the printer you want to use, and then click [Properties].
4. Click the [Ports] tab, and then click [Configure Port].
The [Port Configuration:] dialog box appears.

• For TCP/IP, timeout setting can be configured.


• User, proxy, and timeout settings can be configured for IPP.

19
1. Preparing the Machine

• If no settings on the [Recovery/Parallel Printing] tab are available, follow the procedure below.
1. Click [Cancel] to close the [Port Configuration:] dialog box.
2. Start SmartDeviceMonitor for Client, and then right-click the SmartDeviceMonitor for Client icon
1 on the task tray.
3. Point to [Properties], and then click [Extended Features Settings].
4. Select the [Set Recovery/Parallel Printing for each port] check box.
5. Click [OK] to close the [Extended Features Settings] dialog box.
• For details about these settings, see SmartDeviceMonitor for Client Help or "Using
SmartDeviceMonitor for Client", Network and System Settings Guide.

Using the Standard TCP/IP Port

This describes how to install the PCL printer driver using the TCP/IP port.

• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the SmartDeviceMonitor for
Client port.

Installing the PCL printer driver

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select a printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Click [Next >].
8. Select the printer model you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.

20
Installing the Printer Driver

9. Double-click the printer name to display the printer settings.


The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
10. Click [Port], and then click [Add]. 1
11. Click [Standard TCP/IP Port], and then click [OK].
Configure the Standard TCP/IP port settings, and then see Windows Help if [Standard TCP/IP Port]
does not appear.
12. Click [Next >] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
13. Enter the printer name or IP address in the [Printer Name or IP Address] box.
The [Port Name] text box automatically obtains a port name. Change this name if necessary.
When the device selection appears, select "RICOH NetworkPrinter Driver C Model".
14. Click [Next >].
15. Click [Finish] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
The installation start dialog box reappears.
16. Check that the port of the selected printer is displayed in [Port].
17. Configure the default printer as necessary.
18. Click [Continue].
The printer driver installation starts.
19. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.

• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.

Using the LPR Port

This describes how to install the PCL printer driver using the LPR port.

21
1. Preparing the Machine

• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
1 Administrators or Power Users group member.
• In an IPv6 environment, you cannot use the LPR Port. Use the SmartDeviceMonitor for Client port.

Installing the PCL printer driver

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select a printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Select the printer model you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.
8. Click [Next >].
9. Double-click the printer name to display the printer settings.
The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
10. Click [Port], and then click [Add].
11. Click [LPR Port], and then click [OK].
If [LPR Port] does not appear, see Windows Help and install it.
12. Enter the printer's IP address in the [Name or address of server providing lpd] box.
13. Enter "lp" in the [Name of printer or print queue on that server] box, and then click [OK].
The port is added.
14. Check that the port of the selected printer is displayed in [Port].
15. Configure the default printer as necessary.
16. Click [Continue].
The printer driver installation starts.

22
Installing the Printer Driver

17. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.

1
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.

Using the WSD port

This section explains installation when using the WSD port.

• The WSD port can be used under Windows Vista or Windows Server 2008.
• To install under Windows Vista or Windows Server 2008, you must have an account that has Manage
Printers permission. Log on as an Administrator.
• You can connect to the printer only if both the printer and computer are on the same network segment,
or "Network discovery" is enabled. For details, see Windows Help.

Installing the PCL printer driver

1. Quit all applications currently running.


2. On the [Start] menu, click [Network].
The [Network] window appears, and the device search begins automatically.
3. Right-click the printer's icon, and then click [Install].
If the [User Account Control] dialog box appears, click [Continue].
The [Found New Hardware] dialog box appears.
4. Click [Locate and install driver software (Recommended)].
If the [User Account Control] dialog box appears, click [Continue].
5. Click [Don't search online].
6. Click [Browse my computer for driver software (advanced)].
7. Insert the provided CD-ROM into the computer's CD-ROM drive.
If the [AutoPlay] dialog box appears, click the [close] button and then proceed to step 8.

23
1. Preparing the Machine

8. Click [Browse...], and then specify a location for the printer driver.
If the CD-ROM drive letter is D, the printer driver's source files are stored in "D:\DRIVERS\PCL5E
\XP_VISTA\(Language)\DISK1" or "D:\DRIVERS\PCL6\XP_VISTA\MUI\DISK1".

1 The PCL6 printer driver is installed in the language specified by your operating system.
9. Click [Next].
If the [Windows can't verify the publisher of this driver software] message appears, click [Install this
driver software anyway].
10. Click [Close].
If installation is successful, the icon of the printer connected to the "WSD" port is added to the [Printers]
window.

• The port name that follows "WSD" uses random character strings. It cannot be changed freely.
• To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD
Port, right-click the printer's icon in the [Network] window, and then click [Uninstall].

24
Using as a Windows Network Printer

Using as a Windows Network Printer


This describes how to install the PCL printer driver when using the printer as a Windows network printer.
To use the print server, install the printer driver by selecting "Network printer server", and then select the 1
Windows 2000/XP/Vista, or Windows Server 2003/2003 R2/2008 shared printer.
This section assumes that the client has already been configured to communicate with a Windows 2000/
XP/Vista, or Windows Server 2003/2003 R2/2008 print server. Do not begin the following procedure
before the client is set up and configured correctly.

• To install the printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• If you print with a print server connected to the printer using the SmartDeviceMonitor port, Recovery
Printing and Parallel Printing cannot be used from the client.
• If you print under Windows XP/Vista or Windows Server 2003/2003 R2/2008 print server,
notification functions of SmartDeviceMonitor may not be used with the client.
• You can install the printer driver from the CD-ROM provided with this printer or download it from the
supplier's Web site.
• If your operating system is Windows XP Pro x64, Windows Server 2003/2003 R2/2008 x64, you
must download the printer driver from the manufacturer's Web site. Select this printer and the operating
system you are using, and then download it.

Installing the PCL Printer Driver

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select the printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Click [Next >].
8. Select the [Printer Name] check box to select the printer models you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.

25
1. Preparing the Machine

9. Double-click the printer name to display the printer settings.


The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.

1 10. Click [Port], and then click [Add].


11. Click [Network Printer], and then click [OK].
12. Double-click the computer name you want to use as a print server in the [Browse for Printer]
window.
13. Select the printer you want to use, and then click [OK].
14. Check that the port of the selected printer is displayed in [Port].
15. Configure the user code as necessary.
For details about user code, see the printer driver Help.
16. Select the [Default Printer] check box to configure the printer as default.
17. Click [Continue].
The printer driver installation starts.
18. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run.
• If you still want to install the printer driver, use [Add Printer]. See “Messages Displayed When Installing
the Printer Driver” Trouble Shooting.

26
Using as a NetWare Print Server/Remote Printer

Using as a NetWare Print Server/Remote Printer


This describes how to set up the Windows computer used as the NetWare client.
1
• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• In an IPv6 environment, NetWare servers cannot be used.
The following explanation assumes NetWare Client is installed on the client computer and the NetWare
server environment is correctly set up. Install all necessary client applications before following this
procedure.
Set up the printer driver while logging on to the NetWare file server.
The following values are used in the example:
• NetWare version: 4.1
• File server name: CAREE
• Queue name: R-QUEUE

1. Insert the CD-ROM into the CD-ROM drive.


The installer starts.
Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
2. Select an interface language, and then click [OK].
3. Click [PCL Printer Driver].
4. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
5. Select the printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
6. Click [Next >].
7. Select the [Printer Name] check box to select the printer model you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.
8. Double-click the printer name to display the printer settings.
The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
9. Click [Port], and then click [Add].

27
1. Preparing the Machine

10. Click [Network Printer], and then click [OK].


11. Double-click the name of the NetWare file server on the network tree.
The created queue is displayed.
1 12. Select the print queue, and then click [OK].
13. Check that the port of the selected printer is displayed in [Port].
14. Click [Continue].
The printer driver installation starts.
15. Click [Finish] in the [Select Program] dialog box.
16. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.
17. After restarting the computer, open the printer properties from the [Printers and Faxes]
window.
Under Windows 2000/Vista or Windows Server 2003/2003 R2/2008, launch the [Printers]
window, and then open the printer properties.
18. Click the [NetWare setting] tab.
Under Windows Vista or Windows Server 2003/2003 R2/2008, on the [Printer Settings] tab, clear
the [Form Feed] and [Enable Banner] check boxes.
Do not select these check boxes since they are automatically selected by the printer driver. If you
select the check boxes, the printer may not print correctly.
19. Click [OK] to close the printer properties dialog box.

• To stop installation of the selected software, click [Cancel] before installation is complete.
• The protocol is set to inactive as default. Enable it using SmartDeviceMonitor or Telnet.

Form Feed

Do not use NetWare to configure form feed. Form feed is controlled by the printer driver on Windows. If
NetWare form feed is configured, the printer may not print properly.
Follow the procedure below to disable form feed according to the operating system used:
• Under Windows 2000/XP/Vista, or Windows Server 2003/2003 R2/2008, clear the [Form feed]
check box on the [NetWare Settings] tab in the printer properties dialog box.

28
Using as a NetWare Print Server/Remote Printer

Banner Page

Do not use NetWare to configure a banner page.


Follow the procedure below to disable banner pages according to the operating system used: 1
• Under Windows 2000/XP/Vista, or Windows Server 2003/2003 R2/2008, clear the [Enable
banner] check box on the [NetWare Settings] tab in the printer properties dialog box.

Printing after Resetting the Printer

Printer to print server connection requires 30 - 40 seconds to resume after the printer is reset. During this
period, jobs may be accepted (depending on NetWare specifications) but not printed.
To print after resetting the printer as the remote printer, check on the print server that the remote printer is
disconnected, or wait for two minutes before trying to print.

29
1. Preparing the Machine

Installing the Printer Driver Using USB


This section explains how to install printer drivers using USB.
1 Before installing, check that only the operating system is running on the computer and no print jobs are in
progress.
You can install the printer driver included on the CD-ROM provided with this machine, or can download
it from the supplier’s Web site.

Windows 2000/XP, Windows Server 2003/2003 R2 - USB

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB" port is added to the [Printers] window.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.

1. Check that the power of the printer is off.


2. Connect the printer and computer using the USB cable.
Connect the USB cable firmly.
3. Turn on the power of the printer.
Found New Hardware Wizard starts, and USB Printing Support is installed automatically.
4. In the Found New Hardware Wizard display, click [Search for a suitable driver for my device
[recommended]], and then click [Next >].
5. Select the [Specify location] check box, and then click [Next >].
6. Insert the CD-ROM into the CD-ROM drive.
If Auto Run starts, click [Cancel], and then [Exit].
7. Specify the location where the source files of the printer driver is stored.
If the CD-ROM drive is D, the source files of the printer driver are stored in the following locations:
• PCL 5e
D:\DRIVERS\PCL5E\XP_VISTA\(Language)\DISK1
• PCL 6
D:\DRIVERS\PCL6\XP_VISTA\MUI\DISK1
• PostScript 3
D:\DRIVERS\PS\XP_VISTA\(Language)\DISK1

30
Installing the Printer Driver Using USB

The PCL6 printer driver is installed in the language specified by your operating system.
8. Check the printer driver location, and then click [OK].
9. Click [Next >].
10. Click [Finish]. 1
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB001" port is added to the [Printers] window.

• To disable Auto Run, press the left Shift key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
• The number after "USB" varies depending on the number of printers connected.

Windows Vista, Windows Server 2008 - USB

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, and plug and play is enabled, the icon of the printer
connected to the "USB" port is added to the [Printers] window.
The printer drivers can be installed from the CD-ROM provided with this printer.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.

1. Check that the power of the printer is off.


2. Connect the printer and computer using a USB cable.
Connect the USB cable firmly.
3. Turn on the power of the printer.
Found New Hardware Wizard starts, and USB Printing Support is installed automatically.
4. In the Found New Hardware Wizard display, click [Search for a suitable driver for my device
[recommended]], and then click [Next >].
5. Insert the CD-ROM into the CD-ROM drive.
If Auto Run starts, click [Cancel], and then [Exit].
6. Select the [Include this location in the search] check box under [Search for the best driver in
these location], and then click [Browse] to select the printer driver location.
If the CD-ROM drive is D, the source files of the printer driver are stored in the following locations:
• PCL 5e
D:\DRIVERS\PCL5E\XP_VISTA\(Language)\DISK1

31
1. Preparing the Machine

• PCL 6
D:\DRIVERS\PCL6\XP_VISTA\MUI\DISK1
• PostScript 3
1 D:\DRIVERS\PS\XP_VISTA\(Language)\DISK1
The PCL6 printer driver is installed in the language specified by your operating system.
7. Check the printer driver location, and then click [Next >].
8. Click [Continue].
9. Click [Finish].
If the installation is successful, the icon of the printer connected to the "USB001" port is added to the
[Printers and Faxes] window.

• To disable Auto Run, press the left Shift key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
• The number after "USB" varies depending on the number of printers connected.

32
Printing with Parallel Connection

Printing with Parallel Connection


This describes how to install the PCL printer driver when using the parallel port.
To use a printer connected using a parallel interface, click [LPT1] when installing the printer driver. 1
• To install this printer driver under Windows 2000/XP/Vista, and Windows Server 2003/2003
R2/2008, you must have an account that has Manage Printers permission. Log on as an
Administrators or Power Users group member.
• If you are using Windows 2000, you can install the printer driver from the CD-ROM provided with
this printer or download it from the supplier's Web site.
• If your operating system is Windows XP Pro x64, Windows Server 2003/2003 R2/2008 x64, you
must download the printer driver from the manufacturer's Web site. Select this printer and the operating
system you are using, and then download it.

Installing the PCL printer driver:

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [PCL Printer Driver].
5. The software license agreement appears in the [License Agreement] dialog box.
After reading the agreement, click [I accept the agreement.], and then click [Next >].
6. Select the printer driver you want to use in the [Select Program] dialog box.
You can select several printer drivers.
The PCL6 printer driver is installed in the language specified by your operating system.
7. Click [Next >].
8. Select the [Printer Name] check box to select the printer model you want to use.
The printer name can be changed in the [Change settings for 'Printer Name'] box.
9. Double-click the printer name to display the printer settings.
The details shown in [Comment], [Driver], and [Port] vary depending on the operating system, printer
model, and port.
10. Check that [LPT1:] is shown in [Port].
11. Select the [Default Printer] check box to configure the printer as default.
12. Click [Finish].
The printer driver installation starts.

33
1. Preparing the Machine

13. After the installation is completed, select one of the options to restart the computer either
now or later, and then click [Finish].
Restart the computer to complete installation.

1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch "Setup.exe" on the
CD-ROM root directory.
• A message appears if there is a newer version of the printer driver already installed. If there is, you
cannot install the printer driver using Auto Run. If you still want to install the printer driver, use [Add
Printer]. See "Messages Displayed When Installing the Printer Driver", Trouble Shooting.

34
Making Option Settings for the Printer

Making Option Settings for the Printer


Make option settings for the printer using the printer driver when bidirectional communication is disabled.
1
Conditions for Bidirectional Communication

Bidirectional communication allows information about paper size and feed direction settings to be
automatically sent to the printer. You can check printer status from your computer.
• Bidirectional communication is supported by Windows 2000/XP/Vista, Windows Server
2003/2003 R2/2008.
• If you use the PCL printer driver and bidirectional communication is enabled under Windows 2000,
the [Change Accessories] tab is unavailable.
To support bidirectional communication, the following conditions must be met:
When connected with parallel cables
• The computer must support bidirectional communication.
• The machine must support bidirectional communication.
• The interface cable must support bidirectional communication.
• The machine must be connected to the computer using the standard parallel cables and parallel
connectors.
• Under Windows 2000, [Enable bidirectional support] must be selected, and [Enable printer
pooling] must not be selected on the [Ports] tab with the PCL printer driver.
When connected with the network
• The machine must support bidirectional communication.
• Under Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008, [Enable
bidirectional support] must be selected, and [Enable printer pooling] must not be selected on
the [Ports] tab with the PCL printer driver.
• In addition to the above, one of the following conditions must also be met:
• The SmartDeviceMonitor for Client port and the TCP/IP protocol must be used.
• IPP port name must include the IP address when using the IPP protocol.
When connected with USB
• The printer must be connected to the computer's USB port using the USB interface cable (for
Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008).
• The computer must support bidirectional communication.

35
1. Preparing the Machine

• The PCL6 printer driver supports bidirectional communication. You can update the printer status
automatically.
1 • The PCL5e printer driver supports bidirectional communication. You can update the printer status
manually.
• Install SmartDeviceMonitor for Client from the supplied CD-ROM.

If Bidirectional Communication Is Disabled

Set up option settings when bidirectional communication is disabled.

• Under Windows 2000/XP/Vista, and Windows Server 2003/2003 R2/2008, Manage Printers
permission is required to change the printer properties in the [Printers] folder. Log on as an
Administrators or Power Users group member.

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.
When using Windows 2000, point to [Settings] on the [Start] menu, and then click [Printers]. The
[Printers] window appears.
When using Windows Vista or Windows Server 2008, click [Control Panel] on the [start] menu, and
then click [Printer]. The [Printers] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Properties].
When using Windows Vista, right-click the icon of the printer you want to use, and then click the
[Properties].
4. Click the [Accessories] tab.
If options in the [Accessories] tab are disabled, bidirectional connection is enabled. In this case, no
change is necessary for option settings.
5. Select options installed from the [Options:] area, and then make the necessary settings.
6. Select the total amount of the memory in [Total memory:] when the optional SDRAM module
is added.
7. Under [Input tray settings:], click the tray to be used, and then select the appropriate size,
position, and type for the tray.
8. Click [OK] to close the printer properties dialog box.

36
Installing Font Manager

Installing Font Manager

• Under Windows 2000/XP/Vista, or Windows Server 2003/2003 R2/2008, installing 1


applications by Auto Run requires Administrator privilege. To install a printer driver by Auto Run, log
on using an account that has Administrator privilege.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Click [Font Manager].
4. Follow the instructions on the display.

37
1. Preparing the Machine

Using Adobe PageMaker Version 6.0, 6.5, or


7.0
1 Under Windows 2000/XP with Adobe PageMaker, you need to copy PPD files to the PageMaker folder.
PPD files have the .ppd extension in the folder "DRIVERS PS XP_VISTA (Language) DISK1" on the CD-
ROM.
The "XP_VISTA" folder inside the "PS" folder is for Windows 2000/XP, Windows Server 2003/2003
R2/2008. Use the folder that is appropriate for the operating system you are currently using.
The third folder "(Language)" may be substituted by an appropriate language name.
Copy the .ppd file to the PageMaker folder.
• For PageMaker 6.0 default installation
The directory is "C: PM6 RSRC PPD4".
• For PageMaker 6.5 default installation
The directory is "C: PM65 RSRC USENGLISH PPD4".
The "USENGLISH" may vary depending on your language selection.
• For PageMaker 7.0 default installation
The directory is "C: PM7 RSRC USENGLISH PPD4".
The "USENGLISH" may vary depending on your language selection.

• If the driver is not set correctly after copying the ".ppd" file, printing may not be performed properly.
• When using PageMaker, the optional features that can be selected by the printer driver will not be
active. The following procedure describes how to activate the optional printer features.
1. On the [File] menu, click [Print].
The [Print Document] dialog box appears.
2. Make the necessary settings in the [Features] box.

38
2. Printing Documents
This chapter explains how to print documents using the printer driver. It also describes the procedure for
configuring duplex printing, combine printing and other printing functions.

Displaying the Printer Driver Settings Screen


2
This section explains how to open and configure the printer driver properties.
The following procedure explains how to configure the printer driver under Windows XP. If you are using
another operating system, the procedure might vary slightly.

Making printer default settings - the printer properties

• To change the printer's default settings (including settings for options), log on using an account that
has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for individual users. Settings made in the [Printer
Properties] dialog box are applied to all users.

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Properties].
The [Printer Properties] dialog box appears.
4. Make the settings you require, and then click [OK].

• The settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.

Making printer default settings - printing preferences

• The settings in the "Printing Settings" (Document Properties) dialog box that can be modified and
retained differ depending on the printer driver, printer icon, and the users registered for each printer
icon.

39
2. Printing Documents

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Printing Preferences...].
The [Printing Preferences] dialog box appears.

2 4. Make the settings you require, and then click [OK].

• The settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.

Making printer settings from an application

You can make printer settings for a specific application.


To make printer settings for a specific application, open the [Printing Preferences] dialog box from that
application. The following procedure explains how to make printer settings for a specific application using
Windows XP WordPad as an example.

1. On the [File] menu, click [Print...].


The [Print] dialog box appears.
2. In the [Select Printer] list, select the printer you want to use.
3. Click [Preferences].
The [Printing Preferences] dialog box appears.
4. Make the settings you require, and then click [OK].

• Procedures for opening the [Printing Preferences] dialog box vary depending on the application. For
details, see the manuals provided with the application.
• Any settings you make using this procedure apply to the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as the defaults when printing from the application.
• For details, see the printer driver Help.

40
Setting Paper on the Bypass Tray

Setting Paper on the Bypass Tray


This section gives instructions for setting paper on the bypass tray.
For details about paper size and paper type, see "Paper Size and Paper Type", About This Machine.

• Paper sizes that can be loaded onto the bypass tray are 90-216 mm (3.55-8.50 in.) vertical, and 2
139-600 mm (5.48-23.62 in.) horizontal.
• When paper larger than 600 mm (23.62 in.) in length is used, the paper may become wrinkled, may
not be fed into the machine, or may cause paper jams.
• If you want to use the bypass tray, be sure to specify the paper size and paper type.
• The following functions are disabled when printing from the bypass tray:
• Duplex printing
• Auto Tray Select
• Auto Tray Switching
• Certain types of OHP transparencies for color printing cannot be used. For details about types that
can be used, contact your sales or service representative.

1. Open the bypass tray.

BRH023S

41
2. Printing Documents

2. Unlock the paper guide by pushing up the paper guide release lever.

BRH024S

1. Release lever
3. Gently insert paper face down into the bypass tray until the beeper sounds, and then adjust
the paper guides to the paper size.
If the paper size of the paper guide and the paper do not match, skewing and misfeeds might occur.
Do not stack paper over the limit mark, otherwise a skewed image or misfeeds might occur.
Open out the extender to support paper sizes larger than A4 , 81/2 " 11 " .
Fan the paper to get air between the sheets to avoid a multi-sheet feed.

BRH025S

1. Horizontal size
2. Vertical size
3. Extender
4. Paper guides

42
Setting Paper on the Bypass Tray

4. Lock the paper guide by pushing down the paper guide release lever.

BRH026S

1. Release lever
5. Set the paper size using the printer driver or the control panel.

• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• The number of sheets that can be loaded in the bypass tray depends on the paper type.
• When loading letterhead paper, see "Loading Paper", About This Machine.
• Depending on the environment where the machine is being used, you might at times hear a rustling
noise from paper moving through the machine. This noise does not indicate a malfunction.
• When the Panel Key Sound is turned off, it will not sound if you insert paper into the bypass tray. For
details about Panel Key Sound, see "System Settings", Network and System Settings Guide.
• For details about setting printer drivers, see the printer driver Help.

Setting the Paper Size Using the Control Panel

Follow the procedure below to set the machine using the control panel when loading standard size paper
onto the bypass tray.

• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• Under [Printer Features], [System], if you set [Bypass Tray Priority] to [Driver/Command], paper size
settings made on the printer driver must match those made on the control panel. If they do not match,
an error message appears and printing stops if [Printer Features], [System], [Auto Continue] is not set.
For details about [Printer Features] settings, see "Printer Features"

43
2. Printing Documents

1. Press the [User Tools/Counter] key on the control panel.

BRP005S

2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.

3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.

4. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.

5. Press the [ ], [ ], [ ], or [ ] key to select the paper size you want to use, and then press
the [OK]] key.

6. Press the [User Tools/Counter] key to return to the initial screen.

44
Setting Paper on the Bypass Tray

• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• [Auto Detect] is the default setting for [Printer Bypass Paper Size].
• For details about setting printer drivers, see the printer driver Help.

• p.105 "Printer Features" 2


Setting Custom Size Paper Using the Control Panel

Follow the procedure below to set the machine using the control panel when loading custom size paper
onto the bypass tray.

• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set paper size using the control panel.

1. Press the [User Tools/Counter] key on the control panel.

BRP005S

2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.

45
2. Printing Documents

3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.

2 4. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.

5. Press the [ ], [ ], [ ], or [ ] key to select the [Custom Size], and then press the [OK] key.

6. Enter the horizontal size of the paper using the number keys, and press [OK] key.

7. Enter the vertical size of the paper using the number keys, and press [OK] key.

46
Setting Paper on the Bypass Tray

8. Press the [User Tools/Counter] key to return to the initial screen.

• When loading thick paper, thin paper, or OHP transparencies, set paper size and paper type.
• [Auto Detect] is the default setting for [Printer Bypass Paper Size].
• For details about setting printer drivers, see the printer driver Help.

• p.105 "Printer Features"

Setting Thick Paper or OHP Transparencies Using the Control Panel

Follow the procedure below to set the machine using the control panel when loading thick paper, thin
paper, or OHP transparencies onto the bypass tray.

• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set the paper size using the control panel.
• When printing onto OHP transparencies, paper thinner than 66.0 g/m2, or paper of 101 g/m2 or
above, you need to specify the type and size of paper with Tray Paper Settings in User Tools Menu.
For details about Tray Paper Settings, see "System Settings", Network and System Settings Guide.
• Do not use color OHP transparencies that have easily melted coatings.
• When printing onto OHP transparencies, use A4 , or 81/2" 11" , size sheets, and specify its size.

47
2. Printing Documents

1. Press the [User Tools/Counter] key on the control panel.

BRP005S

2. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.

3. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.

4. Press the [ ] or [ ] key to select [Paper Type:Bypass Tray], and then press the [OK] key.

5. Press the [ ] or [ ] key to select the proper items, according to the paper type you want to
set.

48
Setting Paper on the Bypass Tray

6. Press the [OK] key.


7. Press the [User Tools/Counter] key to return to the initial screen. 2
• Printing on special paper such as thick paper, thin paper, or OHP transparencies may be slower than
printing on plain paper.
• The settings made will remain valid until they are reset again. After printing on OHP transparencies
or thick paper, thin paper, make sure to clear settings for the next user.
• For details about setting printer drivers, see the printer driver Help.

• p.105 "Printer Features"

Setting Envelopes Using the Control Panel

Follow the procedure below to set the machine using the control panel when loading envelopes onto the
bypass tray.

• The following procedures are not required if you select [Driver/Command] from [Bypass Tray Priority]
in [System] of [Printer Features] (see "Printer Features"). In that case, set the paper size using the printer
driver.
• If you select [Machine Settings] from [Bypass Tray Priority] in [System] of [Printer Features] (see "Printer
Features"), the settings made using the control panel have priority over the printer driver settings.
• If the printer driver is not used, select [Machine Settings] from [Bypass Tray Priority] in [System] of
[Printer Features] (see "Printer Features"). Set paper size using the control panel.
• Misfeeds might also occur when using envelopes (1) - (3) depending on the length and shape of the
flaps.

49
2. Printing Documents

Envelope types Supported/Not supported

Supported

2 BAV026S

Supported

BAV027S

Supported

BAV028S

• You can load up to 10 envelopes (72 - 90g/m2) in the bypass tray at the same time, without
compressing them. Check the envelopes are not damp, and the top of the stack is not higher than the
limit mark on the side guide.
• When loading envelopes, be sure to unfold the flaps and position them opposite to the paper feed
direction.
• Load type (4) (162 114 mm / C6) (6.38 4.49 in. / C6) envelopes flap down, flap fold against
the side guide.

BRP009S

• Depending on the envelope type, specify an appropriate print image rotation using the printer driver.
For a type (1) - (4) envelope, rotate by specify 180 degrees.

50
Setting Paper on the Bypass Tray

• Check there is no air in the envelopes before loading.


• To get better print quality, it is recommended that you set the right, left, top, and bottom print margin,
to at least 15 mm (0.6 in.) each.
• You cannot print envelopes with duplex function.
• Load only one size and type of envelope at a time.
• Before loading envelopes, flatten leading edges (the side going into the machine) by pressing a pencil
or ruler across them.
2
• Before loading envelopes, check they are rectangular in shape.

1. Open the bypass tray, and then insert the envelopes with the side you want to print face
down until the beeper sounds.

BRP010S

2. Press the [User Tools/Counter] key on the control panel.

BRP005S

3. Press the [ ] or [ ] key to select [System Settings], and then press the [OK] key.

51
2. Printing Documents

4. Press the [ ] or [ ] key to select [Tray Paper Settings], and then press the [OK] key.

2 5. Press the [ ] or [ ] key to select [Printer Bypass Paper Size], and then press the [OK] key.

6. Press the [ ], [ ], [ ], or [ ] key to select the [Custom Size], and then press the [OK] key.

7. Press the [ ] or [ ] key to enter the horizontal value, and then press the [OK] key.

8. Press the [ ] or [ ] key to enter the vertical value, and then press the [OK] key.

52
Setting Paper on the Bypass Tray

9. Press the [ ] or [ ] key to select [Paper Type:Bypass Tray], and then press the [OK] key.

10. Press the [ ] or [ ] key to select [Thick Paper], and then press the [OK] key.

11. Press the [User Tools/Counter] key to return to the initial screen.

• When entering the horizontal size for envelopes, including the opened-out flap in the measurement.

BAT029S

1. Vertical size
2. Horizontal size

53
2. Printing Documents

• For details about envelopes, see "Envelopes", About This Machine.

54
Printing on Orientation-Fixed or Two-Sided Paper

Printing on Orientation-Fixed or Two-Sided


Paper
This section explains how to print on paper whose orientation and printing side are unchangeable
(letterhead paper, for example).
Use the settings and paper orientations shown below to ensure the machine prints onto orientation-fixed 2
paper (such as letterhead or continuous stationery) correctly. Specify [Auto Detect] or [On (Always)] for
[Letterhead Setting] in the printer settings, and then place the original and paper as shown below. For
details about the letterhead print settings, see "System".

Paper Trays 1-3 Multi Bypass tray

Paper Orientation Letterhead Setting Letterhead Setting Letterhead Setting Letterhead Setting
[On(Always)] [Off] [On(Always)] [Off]

1-sided print

2-sided print

1-sided print

2-sided print

• To print on letterhead paper when [Letterhead Setting] is set to [Auto], you must specify [Letterhead]
as the paper type in the PCL printer driver's settings.
• If you change from 1-sided to 2-sided (duplex) printing during a copy job, all pages printed after the
change will be 2-sided. If you want to print the remaining sets as 1-sided, specify a paper tray that
is not available for duplex printing.
• For details about how to make 2-sided prints, see "Printing on both sides of sheets".

55
2. Printing Documents

• p.58 "Printing on both sides of sheets"


• p.111 "System"

56
Frequently Used Print Methods

Frequently Used Print Methods


This chapter explains how to use the various printing functions including normal printing, duplex printing,
and combine printing.
Each function described in this chapter is configured and registered under "One Click Presets". You can
also change the parameters for each function by modifying "One Click Presets".
2
• For details about custom settings, see "Using One Click Presets".

• p.63 "Using One Click Presets"

Standard Printing

Use the following procedure to print documents using the normal printing function with the printer driver.

• Before printing, make sure that the settings for the installed options and loaded paper are correctly
configured.
For the PCL 6 printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [One Click Presets] tab, if it is not already selected.
3. In the [Job type:] list, select [Normal Print].
If you want to print multiple copies, specify a number of sets in the [Copies:] box.
4. In the [Document Size:] list, select the size of the original to be printed.
5. In the [Orientation:] list, select [Portrait] or [Landscape] as the orientation of the
original.
6. In the [Input Tray] list, select the paper tray that contains the paper you want to print
onto.
If you select [Auto Tray Select] in the [Input Tray] list, the source tray is automatically selected
according to the paper size and type specified.
7. In the [Paper type:] list, select the type of paper that is loaded in the paper tray.
8. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.

57
2. Printing Documents

9. Click [OK] to close the printer preferences dialog box.


10. Print the document using the print function in the document's native application.
For the PCL 5e printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
2 The [Printing Preferences] dialog box appears.
2. In the [Job type:] list, select [Normal Print].
If you want to print multiple copies, specify a number of sets in the [Copies:] box.
3. In the [Orientation:] list, select [Portrait] or [Landscape] as the orientation of the
original.
4. Click the [Paper] tab.
5. In the [Document Size:] list, select the size of the original to be printed.
6. In the [Input Tray:] list, select the paper tray that contains the paper you want to print
onto.
If you select [Auto Tray Select] in the [Input Tray:] list, the source tray is automatically selected
according to the paper size and type specified.
7. In the [Type:] list, select the type of paper that is loaded in the paper tray.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.

• The types of paper loaded in the paper trays are indicated on the printer's display. This allows you
to see which tray the selected paper type is loaded in. However, the paper type setting available in
the printing preference dialog box might be different from the type indicated on the printer's display.
• If the paper tray loaded with the specified paper size and type is not available, a warning message
appears on the machine's control panel. If this happens, follow the instructions in the message to
specify a paper tray and perform force printing. Alternatively, press the job reset button to cancel
printing. For details, see "If Error Occurs with the specified Paper Size and Type".

• p.67 "If Error Occurs with the Specified Paper Size and Type"

Printing on both sides of sheets

This section explains how to print on both sides of each page using the printer driver.

58
Frequently Used Print Methods

• Duplex printing is not possible if the paper types listed below are specified. If you want to perform
duplex printing, select a paper type other than those listed below:
• Paper loaded in the bypass tray
• Thick Paper, OHP (Transparency), Label Paper
• Custom Size paper 2
For the PCL 6 printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. To use an existing One Click Presets, click the [One Click Presets] tab, and then click the
icon in the [One Click Preset List:] box.
If you do not wish to modify a custom setting that is already registered in the printer driver, change
settings such as paper size and source tray as required, and then proceed to step 8.
3. Click the [Detailed Settings] tab.
4. In the [Menu:] box, click the [Edit] icon.
5. In the [2 sided:] list, select [Open to Left] or [Open to Top].
6. Change any other print settings if necessary.
7. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.
For the PCL 5e printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [Setup] tab, if it is not already selected.
3. In the [Duplex:] list, [Open to Left] or [Open to Top].
4. Change any other print settings if necessary.
5. Click [OK] to close the printer preferences dialog box.
6. Print the document using the print function in the document's native application.

• If the document contains pages with different original sizes, page breaks may occur.

59
2. Printing Documents

Types of duplex printing


This section explains the binding directions available when using the duplex printing function. When using
the duplex printing function, you can select whether to bind copies by edge or in the center.
Edge Binding
• Open to Left
2

BMF006S

• Open to Top

BMF008S

Combining Multiple Pages into Single Page

This section explains how to print multiple pages onto a single sheet. The combine printing function allows
you to economize on paper by printing multiple sheets at reduced size onto a single sheet.

• The combine printing function is not available on a custom size paper. To use the combine printing
function, specify a standard size paper.
For the PCL 6 printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.

60
Frequently Used Print Methods

2. To use an existing One Click Presets, click the [One Click Presets] tab, and then click the
icon in the [One Click Preset List:] box.
If you do not wish to modify a custom setting that is already registered in the printer driver, change
settings such as paper size and source tray as required, and then proceed to step 8.
3. Click the [Detailed Settings] tab.
4. In the [Menu:] box, click the [Edit] icon. 2
5. In the [Layout:] list, select the combination pattern from the list.
6. Change any other print settings if necessary.
7. To save current setting in the One Click Preset List, click [Register Current Settings...].
Enter a name and comment that describe the setting, and then click [OK].
The newly registered icon appears in the [One Click Preset List:] area.
8. Click [OK] to close the printer preferences dialog box.
9. Print the document using the print function in the document's native application.
For the PCL 5e printer driver:

1. After creating a document, open the Printing Preferences dialog box in the document's
native application.
The [Printing Preferences] dialog box appears.
2. Click the [Setup] tab, if it is not already selected.
3. In the [Layout:] list, select the combination pattern from the list.
4. Change any other print settings if necessary.
5. Click [OK] to close the printer preferences dialog box.
6. Print the document using the print function in the document's native application.

• If the document contains pages with different original sizes, page breaks may occur.
• If the application you are using also has a combine function, disable it. If the application's combine
function is also enabled when the driver's combine function enabled, incorrect printing is likely.
• For details about combining pages with different orientations and other advanced functions, see the
printer driver Help.

Types of combine printing


This section explains the different methods of combine printing that are available. For 2 pages per sheet
combine, you can select from three patterns. When combining 4 or more pages onto a single sheet of
paper, four patterns are available. The page order can be specified from the following four patterns:

61
2. Printing Documents

2 pages per sheet

BMF018S

BMF023S

BMF024S

4 pages per sheet

BMF019S

62
Frequently Used Print Methods

2
BMF020S

BMF021S

BMF022S

Using One Click Presets

This section explains how to register and use one click presets.
Each function explained in this chapter is preconfigured and registered under [One Click Presets List:] on
the [One Click Presets] tab.
You can apply the relevant setting simply by clicking on the one click preset name. This helps to avoid
incorrect settings and misprints.
One click presets can be added, modified, and deleted as required. They can also be shared for use by
different users. By using registered one click presets, users without in-depth knowledge of the printer driver
can utilize advanced printing functions easily.
For details about registering, modifying, and deleting one click presets, see the printer driver Help.

63
2. Printing Documents

• Only the PCL6 printer driver is supported.

64
Advanced Printing

Advanced Printing
This chapter explains the printer's advanced printing functions.
Other than the functions that can be configured in the [One Click Presets] tab, various print functions can
be setup from each [Menu:] icon in the [Detailed Settings] tab. The settings for each function described in
this section can be changed by using the following menus.
2
• For details about printing methods, see the printer driver Help.

Menu Names and Brief Overview of Each Function

The following is an overview of the settings that are available on the [Finishing] menu.
[Finishing] menu
You can enable/disable the collate function.
• Collate
When printing multiple sets of documents such as handouts for meetings, you can have prints
delivered in batches of ordered sets. For details about collate function, see "Collate".

• p.65 "Collate "

Collate

When printing multiple documents such as handouts for meetings, you can separate sets into order. This
function is known as "Collate". Collate stores data transmitted from a computer to the machine memory or
hard disk drive.

• If Auto Continue occurs on the first set, Collate will be canceled.


• If forced printing occurs on the first set, Collate will be canceled.
• When setting Collate in the printer driver settings, make sure that a collate option is not selected in
the application's print settings. If a collate option is selected, printing will not be as intended.
Printed output is assembled as sets in sequential order.

65
2. Printing Documents

BAC016S

2
• Set Collate when using the PCL printer driver.

66
If Error Occurs with the Specified Paper Size and Type

If Error Occurs with the Specified Paper Size and


Type
This section gives instructions for operating the machine when there is no tray for the selected paper size
or type, or when paper loaded in the machine has run out.
2
• The tray cannot be changed if the following functions are set:
• Duplex Print to a tray that does not support duplex printing

• If form feed is selected for a tray with the following settings, you can change the tray by canceling
the settings:
• Duplex print
• If Auto Continue is selected, form feed paper is printed after a set interval. See "System".

• p.111 "System"

Printing from a Selected Tray

If the printer does not have a tray for the selected paper size or paper type, or if the selected paper loaded
in the printer has run out, a caution message appears. If this message appears, do the following procedure.

1. When the caution message appears, press [FormFeed].

A confirmation message appears.


2. Press the [OK] key.

67
2. Printing Documents

3. Select the tray for form feed using the [ ] or [ ] key from those that appear on the display
panel, and then press the [OK] key.

2
• If a tray with a smaller paper size is selected, the print job may be cut short, or other problems may
occur.

Canceling a Print Job

Follow this procedure for canceling the print job if the message prompting form feed appears.

1. Press [JobReset].

2. Press [Current].

The confirmation message appears.


To resume printing jobs, press [Resume].
3. Press [Yes] to cancel the print job.

Press [No] to return to the previous display.

68
If Error Occurs with the Specified Paper Size and Type

• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• Under Windows, If the printer is connected to the computer using a parallel cable, sent print jobs may
be canceled if the [Job Reset] key is pressed while "Waiting for print data..." is displayed on the control
panel. After the interval set in [I/O Timeout] in [Host Interface] has passed, the next print job can be
sent. A print job sent from a different client computer will not be canceled in this case. 2
• You cannot stop printing data that has already been processed. For this reason, printing may continue
for a few pages after you press the [Job Reset] key.

• p.97 "Canceling a Print Job"

69
2. Printing Documents

Spool Printing
Spool Printing allows print jobs transferred from a computer to be temporarily stored, and then prints them
after they are transferred. This shortens printing time as it maximizes printer efficiency.

2 • During Spool Printing, the hard disk is accessed and the Data In indicator blinks. Turning off the
computer or machine during Spool Printing can damage the hard disk. Also, if the computer or machine
is turned off during Spool Printing, spooled jobs will be deleted. Therefore, do not turn the power of
the computer or machine off during Spool Printing.
• If data is sent to the machine using other protocols besides "diprint", "lpr", "ipp", "ftp", "sftp", "smb",
and "wsd (printer)", Spool Printing cannot be performed.
Setting Spool Printing
Spool Printing can be set using telnet or Web Image Monitor.
• Using Web Image Monitor
For details, see Network and System Settings Guide or Help for more information.
• Using telnet
Type in "spoolsw spool on" to set Spool Printing.
For details, see Network and System Settings Guide for more information about telnet.
Viewing/Deleting spool jobs in Web Image Monitor
Start Web Image Monitor and enter the machine's IP address in the address bar. This displays the top
page.
For details, see Network and System Settings Guide.

• Up to a maximum of 150 jobs at once can be spool printed.


• Printing the first page with Spool Printing will be slow.
• The computer requires less print processing time when large amounts of data are spooled.
• Stored spool jobs can be viewed or deleted using Web Image Monitor.

70
Registering Classification Codes

Registering Classification Codes


This section explains classification codes.
If you register classification codes, the printer logs the number of prints made under each code.
You can register classification codes to individual users and specified purposes, enabling you to monitor
printer usage by each.
2
For example, you can manage accounts according to individual clients or account titles.

Classification Code - Based Process (example)

BJF013S

1. Divisions, sections, departments, project teams, users, etc., to be managed.


2. The appropriate classification code for the print job is entered.
For details, see "Specifying Classification Code for Print Job".
3. The job is printed.
When printing in an environment where classification codes are required, print jobs that do not have a
classification code cannot be printed.
For details, see "Configuring Classification Codes".
4. Classification codes are collected and managed by an external log collection system.

71
2. Printing Documents

• p.72 "Configuring Classification Codes"

Configuring Classification Codes

2 Use Web Image Monitor to specify whether or not to apply classification code requirement to print jobs.

• The configuration page can be printed at any time.


• The default setting for classification code requirement is "Optional".

1. Start Web Image Monitor.


2. Click [Login].
A dialog box for entering the login user name and login password appears.
3. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [Logs].
5. Check that [Required] or [Optional] is selected for [Classification Code] in the [Common
Settings for All Logs] column.
If "Required" is selected for the classification code requirement setting in Web Image Monitor, any
print job that without a classification code specified will not be printed.
6. Click [OK].
7. Click [Logout].
8. Quit Web Image Monitor.

Specifying the Classification Code for a Print Job

When printing in an environment where classification codes are required, a classification code must be
specified for each print job.

• The PostScript 3 printer driver does not support the classification codes and it cannot be used to print
under environment which the classification codes are required.

For the PCL 6 printer driver:

1. Open the printer properties dialog box after creating a document in an application.
2. Click the [Detailed Settings] tab.
3. In the [Menu:] box, click the [Job Setup] icon.

72
Registering Classification Codes

4. Enter the classification code in the [Classification code:] box, and then click [OK].
This code identifies the user. The classification code can contain up to 32 alphanumeric (a-z, A-Z,
0-9, "-") characters.
5. Make any other necessary print settings, and then click [OK].
6. A confirmation message appears. Read it, and then click [OK].
7. Execute the print command.
2
8. The print job is sent to the printer.

For the PCL 5e printer driver:

1. Open the printer properties dialog box after creating a document in an application.
2. Click the [Valid Access] tab.
3. Enter the classification code in the [Classification Code:] box.
This code identifies the user. The classification code can contain up to 32 alphanumeric (a-z, A-Z,
0-9, "-") characters.
4. Make any other necessary print settings, and then click [OK].
5. A confirmation message appears. Read it, and then click [OK].
6. Execute the print command.
7. The print job is sent to the printer.

• The specified classification code is stored in the printer driver.


• To switch between different classification codes, install the printer driver under different names, and
specify different classification code for each driver.
• For details about how to view the log collected using Classification Code, see the manual for the
external log collection system.

• p.14 "Installing the Printer Driver"


• p.39 "Displaying the Printer Driver Settings Screen"

73
2. Printing Documents

74
3. Printing Stored Documents
This chapter explains how to print documents stored in the machine.

Display
This section describes configuration using the display when the printer function is selected.

• Do not touch the display. 3


The following screen appears when you turn on the printer.

BRP002S

1. Operational Status or Messages


Displays the printer status or the messages.
2. [JobReset]
Press to cancel the current print job. If you press it when the machine is offline and Hex Dump is selected,
Hex Dump is canceled.
3. [Prt.Jobs]
Displayed when the hard disk is connected.
Press to display print jobs sent from a computer.
4. [Menu]
Press to display the menu to select the following options:
• Form Feed
Prints all the data left in the machine's input buffer.
• Show Error Log
Displays the error logs of print jobs that are sent from a computer.

Reading the Display and Using Keys

This section explains how to read the display and using the selection key for the initial display.

75
3. Printing Stored Documents

3
BRP001S

1. Scroll keys
Press to move the cursor to each direction one by one.
When [ ] [ ] [ ] or [ ] appears in this manual, press the scroll key of the same direction.
2. [OK] key
Press to set a selected item or entered numeric value.
3. [Escape] key
Press to cancel an operation or return to the previous display.
4. Selection keys
Correspond to items at the bottom line on the display.
Example: initial printer display
• When the instruction "press [JobReset]" appears in this manual, press the left selection key.
• When the instruction "press [Prt.Jobs]" appears in this manual, press the center selection key.
• When the instruction "press [Menu]" appears in this manual, press the right selection key.

76
Using the Print Job Function

Using the Print Job Function


This describes how to print or delete files stored in the printer. There are following types of print files: Sample
Print, Locked Print, Hold Print, and Stored Print.
Print files sent from computers can be stored in the hard disk of the printer. Using the Print Job function, you
can print or delete the print files.

• To use this function, the optional hard disk must be installed on the printer.
3
Print Job screen

When the printer is turned on, the following screen appears if an optional hard disk is installed in the printer.

If you press [Prt.Jobs] on the initial screen, a screen prompting to select the type of print job appears.

After selecting a type, you can select print files in the list by pressing:
• [Job List]
Displays the Job List screen.
• [User ID]
Displays the User ID screen.
If you select Sample Print, Locked Print, and Hold Print, the print files saved in the printer are deleted after
printing is completed. If you select Stored Print, the files remain in the printer even after printing is finished.

77
3. Printing Stored Documents

Job List Screen

BRP003S

3 1. The type of print jobs


Displays the type of the print job you select.
2. Page number
Displays the current page number. Each time pressing the [ ] or [ ] key, the screen switches.
3. User ID, Date/Time, and File Name display
• User ID shows the user's ID set by the printer driver.
• Date and Time show the time at which the print job was stored in the printer.
• File name shows the name of the file. However, "****" is shown instead of the file name for a Locked Print
file.
4. [Print]
Prints a selected file.
5. [Change]
Changes or clears the password of a file if a password is set. To change the password of a Locked/Stored Print
job, press [Change], enter the current password, and then enter the new password on the confirmation screen.
To clear the password, press [Change], leave the entering/confirming a new password box blank, and then
press the [OK] key.
You can also set passwords to the Stored Print files that do not currently have passwords.
6. [Delete]
Deletes a selected file.

• When you press [Change] to change or clear a password, you must first enter the existing password.
If the password you entered is incorrect, you cannot change or clear any current passwords.
• You can use [Change] to set or clear passwords only when Stored Print files are stored in the printer.

78
Using the Print Job Function

User ID Screen

BRP004S

1. The type of print jobs 3


Displays the type of the print job you select.
2. Page number
Displays the current page number. Each time pressing the [ ] or [ ] key, the screen switches.
3. User ID
• User ID shows the ID of the user who stored the selected type of files.
• User ID set by the printer driver is shown.
4. [PrintAll]
Prints all files stored by the user whose user ID has been selected.
5. [Job List]
Switches the screen to the [Job List] screen.
Displays the print jobs of the selected user only.

• To cancel selecting a file, press [JobReset].


• The display is not updated if a new file is stored while the list of stored files is displayed. To update
the display, press the [Escape] key to return to the initial screen, and then press [Prt.Jobs] again.
• If a large number of print jobs are stored in the printer, processing may slow temporarily, depending
on which functions are used.

79
3. Printing Stored Documents

Printing from the Print Job Screen


This section gives instruction about Sample Print, Locked Print, Hold Print, and Stored Print.

Sample Print

Use this function to print only the first set of a multiple-set print job. After you have checked the result,
remaining sets can be printed or canceled using the printer's control panel. This can reduce misprints due
3 to mistakes in content or settings.

• A Sample Print file cannot be stored if:


• the hard disk is not installed in the printer.
• the total number of Sample Print, Locked Print, Hold Print, and Stored Print files in the printer is
over 100. (The maximum number varies depending on the volume of data in files.)
• the file contains over 250 pages.
• sent or stored files in the printer contain over 9,000 pages in total.

• If a Sample Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Sample Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• If the first set of the Sample Print files is not as you expected and you do not want to print remaining
sets, delete the Sample Print file using the display panel. If you print the remaining sets of the Sample
Print file, the job in the printer is deleted automatically.
• Sample Print files printed or deleted using Web Image Monitor, after you select [Sample Print] using
the control panel will appear on the display panel. However, an error message will appear if you try
to print or delete those Sample Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".

• p.99 "Checking the Error Log"

80
Printing from the Print Job Screen

• p.111 "System"

Printing a Sample Print file


The following procedure describes how to print a Sample Print file with the PCL 6/5e, or PostScript 3 printer
driver. For information about how to print a Sample Print file with the PostScript 3 printer driver, see "Using
PostScript 3", PostScript 3 Supplement.

• Applications with their own drivers, such as PageMaker, do not support this function.
3
1. From an application, select a command to print.
The Print dialog box appears.
2. Select the printer you want to use in the [Name] list, and then click [Properties].
The printer properties dialog box appears.
3. In the [Job Type:] list, click [Sample Print].
4. Click [Details...], and then enter a user ID in the [User ID:] box.
This is used to identify the user. The user ID can be entered using up to eight alphanumeric (a-z, A-Z,
0-9) characters.
5. Execute a command to print.
Make sure to set more than two copies.
The Sample Print job is sent to the printer, and the first set is printed.
6. On the printer's control panel, press [Prt.Jobs].

7. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Sample Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].

81
3. Printing Stored Documents

8. Select the file you want to print using the [ ] or [ ] key, and then press [Print].

Enter the new number of sets using the scroll keys. You can enter up to 999 sets.
Press the [Escape] key to correct any entry mistakes.
3 9. Enter the number of copies to print, and then press [Print].

The remaining sets are printed.


Press [Cancel] to cancel printing.

• If the set quantity is changed when [User ID] is pressed in step 7, the changed quantity is applied to
all selected files.
• When printing is completed, the stored file will be deleted.
• To stop printing after printing has started, press [JobReset]. The file will be deleted.
• For details about [User ID], see "Printing from the User ID Screen".

• p.94 "Printing from the User ID Screen".

Deleting Sample Print files


If you are not satisfied with the sample printout, you can delete the Sample Print file, revise it and print it
again until the settings are suitable.

1. Press [Prt.Jobs].

82
Printing from the Print Job Screen

2. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Sample Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
3. Select the file you want to delete using the [ ] or [ ] key, and then press [Delete]. 3

The delete confirmation screen will appear.


4. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

Locked Print

Use this function to maintain privacy when printing confidential documents on the printer over a shared
network. Usually, it is possible to print data using the display panel once it is stored in this printer. When
using Locked Print, it is not possible to print unless a password is entered on the printer's display panel.
Your confidential documents will be safe from being viewed by other people.

• A Locked Print file cannot be stored if:


• the hard disk is not installed in the printer.
• the total number of Sample Print, Locked Print, Hold Print, and Stored Print files in the printer is
over 100. (The maximum number varies depending on the volume of data in files.)
• the file contains over 250 pages.
• sent or stored files in the printer contain over 9,000 pages in total.

• If a Locked Print file has not been stored properly, check the error log on the control panel.

83
3. Printing Stored Documents

• Even after you turn off the printer, stored documents remain. However, the [Auto Delete Temporary
Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. Locked
Print jobs are automatically collated by the printer driver as default. If a collate option is selected in
the application print dialog box, more sets than intended may be printed.
• After the Locked Print file is printed, the job is automatically deleted.
• Locked Print files printed or deleted using Web Image Monitor, after you select [Locked Print] using
the control panel will appear on the display panel. However, an error message will appear if you try

3 to print or delete those Locked Print files.


• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".

• p.99 "Checking the Error Log"


• p.111 "System"

Printing a Locked Print file


The following procedure describes how to print a Locked Print file with the PCL 6/5e, or PostScript 3 printer
driver. For information about how to print a Locked Print file with the PostScript 3 printer driver, see "Using
PostScript 3", PostScript 3 Supplement.

• Applications with their own drivers, such as PageMaker, do not support this function.

1. Configure the Locked Print in the printer driver's properties.


For details about configuring the printer drivers, see the corresponding Help files.
2. Start printing from the application's Print dialog box.
The Locked Print job is sent to the printer.
3. On the printer's control panel, press [Prt.Jobs].

84
Printing from the Print Job Screen

4. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Locked Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID]. 3
5. Select the file you want to print using the [ ] or [ ] key, and then press [Print].

The password screen appears.


6. Enter the password using the number keys, and then press the [OK] key.

The print confirmation screen appears.


A confirmation screen will appear if the password is not entered correctly. Press [Clear] to enter the
password again.
If you forget your password, contact your administrator for help.
7. Press [Print].
The remaining sets are printed.
Press [Cancel] to cancel printing.

• When printing is completed, the stored file will be deleted.


• To stop printing after printing has started, press [JobReset]. The file will be deleted.
• For details about [User ID], see "Printing from the User ID Screen".

• p.94 "Printing from the User ID Screen".

85
3. Printing Stored Documents

Deleting Locked Print files

1. Press [Prt.Jobs].

3 2. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Locked Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
3. Select the file you want to delete using the [ ] or [ ] key, and then press [Delete].

The password screen appears.


4. Enter the password using the number keys, and then press the [OK] key.

The delete confirmation screen appears.


A confirmation screen will appear if the password is not entered correctly. Press [Clear] to enter the
password again.
If you forget your password, contact your administrator for help.
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

86
Printing from the Print Job Screen

Hold Print

Use this function to temporarily hold a file in the printer, and print it from the computer or the printer's control
panel later.

• A Hold Print file cannot be stored if:


• the hard disk is not installed in the printer.
• the total number of Sample Print, Locked Print, Hold Print, and Stored Print files in the printer is
over 100. (The maximum number varies depending on the volume of data in files.) 3
• the file contains over 250 pages.
• sent or stored files in the printer contain over 9,000 pages in total.

• If a Hold Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Hold Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• Hold Print files printed or deleted using Web Image Monitor, after you select [Hold Print] using the
control panel will appear on the display panel. However, an error message will appear if you try to
print or delete those Hold Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily. If you enter the
document name on the printer driver's [Details...], that name appears on the display panel.
• It is possible, but not required, to set a file name or a password to a Hold Print file.
• For details about error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".

• p.99 "Checking the Error Log"


• p.111 "System"

87
3. Printing Stored Documents

Printing a Hold Print file


The following procedure describes how to print a Hold Print file with the PCL 6/5e or PostScript 3 printer
driver. For information about how to print a Hold Print file with the PostScript 3 printer driver, see "Using
PostScript 3", PostScript 3 Supplement.

• Applications with their own drivers, such as PageMaker, do not support this function.

1. Configure Hold Print in the printer driver's properties.

3 For details about configuring the printer drivers, see the relevant Help files.
2. Click [Details...], and then enter a User ID in the [User ID:] box.
You can also set a file name. The file name you set will be displayed on the printer's Job List screen.
3. Start printing from the application's Print dialog box.
The Hold Print job is sent to the printer and stored.
4. On the printer's control panel, press [Prt.Jobs].

5. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Hold Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
6. Select the file you want to print using the [ ] or [ ] key, and then press [Print].

The confirmation screen appears.

88
Printing from the Print Job Screen

7. Press [Print].
The Hold Print file is printed.
Press [Cancel] to cancel printing.

• When printing is completed, the stored file will be deleted.


• To stop printing after printing has started, press the [JobReset]. The file will be deleted.
• For details about setting printer drivers, see the printer driver Help. You can also print or delete a Hold
Print file from Web Image Monitor. For details, see Web Image Monitor Help.
• For details about [User ID], see "Printing from the User ID Screen".
3

• p.94 "Printing from the User ID Screen".

Deleting Hold Print files

1. Press [Prt.Jobs].

2. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Hold Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
3. Select the file you want to delete using the [ ] or [ ] key, and then press [Delete].

The confirmation screen appears.

89
3. Printing Stored Documents

4. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

Stored Print

Use this function to store a file in the printer, and then print it from the computer or the printer's control panel
later.
3 Jobs are not deleted after they are printed, so the same job need not be resent in order to print multiple
copies.

• A Stored Print file cannot be stored if:


• the hard disk is not installed in the printer.
• the total number of Sample Print, Locked Print, Hold Print, and Stored Print files in the printer is
over 100. (The maximum number varies depending on the volume of data in files.)
• the file contains over 250 pages.
• sent or stored files in the printer contain over 9,000 pages in total.

• If a Stored Print file has not been stored properly, check the error log on the control panel.
• Even after you turn off the printer, stored documents in the printer remain. However, the [Auto Delete
Temporary Jobs] or [Auto Delete Stored Jobs] settings are applied first.
• If the application has a collate option, make sure it is not selected before sending a print job. By
default, Stored Print jobs are automatically collated by the printer driver. If a collate option is selected
from the application's Print dialog box, more prints than intended may be produced.
• Stored Print files printed or deleted using Web Image Monitor, after you select [Stored Print] using
the control panel will appear on the display panel. However, an error message will appear if you try
to print or delete those Stored Print files.
• If stored files have similar and long file names, recognizing the file you want to print on the display
panel may be difficult. Print the file you want to print either by checking the user ID or the time the file
is sent, or by changing the file name to something that can be recognized easily.
• If you enter the document name on the printer driver's [Details...], that name appears on the display
panel.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Temporary Jobs] or [Auto Delete Stored Jobs], see "System".

• p.99 "Checking the Error Log"

90
Printing from the Print Job Screen

• p.111 "System"

Printing a Stored Print file


The following procedure describes how to print a Stored Print file with the PCL 6/5e or PostScript 3 printer
driver. For information about how to print a Stored Print file with the PostScript 3 printer driver, see "Using
PostScript 3", PostScript 3 Supplement.

• Applications with their own drivers, such as PageMaker, do not support this function.
3
1. Configure the Stored Print in the printer driver's properties.
You can select two ways for Stored Print:
• [Stored Print]
Stores the file in the printer and print it later using the control panel.
• [Store and Print]
Prints the file at once and also stores the file in the printer.
For details about configuring the printer drivers, see the relevant Help files.
2. Click [Details...], and then enter a User ID in the [User ID:] box.
You can also set a password. The same password must be entered when printing or deleting.
You can also set a file name. The file name you set will be displayed on the printer's Job List screen.
3. Start printing from the application's Print dialog box.
The Stored Print job is sent to the printer.
4. On the printer's control panel, press [Prt.Jobs].

5. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].

A list of Stored Print files stored in the printer appears.


You can print files also by pressing [User ID].

91
3. Printing Stored Documents

6. Select the file you want to print using the [ ] or [ ] key, and then press [Print].

The confirmation screen appears.


If you set a password in the printer driver, a password confirmation screen appears. Enter the
3 password.
7. Enter the number of copies to print, and then press [Print].

The Stored Print file is printed.


Press [Cancel] to cancel printing.

• When multiple files are selected without setting a quantity, one set less than the minimum number of
all settings is applied. If the least number of settings is one set, all selected files will be printed at one
set.
• If the number of set quantity is changed when [User ID] is pressed in step 5, the changed quantity is
applied to all selected files.
• To stop printing after printing has started, press [JobReset]. A Stored Print file is not deleted even if
[JobReset] is pressed.
• The Stored Print file that sent to the printer is not deleted unless you delete a file or select [Auto Delete
Stored Jobs].
• You can set or delete a password after sending files to the printer. Select the file and press [Change]
in the Print Job List screen. To set a password, enter the new password. To delete the password, leave
the password box blank on entering or confirming the new password, and press the [OK] key.
• For details about the error log on the display panel, see "Checking the Error Log".
• For details about [Auto Delete Stored Jobs], see "System".

• p.99 "Checking the Error Log"


• p.111 "System"

92
Printing from the Print Job Screen

Deleting stored print files

1. Press [Prt.Jobs].

2. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
3

A list of Stored Print files stored in the printer appears.


Depending on the security settings, certain print jobs may not be displayed.
3. Select the file you want to delete using the [ ] or [ ] key, and then press [Delete].

The delete confirmation screen will appear.


If you set the password in the printer driver, enter the password to delete.
If you forget your password, contact your administrator for help.
4. Press [Delete].

The selected file is deleted.


If you do not want to delete the file, press [Cancel].

93
3. Printing Stored Documents

Printing from the User ID Screen


This describes how to print the files saved in the printer from the User ID screen.

Printing the Selected Print Job

1. On the initial screen, press [Prt.Jobs].

2. Press [User ID].

A list of user IDs whose files are stored in the printer appears.
3. Select the user ID whose file you want to print using the or key, and then press [Job List].

The print job list of the selected user ID appears.


4. Select the file you want to print using the or key, and then press [Print].

The confirmation screen appears.


5. Press [Print].
The selected file is printed.
Press [Cancel] to cancel printing.

94
Printing from the User ID Screen

• If you print a Sample, Locked, or Hold Print file, the print file saved in the printer is deleted after printing
is completed.

Printing All Print Jobs

1. On the initial screen, press [Prt.Jobs].

2. Select a type of print jobs you want to print using the or key, and then press [User ID].

A list of user IDs whose files are stored in the printer appears.
3. Select the user ID whose file you want to print using the or key, and then press [PrintAll].

The confirmation screen appears.


4. Press [Print].
The selected files are printed.
To cancel printing, press [Cancel].

• If you print a Sample, Locked, or Hold Print file, the print file saved in the printer is deleted after printing
is completed.
• You cannot select a print job that is not stored under the selected user ID.
• When printing multiple Sample Print files without specifying the number of sets on the confirmation
screen, one set less than the least number of set specified on the computer is applied for every selected

95
3. Printing Stored Documents

document. If the number of sets specified on the computer is "1", one set each is printed for every
document.
• When printing multiple Stored Print files without specifying the number of sets on the confirmation
screen, the least number of set specified on the computer is applied for every selected document.
• If you select [Locked Print Jobs], enter the correct password. If there are multiple passwords, the printer
prints only files that correspond to the entered password.
• If you select Stored Print files, and some of these require a password, the printer prints files that
correspond to the entered password and files that do not require a password.

96
Canceling a Print Job

Canceling a Print Job


You can cancel printing from either the printer or a client computer. Since canceling procedures vary
depending on the print job status, check the job status and cancel printing according to the following
procedure.

Canceling a Print Job Using the Control Panel

1. Press [JobReset]. 3
A confirmation message appears.
2. Press [Current].

To resume printing jobs, press [Resume].


3. Press [Yes] to cancel the print job.

Press [No] to return to the previous display.

Windows - Canceling a Print Job from the computer

You can cancel a print job from the computer if transferring print jobs is not completed.

1. Double-click the printer icon on the Windows task tray.


A window appears, showing all print jobs currently queued for printing. Check the current status of
the job you want to cancel.
2. Select the name of the job you want to cancel.
3. On the [Document] menu, click [Cancel].

97
3. Printing Stored Documents

• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• If the printer is connected to the computer using a parallel cable, sent print jobs may be canceled if
[JobReset] is pressed while "Waiting for print data..." is displayed on the control panel. After the
interval set in [I/O Timeout] in Printer Features has passed, the next print job can be sent. A print job
sent from a different client computer will not be canceled in this case.
• You cannot stop printing data that has already been processed. For this reason, printing may continue
3 for a few pages after you press [JobReset].
• A print job containing a large volume of data may take considerable time to stop.

Mac OS - Canceling a Print Job from the computer

1. Double-click the printer icon on the desktop.


A window appears showing all print jobs that are currently queuing to be printed. Check the current
status of the job you want to cancel.
Under Mac OS X, start Print Center.
2. Select the name of the job you want to cancel.
3. Click the pause icon, and then click the trash icon.

• If the printer is shared by multiple computers, be careful not to accidentally cancel someone else's
print job.
• If the printer is connected to the computer using a parallel cable, sent print jobs may be canceled if
[JobReset] is pressed while "Waiting for print data..." is displayed on the control panel. After the
interval set in [I/O Timeout] in Printer Features has passed, the next print job can be sent. A print job
sent from a different client computer will not be canceled in this case.
• You cannot stop printing data that has already been processed. For this reason, printing may continue
for a few pages after you press [JobReset].
• A print job containing a large volume of data may take considerable time to stop.

98
Checking the Error Log

Checking the Error Log


If files could not be stored due to printing errors, identify the cause of the errors by checking the error log
on the control panel.

• The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors
already stored, the oldest error is deleted. However, if the oldest error belongs to one of the following
types of print jobs, it is not deleted. Instead, it will be stored separately in error logs for each job type,
up to a maximum of 30 for each log. You can check any of these print jobs for error log information. 3
• If the main power switch is turned off, the error log is deleted.

1. Press [Menu].

2. Press the [ ] or [ ] key to select [Error Log], and then press the [OK] key.

3. Select a type of print jobs using [ ] or [ ] key, and then press the [OK] key.

4. Press the [ ] or [ ] key to select the error log you want to check.

• Press the [Escape] key until the initial screen appears after checking the log.

99
3. Printing Stored Documents

• To print files that appear in the error log, resend them after stored files have been printed or deleted.

100
4. Printing from DeskTopBinder Lite
This chapter explains how to install DeskTopBinder Lite, and using the PDF Direct Print function.

Printing a PDF File Directly


You can send PDF files directly to the machine for printing, without having to open a PDF application.

• This function is possible only when the optional PostScript 3 unit is installed.
• This function is possible for genuine Adobe PDF files only.
• Version 1.3, 1.4, 1.5, and 1.6 PDF files are compatible.
4
• PDF files created using PDF version 1.5 Crypt Filter functions or more than eight DeviceN Color Space
components cannot be printed.
• PDF files created using PDF version 1.6 watermark note functions, or extended optional contents
cannot be printed.
• PDF version 1.7 (Acrobat 8.0) files created without any functions that are exclusive to PDF version
1.7 can be printed.

• Paper size errors may occur when printing on custom size paper.

Printing Method

There are the two methods of printing the PDF files directly, either using the DeskTopBinder Lite, or entering
commands.

Using DeskTopBinder Lite

Installing DeskTopBinder Lite


Follow the procedure below to install DeskTopBinder Lite.

1. Quit all applications currently running.


2. Insert the "Scanner Driver and Utilities" CD-ROM into the CD-ROM drive.
The installer starts.
Auto Run may not work under certain operating system settings. In this case, launch "Setup.exe",
located on the CD-ROM root directory.

101
4. Printing from DeskTopBinder Lite

3. Click [DeskTopBinder Lite].


The [DeskTopBinder Lite] dialog box appears.
4. Click [DeskTopBinder Lite], and then click [OK].
5. Follow the instructions on the display to install DeskTopBinder Lite.
If you are required to restart the computer after installing DeskTopBinder Lite, restart the computer
and continue the configuration.

DeskTopBinder Lite enhancements


Follow the DeskTopBinder Lite enhancement procedure to print PDF files directly.

4 1. On the [Start] menu, point to [All Programs], [DeskTopBinder], and then click [Extended
Features Wizard].
The [Extended Features Wizard] dialog box appears.
2. Click [Start], and then click [Next>] repeatedly until the [Printing Function2] dialog box
appears.
3. In the [Printing Function2] dialog box, click [Add...].
The [PDF Direct Print Properties] dialog box appears.
4. Click [Specify...], and then enter the IP address or host name of the printer.
5. Click [OK].
The [PDF Direct Print Properties] dialog box closes.
6. Click [Next>] repeatedly until [Finish] appears.
7. Click [Finish].

Function Palette
The Function palette contains buttons for functions that are already configured through DeskTopBinder
Lite enhancement. Using these buttons, you can print Windows files, preview printouts, convert images,
and register scanners for documents without having to open DeskTopBinder Lite. You can also use these
functions simply by dragging a target file to the button corresponding to the required function and dropping
it there.

1. On the [Start] menu, point to [All Programs], [DeskTopBinder], and then click [Function
Palette].
An icon for the Function palette is added to the task tray displayed at the bottom right of the screen.
2. Right-click the new icon that has been added to the task tray, and then click [Properties...].
The [Properties] dialog box appears.

102
Printing a PDF File Directly

3. Click the [Contents] tab, select the [PDF Direct Print] check box at the center, and then click
[OK].
The [Properties] screen closes and the [PDF Direct Print] icon is added to the palette.

PDF Direct Printing


Follow the procedure below to print PDF files directly.

1. Drag the PDF file you want to print to the PDF Direct Printing icon on the Function Palette and
drop it there.
The [Output File List - PDF Direct Print] dialog box appears.
2. Highlight the PDF file you want to print, and then click [OK].
The PDF file is printed.
4

PDF Direct Print Properties

1 9
2
3 10
11

12
4
5 13
14
6 15
7

8
BRP007S

1. Setting name:
Displays the plug-in configuration name (up to 63 single byte characters)
2. Change Icon...
Changes the icon displayed on the tool bar.
3. Printer:
Displays printer's IP address or hostname.
4. Duplex
Prints on both sides of sheets.
5. Layout
Prints multiple pages on a single sheet.

103
4. Printing from DeskTopBinder Lite

6. Punch (not supported for this printer)


Punches holes in printed sheets.
7. Staple (not supported for this printer)
Staples together printed sheets.
8. Display this dialog box before printing
Appears in PDF direct printing mode if this check box is selected.
9. Orientation:
Specify the original's orientation.
10. Number of copies
Specify the number of copies to print.

4 11. Collate
Sorts printed sheets.
12. Range:
Specify which paper to print.
13. Printout paper size:
Specify the paper size you want copies to be printed onto.
14. Color/Black and White: (not supported for this printer)
Specify color or black-and-white printing.
15. Resolution:
Specify a print resolution.

Using Commands

You can print PDF files directly, using commands such as "ftp", "sftp", and "lpr".
For details about the printing commands, see “Printing Commands”. Network and System Settings Guide.

104
5. Printer Features
This chapter describes user tools in the Printer Features menu. For details on how to access Printer Features,
see "Accessing User Tools".

Accessing User Tools


This section describes how to access User Tools menu.
User Tools allow you to change or set defaults.

• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or the [Energy Saver] or [Clear Modes] key is pressed. 5
Changing Default Settings

This section describes how to change the settings of User Tools.

• If Administrator Authentication Management is specified, contact your administrator.

1. Press the [User Tools/Counter] key.

BRP005S

2. Press [Printer Features].


3. Change settings by following instructions on the display, and then press [OK].

Quitting User Tools

This section describes how to quit the settings of User Tools.

105
5. Printer Features

1. Press the [User Tools/Counter] key.

BRP005S

• You can also quit User Tools by pressing [Exit].

5
Menu Protect

Using Menu Protect, you can prevent unauthenticated users from changing the user tools. Menu Protect
can be specified for each of the following user tools menus.
• Copier Features
• Fax Features
• Printer Features
• Scanner Features
For details, consult your administrator.

106
List/Test Print

List/Test Print
This section describes the user tools in the List / Test Print menu under Printer Features.
Multiple Lists
You can print the configuration page and error log.
Config. Page
You can print the machine's current configuration values.
Error Log
You can print error logs listing all errors that occurred during printing. The most recent 30 errors are
stored in the error log. If a new error is added when there are 30 errors already stored, the oldest
error is deleted. However, if the oldest error belongs to one of the following types of print jobs, it is
not deleted. Instead, it will be stored separately in error logs for each job type, up to a maximum of
30 for each log. You can check any of these print jobs for error log information.
• Sample Print
5
• Locked Print
• Hold Print
• Stored Print
The records of Auto Job Cancel and jobs canceled manually from the control panel can be printed.
Menu List
You can print a Menu List showing the machine's function menus.
PCL Config./Font Page
You can print the current configuration and installed PCL font list.
PS Config./Font Page
You can print the current configuration and installed PostScript font list.
This menu can be selected only when the optional PostScript 3 unit is installed.
PDF Config./Font Page
You can print the current configuration and installed PDF font list.
This menu can be selected only when the optional PostScript 3 unit is installed.
Hex Dump
You can print in the Hex Dump mode.

Printing the Configuration Page

This section describes how to print the Configuration Page.

107
5. Printer Features

1. Press the [User Tools/Counter] key.


2. Select [Printer Features] using the [ ] or [ ] key, and then press the [OK] key.
3. Select [List/Test Print] using the [ ] or [ ] key, and then press the [OK] key.
4. Select [Config. Page] using the [ ] or [ ] key, and then press the [OK] key.
The configuration page is printed.
5. Press the [User Tools/Counter] key.

Interpreting the configuration page


This section describes the Configuration Page.
System Reference
• Unit Number

5 Displays the serial number assigned to the board by its manufacturer.


• Total Memory
Displays the total amount of memory (SDRAM) installed on the printer.
• Firmware Version
• Printer
Displays the version number of the printer firmware.
• System
Displays the version number of the system firmware.
• Engine
Displays the version number of the printer engine.
• LCDC
Displays the version number of the panel display.
• NIB
Displays the version number of the Network interface.
• Device Connection
This item(s) appears when the device option(s) is installed.
• HDD: Font/Macro Download
Displays the capacity of the hard disk drive.
• Printer Language
Displays the version number of the printer driver language.
• Attached Equipment
Displays the installed optional equipments.

108
List/Test Print

• Consumption Status
Displays the status of consumable.
Paper Input
Displays settings made under Tray Paper Settings menu.
Maintenance
Displays settings made under the Maintenance menu.
System
Displays settings made under the System menu.
PCL Menu
Displays settings made under PCL Menu.
PS Menu
Displays settings made under PS Menu.
PDF Menu 5
Displays settings made under PDF Menu.
Host Interface
Displays settings made under the Host Interface menu.
When DHCP is active on the network, the actual IPv4 address, subnet mask and gateway address
appear in parentheses on the configuration page.
Interface Information
Displays the interface information.

• p.105 "Accessing User Tools"

109
5. Printer Features

Maintenance
This section describes the user tools in the Maintenance menu under Printer Features.
Menu Protect
You can select whether or not to protect menu. When you enable this setting, specify protection level.
The default setting is Level 2.
List/Test Print Lock
You can lock the [List/Test Print] menu.
The default setting is [Off].
Delete All Temporary Jobs
You can delete all print jobs temporarily stored in the machine.
Delete All Stored Jobs
5 You can delete all print jobs stored in the machine.

• p.105 "Accessing User Tools"

110
System

System
This section describes the user tools in the System menu under Printer Features.
Print Error Report
Select this to have an error report printed when a printer or memory error occurs.
The default setting is [Off].
Auto Continue
You can select this to enable Auto Continue. When it is On, printing continues after a system error
occurs.
The default setting is [Off].
Memory Overflow
Select this to have a memory overflow error report printed.
The default setting is [Do not print]. 5
Rotate by 180 Degrees
Specify whether to rotate the print image 180 degrees relative to the paper orientation.
The default setting is [Off].
Auto Delete Temporary Jobs
You can select to automatically delete print jobs temporarily stored in the machine.
The default setting is [Off].
If you select [On], you can set up to 200 hours for auto file deleting.
Auto Delete Stored Jobs
You can select to automatically delete print jobs stored in the machine.
The default setting is [On], “3” day(s).
If you select [On], you can set up to 180 days for auto file deleting.
Print Compressed Data
Specify whether to uncompress and extract compressed job data before printing it.
The supported compression format is GZIP.
The default setting is [Off].
Memory Usage
You can select the amount of memory used in Font Priority or Frame Priority, according to paper size
or resolution.
Duplex
You can select to have print on both sides of each page.
The default setting is [Off].

111
5. Printer Features

Copies
You can specify the number of print sets. This setting is disabled if the number of pages to print has
been specified with the printer driver or another command.
The number of copies can be specified from 1 to 999 by increments of one.
The default setting is “1” copies.
Blank Page Print
You can select whether or not to print blank pages.
The default setting is [On].
Pages that match one of the following conditions are identified as blank.
• There are no images.
• There are images but they are outside the printable area.
• There are only blank characters.
5 Edge Smoothing
Set this to enable Edge Smoothing.
The default setting is [On].
If Toner Saving is set to On, Edge
Smoothing is ignored even if it is set to On.
Toner Saving
Set this to enable Toner Saving.
The default setting is [Off].
Printer Language
Specify the printer language.
The default setting is [Auto].
Sub Paper Size
You can enable the Auto Substitute Paper Size (A4, LT) feature.
The default setting is [Auto].
Page Size
You can select the default paper size.
• The paper size you can select is as follows:
A4, A5 , B5 JIS, C5 Env, C6 Env, DL Env, 81/2 14, 81/2 13, 81/2 11, 81/4 13, 8 13, 71/4
101/2, 51/2 81/2, 41/8 9 1/2, 3 7/8 71/2, 16K, Custom Size

The default setting is A4.

112
System

The default setting is 81/2 11.


Letterhead Setting
You can rotate original images when printing.
When printing, original images are always rotated by 180 degrees. Therefore, output might not be
as expected when printing onto letterhead or preprinted paper requiring orientation. Using this
function, you can specify image rotation.
The default setting is [Auto Detect].
• Off
When set to [Off], original images are rotated by 180 degrees.
• Auto Detect
When set to [Auto Detect], the machine detects a letterhead or preprinted paper automatically,
and does not rotate the image.
• On (Always)
5
When set to [On (Always)], the machine does not rotate.
This function reduces printing speed.
Bypass Tray Priority
Specify whether (Printer) Driver/Command or Machine Settings, has priority for determining the
paper size for the bypass tray.
The default setting is [Driver/Command].
Edge to Edge Print
You can select whether or not to print on the entire sheet.
The default setting is [Off].
Default Printer Lang.
You can set the default printer language if the machine cannot find the printer language automatically.
The default setting is [PCL].
Tray Switching
You can specify whether or not the machine automatically switches paper trays if paper of the specified
size and type is not loaded in the driver-designated tray.
The default setting is [Off].
RAM Disk
You can change the settings of the RAM disk.
This menu appears only when the optional hard disk is not installed.
Extend Auto Tray Switching
This setting enables the machine to switch paper trays automatically, regardless of whether the tray
is manually or automatically selected.

113
5. Printer Features

When set to [On], [Auto Tray Switching] is enabled and the [Auto Tray Switching] setting configured
in the printer driver is overridden.
The default setting is [Off].

• p.105 "Accessing User Tools"

114
Host Interface

Host Interface
This section describes the user tools in the Host Interface menu under Printer Features.
I/O Buffer
You can set the size of the I/O Buffer. Normally it is not necessary to change this setting.
The default setting is [128 KB].
I/O Timeout
You can set how many seconds the machine should wait before ending a print job. If data from another
port usually arrives in the middle of a print job, you should increase this timeout period.
The default setting is [15 seconds].

• p.105 "Accessing User Tools"


5

115
5. Printer Features

PCL Menu
This section describes the user tools in the PCL Menu under Printer Features.
Orientation
You can set the page orientation.
The default setting is [Portrait].
Form Lines
You can set the number of lines per page.
The number of lines can be specified from 5 to 128 by increments of one.

The default setting is “64” lines.

5 The default setting is “60” lines.


Font Source
You can set the storage location of the default font.
The default setting is [Resident].
RAM, HDD and SD can be selected only when fonts have been downloaded to the machine.
Font Number
You can set the ID of the default font you want to use.
• When [Resident] is selected under "Font Source":
The font number can be specified from 0 to 63 by increments of one.
The default setting is “0”.
• When [RAM], [HDD], or [SD] is selected under "Font Source":
The font number can be specified from 1 up to number of fonts stored on the machine.
The default setting is “1”.
Point Size
You can set the point size you want to use for the selected font.
The number of point sizes can be specified from 4.00 to 999.75 by increments of 0.25.
This setting is effective only with variable-space fonts.
The default setting is “12.00” points.
Font Pitch
You can set the number of characters per inch for the selected font.
The number of characters per inch can be specified from 0.44 to 99.99 by increments of 0.01.

116
PCL Menu

This setting is effective only with fixed-space fonts.


The default setting is “10.00” pitches.
Symbol Set
Specify the character set of the selected font. The available options are as follows:
• Roman-8, ISO L1, ISO L2, ISO L5, PC-8, PC-8 D/N, PC-850, PC-852, PC8-TK, Win L1, Win
L2, Win L5, Desktop, PS Text, VN Intl, VN US, MS Publ, Math-8, PS Math, VN Math, Pifont,
Legal, ISO 4, ISO 6, ISO 11, ISO 15, ISO 17, ISO 21, ISO 60, ISO 69, Win 3.0
The default setting is [PC-8].
Courier Font
You can select a courier font type.
The default setting is [Regular].
Ext. A4 Width
You can extend the printing area width (when printing on A4 sheet with PCL). 5
The default setting is [Off].
When the setting is [On], the width will be 81/2 inches.
Append CR to LF
When set to [On], a carriage return will follow each line feed: CR=CR, LF=CR-LF, FF=CR-FF.
The default setting is [Off].
Resolution
You can set the print resolution in dots per inch.
The default setting is [600dpi].

• p.105 "Accessing User Tools"

117
5. Printer Features

PS Menu
This section describes the user tools in the PS Menu under Printer Features.
This menu appears only when the optional PostScript 3 unit is installed.
Job Timeout
You can specify how long the printer waits (in seconds) before canceling the current job when the job
is interrupted while being processed.
The default setting is [Use Driver/Command].
If you select [Use Machine Settings], enter a value between 0 and 999.
The default setting is “0”.
When set to "0", the current job will not be canceled when interrupted.
Wait Timeout
5 You can specify how long the printer waits (in seconds) before it cancels receiving the job when the
printer cannot detect the end of the job.
The default setting is [Use Driver/Command].
If you select Use Machine Settings, enter a value between 0 and 999.
The default setting is “300”.
When set to "0", the print job will not be canceled when the end of the job cannot be detected.
Data Format
You can select a data format.
The default setting is [TBCP].
This setting is not effective when operating the machine with a parallel or EtherTalk connection.
When operating the machine with a parallel connection, and also if the binary data is sent from the
printer driver, the print job is canceled.
When operating the machine with an Ethernet connection, the print job is canceled under the following
conditions:
• The printer driver data format is TBCP, and the data format selected on the display panel is Binary
Data.
• The printer driver data format is binary, and the data format selected on the display panel is
TBCP.
Resolution
You can set the print resolution in dots per inch.
The default setting is [600dpi].
Orientation Auto Detect
You can select whether or not to automatically detect print orientation.

118
PS Menu

The Default setting is [On].

• p.105 "Accessing User Tools"

119
5. Printer Features

PDF Menu
This section describes the user tools in the PDF Menu under Printer Features.
Change PDF Password
Set the password for the PDF file executing PDF Direct Print.
• Current Password
• New Password
• Confirm New Password
A password can be set using Web Image Monitor, but in this case the password information is sent
through the network. If security is a priority, set the password using this menu from the Control Panel.
PDF Group Password
Set the group password already specified with DeskTopBinder.
5 • Current Password
• New Password
• Confirm Password
A password can be set using Web Image Monitor, but in this case the password information is sent
through the network. If security is a priority, set the password using this menu from the Control Panel.
Reverse Order Print
When set to [On], printing starts from the last page of document.
The default setting is [Off].
Resolution
Set the print resolution in dots per inch.
The default setting is [600dpi].
Orientation Auto Detect
Select whether or not to automatically detect print orientation.
The default setting is [On].

• p.105 "Accessing User Tools"

120
6. Appendix

Using the Virtual Printer


This section explains the virtual printer function.
The virtual printer is a pseudo printer that can only be recognized on a network. The virtual printer has
various print options, such as feeding tray selection and duplex printing, which you can set in advance.
You can set those options beforehand. If you use the virtual printer under UNIX, Solaris, and other operating
systems, various print functions are possible without your having to manually enter the usual print commands.

Adding a Virtual Printer

Use this procedure to add a virtual printer.

• Adding a virtual printer requires Administrators privilege. Log on using an account that has
Administrators privilege. 6
• The following Virtual Printer protocols are available: "TCP/IP (Unspecified, Normal)", "TCP/IP
(DIPRINT)", "TCP/IP (RHPP)", "AppleTalk", and "NetWare".

1. Log on to Web Image Monitor as an administrator.


For details about login user names and passwords, see "Using Web Image Monitor", Network and
System Settings Guide.
2. In the menu area, click [Configuration], and then click [Virtual Printer Settings] in the "Printer"
category.
A list of the available virtual printers appears.
3. Click [Add].
The screen for adding virtual printers appears.
4. In [Virtual Printer Name], enter a name for the new printer, and then select the protocol in
the [Protocol] list.
5. Click [OK].
The virtual printer is added.

• If you select [AppleTalk] or [NetWare] in the [Protocol] list, you cannot specify a virtual printer name.
• You can specify a virtual printer name using up to 47 characters.
• You can add up to 50 virtual printers. After 51 virtual printers have been added, [Add] will no longer
be displayed.

121
6. Appendix

Changing a Virtual Printer Configuration

Use this procedure to change a virtual printer configuration.

• You must have Administrators privilege to change the configuration of a virtual printer. Log on using
an account that has Administrators privilege.

1. Log on to Web Image Monitor as an administrator.


For details about login user names and passwords, see "Using Web Image Monitor", Network and
System Settings Guide.
2. In the menu area, click [Configuration], and then click [Virtual Printer Settings] in the "Printer"
category.
A list of the available virtual printers appears.
3. Select the virtual printer whose configuration you want to change, and then click [Change].
4. Change the configuration as required.

6 5. Click [OK].

• For details about virtual printer configuration, see Web Image Monitor Help.

Confirming a Virtual Printer Configuration

Use this procedure to confirm a virtual printer configuration.

1. Start Web Image Monitor.


For details about login user names and passwords, see "Using Web Image Monitor", Network and
System Settings Guide.
2. In the menu area, click [Configuration], and then click [Virtual Printer Settings] in the "Printer"
category.
A list of available virtual printers appears.
3. Select the virtual printer whose configuration details you want to confirm, and then click
[Details].
A configuration list for the selected virtual printer appears.

• [Details] is not displayed if you log on to Web Image Monitor as an administrator. To confirm a virtual
printer configuration, click [Change].
• If the virtual printers function is disabled, the list of available virtual printers is not displayed. For details
about enabling the virtual printers function, see Web Image Monitor Help.

122
Using the Virtual Printer

Deleting a Virtual Printer

Use this procedure to delete a virtual printer.

• You must have Administrators privilege to delete a virtual printer. Log on using an account that has
Administrators privilege.

1. Log on to Web Image Monitor as an administrator.


For details about login user names and passwords, see "Using Web Image Monitor", Network and
System Settings Guide.
2. In the menu area, click [Configuration], and then click [Virtual Printer Settings] in the "Printer"
category.
The list of available virtual printers appears.
3. Select the virtual printer that you want to delete, and then click [Delete].
The delete confirmation screen appears.
4. Click [OK].
6
• You cannot delete this printer's default virtual printer.
• [Delete] appears only if you have already added a virtual printer.

Printing Using a Virtual Printer

To print directly from a specified virtual printer, assign the virtual printer in the print command. Before
printing for the first time, specify the virtual printer you want to use.

1. Log on to Web Image Monitor in administrator mode.


For details about login user name and password, see "Using Web Image Monitor", Network and
System Settings Guide.
2. In the menu area, click [Configuration], and then click [Printer Basic Settings] in the "Printer"
category.
3. Select [Active] in [Virtual Printer], and then click [OK].
4. Send a command from your computer.
lpr
C:\>lpr -S "printer's IP address" [-P “Virtual Printer Name”] [-ol] \path\file
name

123
6. Appendix

rcp
c:> rcp [-b] \path\file name [\path name\file name...] printer's host name:
["Virtual Printer Name"]
ftp
ftp> put \path\ file name [Virtual Printer Name]

124
Specifications

Specifications
This section contains the machine's electrical and hardware specifications, including information about its
options.

Component Specifications

Resolution 600 dpi 600 dpi

Printing speed 17ppm


(A4 , 81/2 " 11 " , plain paper, 600 dpi 600 dpi)

Interface Standard:
• Ethernet interface (100 BASE-TX/10 BASE-T)
• USB 2.0 Type A/B
Optional:
• Giga Ethernet interface (1000BASE-T/100BASE-TX/
10BASE-T) 6
• IEEE 1284 parallel interface
• IEEE 802.11a/b/g wireless LAN interface

Network protocol TCP/IP(IPv4, IPv6), IPX/SPX, AppleTalk

Printer language Standard:


• PCL 5e/6
Optional:
• PostScript 3, PDF

Fonts PCL 5e/6:


• 45 Intellifonts, 13 International fonts.
PostScript 3:
• 136 fonts (Type 2:24, Type 14:112)

Memory 640 MB

Hard disk Optional:


• 80 GB

USB Interface (Standard) Transmission spec:


• USB 2.0 Standard
Connectable Device:

125
6. Appendix

Component Specifications
• Devices corresponding to USB 2.0 Standard

Supported Operating System Standard:


• Windows 2000/XP/Vista, Windows Server
2003/2003 R2/2008
Optional:
• Mac OS 8.6 or later, Mac OS X 10.1 or later

• When using Mac OS, use only the standard USB Interface. The optional USB interface board is not
supported.
• When using Mac OS, the USB interface is supported only under Mac OS 9 or later.
• When using the USB Interface (Standard) with Mac OS 10.3.3 or later, USB2.0 is supported.

126
Trademarks

Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PageMaker, PostScript, and Reader are either registered trademarks
or trademarks or trademarks of Adobe Systems Incorporated in the United States and/or countries.
Apple, AppleTalk, EtherTalk, Macintosh, Mac OS, and Mac OS X are registered trademarks of Apple
Inc., registered in the U.S. and other countries.
IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States
or other countries.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Monotype is a registered trademark of Monotype Imaging, Inc.
Netware, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark of The Open Group.
Other product names used herein are for identification purposes only and might be trademarks of their 6
respective companies. We disclaim any and all right to those marks.
The proper names of the Windows operating systems are as follows:
*The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
*The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
*The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
*The product names of Windows Server 2003 are as follows:

127
6. Appendix

Microsoft® Windows Server® 2003 Standard Edition


Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
*The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
*The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

128
INDEX
A Delete all stored jobs..........................................110
Delete all temporary jobs...................................110
About This Machine.................................................5
DeskTopBinder Lite..............................................101
Accessing user tools............................................105 Enhancements.................................................................102
Advanced printing.................................................65 Function palette...............................................................102
Append CR to LF.................................................117 Install................................................................................101
Auto continue.......................................................111 Display...................................................................75
Auto delete stored jobs.......................................111 Downloading the printer driver............................14
Auto delete temporary jobs................................111 Duplex..................................................................111
B E
Banner page..........................................................29 Edge smoothing................................................... 112
Bidirectional communication..........................35, 36 Edge to edge print..............................................113
Blank page print..................................................112 Envelopes...............................................................49
Both sides of sheets...............................................58 Error log.........................................................99, 107
Bypass tray.............................................................41 Escape key.............................................................76
envelopes...........................................................................49 Ext. A4 width.......................................................117
OHP transparencies..........................................................47
Extend auto tray switching..................................113
setting custom size paper..................................................45
Setting the paper size........................................................43 F
thick paper..........................................................................47
Facsimile Reference.................................................5
thin paper...........................................................................47
Finishing menu.......................................................65
Bypass tray priority.............................................113
Font Manager........................................................37
C Font number.........................................................116
Cancel....................................................................97 Font pitch..............................................................116
Mac OS..............................................................................98 Font source..........................................................116
Windows............................................................................97 Form feed.........................................................28, 67
Change PDF password.......................................120 Form lines.............................................................116
Changing default settings...................................105 Frequently used print methods..............................57
Changing the port setting.....................................19 H
Classification code................................................71
Classification code, configuring...........................72 Hex dump............................................................107
Classification code, for a print job.......................72 Hold print.........................................................87, 94
Collate....................................................................65 Host interface.......................................................115
Combining multiple pages into single page........60 How to read this manual.........................................8
Config. page.......................................................107 I
Confirming the connection method......................11 I/O buffer............................................................115
Copies..................................................................112 I/O timeout..........................................................115
Copy Reference.......................................................5 Important..................................................................7
Courier font..........................................................117 Installing the printer driver....................................14
D IPP...........................................................................17
Data format..........................................................118 J
Default printer lang.............................................113 Job timeout...........................................................118

129
Jobreset..................................................................75 PCL..........................................................................14
L PCL config./ font page.......................................107
PCL menu.............................................................116
Laws and regulations...............................................9 PDF config./font page........................................107
Legal prohibition......................................................9 PDF direct print...........................................101, 103
Letterhead..............................................................55 PDF Direct Print
Letterhead setting................................................113 PDF direct print properties..............................................103
List / test print......................................................107 using commands.............................................................104
List / test print lock..............................................110 PDF group password..........................................120
Local connection....................................................13 PDF menu.............................................................120
Locked print............................................................94 Point size..............................................................116
LPR port...................................................................21 PostScript 3............................................................14
M PostScript 3 Supplement.........................................5
Print compressed data........................................111
Maintenance.......................................................110 Print error report..................................................111
Making option settings..........................................35 Print job function....................................................77
Making printer default settings.............................39 Print job screen......................................................77
Making printer settings..........................................40 Printer driver.......................................14, 25, 27, 72
Memory overflow................................................111 Printer driver setting screen...................................39
Memory usage....................................................111 Printer language..................................................112
Menu......................................................................75 Printer Reference......................................................5
Menu list...............................................................107 Printing the configuration page..........................107
Menu protect..............................................106, 110 Prt.jobs....................................................................75
Model-specific information...................................10 PS config./font page..........................................107
Multiple lists.........................................................107 PS menu...............................................................118
N Q
NetWare................................................................27 Quick install...........................................................14
Network and System Settings Guide.....................5 Quitting user tools...............................................105
Network connection..............................................11
Network printer...............................................12, 25 R
Note..........................................................................8 RAM disk..............................................................113
Notice.......................................................................7 Reading the display and using keys....................75
O Remote printer........................................................27
Resetting the printer...............................................29
OK key...................................................................76 Resolution...........................................117, 118, 120
Operational status or messages...........................75 Reverse order print..............................................120
Orientation...........................................................116 Rotate by 180 degrees......................................111
Orientation auto detect..............................118, 120
Other manuals.........................................................5 S

P Sample print...........................................................94
Scanner Reference..................................................5
Page size..............................................................112 Scroll keys..............................................................76
PageMaker............................................................38 Security Reference...................................................5
Parallel connection................................................33

130
Selection keys........................................................76 WSD port...............................................................23
SmartDeviceMonitor for Client.............................15
SmartDeviceMonitor for Client port.....................15
Specifications......................................................125
Spool printing........................................................70
Standard printing...................................................57
Standard TCP/IP port...........................................20
Stored print............................................................94
Sub paper size....................................................112
Symbol set............................................................117
Symbols....................................................................8
System..................................................................111
T
TCP/IP....................................................................16
Toner saving........................................................112
Trademarks..........................................................127
Tray switching......................................................113
Trouble Shooting.....................................................5
Types of combined printing..................................61
Types of duplex printing.......................................60
U
USB connection.....................................................30
User ID....................................................................94
Using one click presets..........................................63
V
Virtual printer.......................................................121
Adding.............................................................................121
Changing.........................................................................122
Confirming.......................................................................122
Deleting............................................................................ 123
Printing.............................................................................123

W
Wait timeout........................................................118
Web Image Monitor.............................................72
Windows 2000.....................................................30
Windows printing port..........................................11
Windows Server 2003.........................................30
Windows Server 2003 R2...................................30
Windows Server 2008.........................................31
Windows Vista.......................................................31
Windows XP...........................................................30

131
MEMO

132 GB GB EN USA AE AE D468


Copyright © 2008
Operating Instructions Printer Reference

D468-6701
USA
EN
Quick Reference Fax Guide

cPlease put this guide above your machineg


D0697104

1. Receive File indicator 10. Indicators 19. {Start} key 25. Data In indicator
To select an item on the display… 2. Communicating indicator 11. Display panel 20. {#} key (enter key) 26. Quick Dial keys
3. {Memory Trans.} key 12. Selection keys 21. Number keys 27. {Resolution} key
• Use {U} or {T} to scroll the display. 4. {On Hook Dial} key 13. Scroll keys 22. {OK} key 28. {Pause/Redial} key
• Press the {OK} key to set the currently 5. {Facsimile} key 14. {User Tools/Counter} key Press to set a selected item or an 29. User Function keys
selected item and to proceed to the next Press to switch to the facsimile mode. 15. {Clear/Stop} key entered numeric value. You can assign frequently-used
display. 6. {Search Destination} key 16. {Clear Modes} key 23. {Escape} key functions to these keys. How to cancel a transmission... (1. Transmission)
7. {Check Destination} key Press to clear the current settings. Press to cancel operation or return to
8. {Job Information} key 17. Main power indicator the previous display. Memory + Immediate
9. Function keys 18. Operation switch 24. {Lighter} key, {Darker} key Before the original is scanned = before pressing the {Start} key:
How to send a fax... (1. Transmission)
A Press the {Clear Modes} key.
A Specify a transmission mode by pressing the
{Memory Trans.} key: While the original is being scanned = after pressing the {Start} key:
• Memory Transmission, or A Press the {Clear/Stop} key.
• Immediate Transmission 5 This button needs to be selected as first step Memory
B Place the original. While the original is being transmitted:
A Press the {Clear/Stop} key.
• Exposure glass 1 2 3 4 6 7 8 9 10 11 12 13 14 15 16 17 B Select the file you want to cancel, and then press [Stop TX].
(face down)
C Press [Delete].
D Press the {Escape} key.

• ADF (face up) Before the transmission is started:


A Press the {Job Information} key.
B Select [Check/Stop TX File], and then press the {OK} key.
C Select the file you want to cancel, and then press [Stop TX].
D Press [Delete].
E Press the {Escape} key twice.
C Make the scan
settings you require.
Facsimile
D Specify a destination. (4. Confirming Communication
29 28 27 26 25 24 23 22 21 20 19 18 How to print the Journal... Information)
Copier
E Press the {Start} key.
The Journal is printed automatically after every 50
If you choose Memory Transmission, you can Scanner communications. You can also request a Journal at any
send to more destinations at once. To do this, time, by following the procedure below.
Printer
after step 4, press:
- [Add Dest] and specify destinations A Press the {Job Information} key.

(2. Other Transmission B Select [Print Journal], and


How to register a Quick Dial... (1. Transmission) How to send at a specific time (Send Later) Features)
How to fax via a network
(1. Transmission, then press the {OK} key.
5. Fax via Computer) A Press the {User Tools/Counter} key. Using this function, you can instruct the machine to send the fax
Internet Fax at a later time via Memory Transmission. C Press the {Start} key.
This machine converts scanned document B Select [System Settings], and then press the {OK} key. Advantage: you can take advantage of off-peak telephone
images to e-mail format and transmits the data charges, without being at the machine. D Press the {Escape} key.
C Select [Administrator Tools], and then press the {OK} key.
over the Internet.
- Press [ ] to display in the destination D Select [Address Book Management], and then press the {OK} key. A Place the original, and then select the scan settings you require.
display column.
E Select [Program/Change], and then press the {OK} key. B Press [TX Mode]. Advanced Fax Features
- Specify the e-mail address as a destination.
F Enter the registration number you want to program, and then press Please see the <Facsimile Reference> Operating
IP-Fax
the {OK} key. Instructions:
The IP-Fax function sends or receives
documents between two facsimiles directly via a G Enter the name, and then press the {OK} key. C Select [Send Later], and then press - SUB/SEP Codes (2. Other Transmission Features)
TCP/IP network. the {OK} key. Privacy can be protected when faxing with a SUB/SEP
- Specify the protocol (H.323 or SIP). After H Press [Details]. Code, since only people who know the SUB/SEP Code can
you specify the protocol, appears in the I Select [Fax Settings], and then press the {OK} key. D Select [Send at Specified Time], and then press the {OK} key. receive or print the fax document.
destination display column.
- Specify the IP address as a destination. J Enter the fax number and specify optional settings. E Enter the time using the number keys - Printed reports (4. Confirming Communication Information)
LAN-Fax K Press [End]. and press [AM/PM] to switch between Inform you if a fax has been saved, sent, or failed to be
Using the LAN-Fax Driver, you can send a AM and PM. Then press the {OK} key. transmitted.
document created with a Windows application L Press the {OK} key.
from a computer connected to the machine to F Press the {Escape} key.
M Press the {User Tools/Counter} key. - LAN-Fax features - Sending a fax from a computer
another fax machine. To use LAN-Fax, install the
LAN-Fax Driver on your computer. N You will get a message ‘Settings have been updated...’. Press [Exit]. G Specify a destination, and then press the {Start} key. (5. Fax via Computer)

Copyright © 2008 Printed in China EN USA D069-7104


Chapter references in this guide refer to the bundled OI CD; Facsimile Reference.

StellaC4_FaxQR_F1-EN.indd 1 12/8/2008 8:07:24 PM


Operating Instructions
Facsimile Reference

1 Transmission
2 Other Transmission Features
3 Reception
4 Confirming Communication Information
5 Fax via Computer
6 Fax Features
7 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................7
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Names of Major Functions..........................................................................................................................10
Notes............................................................................................................................................................10
Laws and Regulations......................................................................................................................................11
Legal Prohibition..........................................................................................................................................11
Important Safety Instructions.......................................................................................................................11
Notes to users in the United States of America..........................................................................................12
Notes to users in Canada...........................................................................................................................13
Reading the Display.........................................................................................................................................14
Reading the Display Panel and Using Keys...............................................................................................14
1. Transmission
Transmission Modes.........................................................................................................................................17
Selecting Type of Transmission...................................................................................................................18
Memory Transmission..................................................................................................................................19
Immediate Transmission...............................................................................................................................24
IP-Fax Functions................................................................................................................................................27
Terminology..................................................................................................................................................29
Notes on Using IP-Fax.................................................................................................................................29
Functions Not Available for IP-Fax Transmission......................................................................................30
Internet Fax Functions.......................................................................................................................................31
Notes on Using Internet Fax........................................................................................................................32
Functions Not Available for Internet Fax Transmission.............................................................................33
Functions Not Available for Internet Fax Reception..................................................................................34
E-mail Subject...............................................................................................................................................34
T.37 Full Mode.............................................................................................................................................34
Placing Originals..............................................................................................................................................36
Acceptable Original Sizes..........................................................................................................................37
Paper Size and Scanned Area...................................................................................................................38
Detecting Blank Sheet..................................................................................................................................39

1
Scan Settings....................................................................................................................................................41
Original Type...............................................................................................................................................41
Resolution.....................................................................................................................................................42
Image Density (Contrast).............................................................................................................................43
Mixing Scan Settings for a Multiple Page Original..................................................................................44
Specifying a Destination..................................................................................................................................46
Sending over a Fax Line..............................................................................................................................46
Sending by IP-Fax........................................................................................................................................49
Sending to an E-mail Address.....................................................................................................................53
Using the Quick Dial Keys...........................................................................................................................58
Checking the Specified Destination............................................................................................................60
Redial............................................................................................................................................................62
Preventing Transmission to the Wrong Destination...................................................................................63
Programming Destinations in the Address Book............................................................................................66
Registering a Fax Destination......................................................................................................................66
Changing a Fax Destination.......................................................................................................................68
Deleting a Fax Destination..........................................................................................................................71
Programming Destinations from Check Destination Screen.....................................................................72
Programming Destinations from Redial Screen.........................................................................................73
Searching for a Destination in the Address Book..........................................................................................75
Search by Name..........................................................................................................................................75
Search by Destination List............................................................................................................................77
Search by Registration Number.................................................................................................................79
Search by Fax Number...............................................................................................................................80
Search by E-mail Address...........................................................................................................................82
Search by IP-Fax Destination......................................................................................................................84
Search by LDAP Server...............................................................................................................................86
On Hook Dial...................................................................................................................................................90
Manual Dial......................................................................................................................................................92
Canceling a Transmission................................................................................................................................93
Before the Original Is Scanned..................................................................................................................93
While the Original Is Being Scanned.........................................................................................................93
While the Original Is Being Transmitted....................................................................................................94

2
Before the Transmission Is Started..............................................................................................................95
Checking the Storage Result (Memory Storage Report)...............................................................................97
Setting Transmission Function Defaults (Home Position)...............................................................................98
2. Other Transmission Features
Sending at a Specific Time (Send Later)........................................................................................................99
Sender Settings..............................................................................................................................................101
E-mail Options...............................................................................................................................................104
Entering the Subject...................................................................................................................................104
Requesting a Reception Notice................................................................................................................105
Fax Header Print............................................................................................................................................108
Label Insertion................................................................................................................................................110
Setting SUB Codes for Transmission............................................................................................................112
Setting a Password....................................................................................................................................114
Setting SEP Codes for Reception..................................................................................................................116
Entering a Password..................................................................................................................................118
SEP Code RX Reserve Report...................................................................................................................118
SEP Code RX Result Report.......................................................................................................................118
Two-Sided Transmission (Double-Sided Transmission)..............................................................................120
3. Reception
Types of Reception........................................................................................................................................123
Immediate Reception.................................................................................................................................123
Memory Reception....................................................................................................................................124
Substitute Reception..................................................................................................................................124
Reception Modes...........................................................................................................................................128
Auto Switch................................................................................................................................................128
Manual Reception.....................................................................................................................................128
Auto Reception..........................................................................................................................................129
Switching the Reception Mode................................................................................................................129
Receiving E-mail.............................................................................................................................................131
Receiving Internet Fax Documents...........................................................................................................132
Mail to Print................................................................................................................................................135
Reception Functions.......................................................................................................................................137
Forwarding Received Documents............................................................................................................137

3
SMTP Reception Using Internet Fax.........................................................................................................138
JBIG Reception..........................................................................................................................................141
Auto Fax Reception Power-Up.................................................................................................................141
Printing Options.............................................................................................................................................143
Print Completion Beep..............................................................................................................................143
Checkered Mark.......................................................................................................................................143
Center Mark...............................................................................................................................................143
Reception Time..........................................................................................................................................144
Two-Sided Printing....................................................................................................................................144
Combine Two Originals............................................................................................................................146
Page Separation and Length Reduction .................................................................................................146
TSI Print (Transmitting Subscriber Identification Print).............................................................................147
If There Is No Paper of the Correct Size..................................................................................................148
4. Confirming Communication Information
Printing a List of Files in Memory (Print TX Standby File List)......................................................................151
Printing a File from Memory..........................................................................................................................153
Checking the Transmission Result (TX File Status)........................................................................................155
Confirming on Display..............................................................................................................................155
Confirming by Report................................................................................................................................156
Confirming by E-mail.................................................................................................................................157
Confirming by Report and E-mail.............................................................................................................158
Communication Result Report (Memory Transmission)..........................................................................158
Immediate TX Result Report (Immediate Transmission)...........................................................................159
Communication Failure Report.................................................................................................................159
Checking the Reception Result (RX File Status)............................................................................................161
Confirming on Display..............................................................................................................................161
Confirming by Report................................................................................................................................162
Printing the Journal.........................................................................................................................................163
Journal........................................................................................................................................................164
Transmitting Journal by E-mail..................................................................................................................166
Printing a File Received with Memory Lock.................................................................................................168
5. Fax via Computer
Sending Fax Documents from Computers....................................................................................................171

4
Before Use.................................................................................................................................................172
Using the Software....................................................................................................................................172
Installing Individual Applications.............................................................................................................174
Setting LAN-Fax Driver Properties...........................................................................................................175
Basic Transmission.....................................................................................................................................176
Specifying Options....................................................................................................................................180
Checking Transmission Using LAN-Fax Driver........................................................................................183
Confirming Transmission Results by E-mail..............................................................................................183
LAN-Fax Result Report..............................................................................................................................184
Printing and Saving...................................................................................................................................185
Editing Address Book................................................................................................................................185
Editing Fax Cover Sheets..........................................................................................................................187
Managing Facsimile Functions Using SmartDeviceMonitor for Admin................................................189
Using the Machine's Address Book as the LAN-Fax Destination List....................................................189
LAN-Fax Operation Messages................................................................................................................191
Viewing Fax Information Using a Web Browser.........................................................................................192
Viewing, Printing, and Deleting Received Fax Documents Using Web Image Monitor.....................192
Programming Destination Information from Web Browser....................................................................194
6. Fax Features
Accessing User Tools.....................................................................................................................................197
Changing Default Settings........................................................................................................................197
Quitting User Tools....................................................................................................................................198
General Settings/Adjust...............................................................................................................................199
Reception Settings..........................................................................................................................................201
E-mail Settings................................................................................................................................................203
IP-Fax Settings................................................................................................................................................205
Administrator Tools........................................................................................................................................208
Memory File Transfer.....................................................................................................................................212
Reception File Setting....................................................................................................................................214
Specifying Automatic Deletion of Incoming Faxes when an Error Occurs...........................................215
Reception Report e-mail............................................................................................................................216
Registering Fax Information..........................................................................................................................217
Registering Fax Information......................................................................................................................218

5
Deleting Fax Information...........................................................................................................................220
Forwarding.....................................................................................................................................................222
Programming an End Receiver.................................................................................................................223
Quitting the Forwarding Function.............................................................................................................224
Forwarding Mark......................................................................................................................................225
Parameter Settings.........................................................................................................................................226
User Parameter List....................................................................................................................................226
Changing the User Parameters................................................................................................................234
Printing the Parameter Settings List...........................................................................................................235
Home Position................................................................................................................................................237
Home Position Parameter List....................................................................................................................237
Changing the Home Position....................................................................................................................238
Program Special Sender...............................................................................................................................241
Authorized Reception................................................................................................................................242
Forwarding.................................................................................................................................................243
Memory Lock.............................................................................................................................................243
2 Sided Print...............................................................................................................................................244
Programming/Changing Special Senders..............................................................................................244
Programming Initial Set Up of a Special Sender....................................................................................249
Deleting a Special Sender........................................................................................................................250
Printing Special Sender List.......................................................................................................................251
7. Appendix
Optional Equipment.......................................................................................................................................253
Handset......................................................................................................................................................253
Specifications.................................................................................................................................................254
Specifications Required for the Internet Fax Destination Machines......................................................256
Maximum Values...........................................................................................................................................258
Trademarks.....................................................................................................................................................260
INDEX...........................................................................................................................................................263

6
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product name General name

DeskTopBinder Lite and DeskTopBinder Professional*1 DeskTopBinder

*1 Optional

8
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

9
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine’s functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.

Names of Major Functions

This section tells you the names of this machine's major functions.
• Internet Fax (by specifying an e-mail address) Internet Fax
• Internet Fax (by specifying an IP address) IP-Fax

Notes

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

10
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.

Important Safety Instructions

When using your telephone equipment, basic safety precautions should always be followed to reduce the
risk of fire, electric shock and injury to persons, including the following:
• Do not use this product near water, for example, near a bath tub, wash bowl, kitchen sink or laundry
tub, in a wet basement or near a swimming pool.
• Avoid using a telephone during an electrical storm. There may be a remote risk of electric shock from
lightning.
• Do not use a telephone in the vicinity of a gas leak to report the leak.
• Use only the power cord and batteries indicated in this manual. Do not dispose of batteries in a fire.
They may explode. Check with local codes for possible special disposal instructions.
Save these instructions.

IMPORTANTES MESURES DE SÉCURITÉ


Certaines mesures de sécurité doivent être prises pendant l'utilisation de material téléphonique afin de
réduire les risques d'incendie, de choc électrique et de blessures. En voici quelques-unes:
• Ne pas utiliser l'appareil près de l'eau, p.ex., près d'une baignoire, d'un lavabo, d'un évier de cuisine,
d'un bac à laver, dans un sous-sol humide ou près d'une piscine.
• Éviter d'utiliser le téléphone (sauf s'il s'agit d'un appareil sans fil) pendant un orage électrique. Ceci
peut présenter un risque de choc électrique causé par la foudre.
• Ne pas utiliser l'appareil téléphonique pour signaler une fuite de gaz s'il est situé près de la fuite.
• Utiliser seulement le cordon d'alimentation et le type de piles indiqués dans ce manual. Ne pas jeter
les piles dans le feu: elles peuvent exploser. Se conformer aux règlements pertinents quant à
l'élimination des piles.

11
Conserver ces instructions.

Notes to users in the United States of America

FCC Requirements
1. This equipment complies with Part 68 of the FCC rules and requirements adopted by the ACTA. On
the cover of this equipment is a label that contains, among other information, a product identifier in
the format US:AAAEQ##TXXXXX. If requested, this number must be provided to the telephone
company.
2. This equipment uses the RJ11C USOC jack.
3. A plug and jack used to connect this equipment to the premises wiring and telephone network must
comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant
telephone cord and modular plug is provided with this product. It is designed to be connected to a
compatible modular jack that is also compliant. See installation instructions for detail.
4. The REN is used to determine the number of devices that may be connected to a telephone line.
Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming
call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the
number of devices that may be connected to a line, as determined by the total RENs, contact the local
telephone company. The REN for this product is part of the product identifier that has the format
US:AAAEQ##TXXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03
is a REN of 0.3).
5. If this equipment causes harm to the telephone network, the telephone company will notify you in
advance that temporary discontinuance of service may be required. But if advance notice is not
practical, the telephone company will notify the customer as soon as possible. Also, you will be
advised of your right to file a complaint with the FCC if you believe it is necessary.
6. The telephone company may make changes in its facilities, equipment, operations or procedures that
could affect the operation of the equipment. If this happens the telephone company will provide
advance notice in order for you to make necessary modifications to maintain uninterrupted service.
7. If trouble is experienced with this equipment, for repair or warranty information, please contact Ricoh
Americas Corporation Customer Support Department at 1-800-FASTFIX. If this device is causing
problems with your telephone network, the telephone company may request that you disconnect the
equipment until the problem is resolved.
8. In the event of operation problems (document jam, copy jam, communication error indication), see
the manual provided with this machine for instruction on resolving the problem.
9. Connection to party line service is subject to state tariffs. Contact the state public utility commission,
public service commission or corporation commission for information.

12
10. If your home has specially wired alarm equipment connected to the telephone line, ensure the
installation of this equipment does not disable your alarm equipment. If you have questions about
what will disable alarm equipment, consult your telephone company or a qualified installer.
WHEN PROGRAMMING EMERGENCY NUMBERS AND/OR MAKING TEST CALLS TO
EMERGENCY NUMBERS:
1. Remain on the line and briefly explain to the dispatcher the reason for the call before hanging
up.
2. Perform such activities in the off-peak hours, such as early morning hours or late evenings.

Notice about the Telephone Consumer Protection Act (Valid in USA only)
The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or
other electronic device, including FAX machines, to send any message unless such message clearly contains
in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date
and time it is sent and an identification of the business or other entity, or other individual sending the message
and the telephone number of the sending machine or such business, other entity, or individual. (The
telephone number provided may not be a 900 number or any other number for which charges exceed
local or long-distance transmission charges.)
In order to program this information into your FAX machine, you should complete the following steps: Follow
the FAX HEADER programming procedure in the Programming chapter of the operating instructions to enter
the business identification and telephone number of the terminal or business. This information is transmitted
with your document by the FAX HEADER feature. In addition to the information, be sure to program the
date and time into your machine.

Notes to users in Canada

This product meets the applicable Industry Canada technical specifications.


The Ringer Equivalence Number is an indication of the maximum number of devices allowed to be
connected to a telephone interface. The termination on an interface may consist of any combination of
devices subject only to the requirement that the sum of the RENs of all the devices does not exceed five.

13
Reading the Display
This section explains how to use the keys on the control panel and screen items.
The display guides you through operations, shows messages, machine status, and destinations registered
in the destination lists.
If you press the [Clear Modes] key during operation, the standby screen appears.
Press the [OK] key to complete the settings.
Press the [Escape] key to return to the previous screen.

• This machine automatically returns to standby mode if you do not use the machine for a certain period
of time. You can select the period using the Facsimile Auto Reset Timer in System Settings.
• The Fax Features menu includes a user parameter setting (switch 17, bit 3) that enables you to
configure the machine to return to standby mode whenever it finishes scanning an original, see
“Parameter Settings”.
• To return to the standby screen manually, do one of the following:
• If you have placed the original in the Auto Document Feeder (ADF) and have not pressed the
[Start] key, remove the original.
• If you have not placed an original, press the [Clear Modes] key.
• If you are in User Tools mode, press the [User Tools/Counter] key.

• p.226 "Parameter Settings"

Reading the Display Panel and Using Keys

This section explains screen items and their corresponding keys.

BRJ023S

1. Selection keys
Correspond to items at the bottom line on the display.

14
Example: The standby display
• When the instruction “Press [ ]” appears in this manual, press the left selection key.
• When the instruction “Press [Tone]” appears in this manual, press the middle selection key.
• When the instruction “Press [TX Mode]” appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press this to set numeric values, make settings, or select an entered item.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ], [ ], [ ], or [ ] appears in this manual, press the scroll key of the same direction.

BAM005S

1. Machine status and message


2. Destination entry
3. Selection keys
4. Switches the destination type between (fax or IP-Fax) and (Internet Fax).
To specify fax numbers or IP-Fax destinations, select .
To specify Internet Fax destinations (e-mail addresses), select .
5. Selectable items

• The display will differ depending on installed optional units.


• You can change Internet Fax setting under E-mail Settings in the Fax Features menu. See “E-mail
Settings”.
• You can change IP-Fax settings under IP-Fax Settings in the Fax Features menu. See “IP-Fax Settings”.

15
• p.203 "E-mail Settings"
• p.205 "IP-Fax Settings"

16
1. Transmission
This section explains basic transmission operations such as specifying a transmission mode or a destination.

1
Transmission Modes
There are two types of transmission: Memory Transmission and Immediate Transmission.

• It is recommended that you call the receivers and confirm with them when sending important
documents.
Memory Transmission
Transmission starts automatically after the original is stored in memory. This is convenient when you
are in a hurry and want to take the document away with you. You can also send the same original to
several destinations. For details about a broadcast and Parallel Memory Transmission, see “Parallel
Memory Transmission” and “Broadcast sequence”.

BBB013S

Immediate Transmission
Immediately dials the destination number, and while scanning the original, sends to it. It is very
convenient when you want to send an original quickly or when you want to check the destination you
are sending to. When using this type of transmission, the original is not stored in memory. You can
only specify one destination.

BBB014S

Normally the machine is in the Memory Transmission mode. To switch the mode to Immediate Transmission,
press the [Memory Trans.] key.

17
1. Transmission

BRJ024S

Check the indicator on the operation panel to see which mode is currently active.
If it is not lit, Immediate Transmission mode is set.

• You can set the machine to enter Memory Transmission mode or Immediate Transmission mode right
after the power is turned on or whenever the [Clear Modes] key is pressed. See “Setting Transmission
Function Defaults (Home Position)”.

• p.22 "Parallel Memory Transmission"


• p.23 "Broadcasting sequence"
• p.98 "Setting Transmission Function Defaults (Home Position)"

Selecting Type of Transmission

You can select the transmission type: standard fax, IP-Fax, or Internet Fax.

• To select IP-Fax destinations or Internet Fax destinations, the Hard Disk Drive Option and printer/
scanner functions must be installed. The display differs depending on whether or not the Hard Disk
Drive Option and printer/scanner functions are installed.
When sending over a fax line
Press [ ] to display in the destination display column.

When sending to an e-mail address


Press [ ] to display in the destination display column.

18
Transmission Modes

1
When sending by IP-Fax
To send by IP-Fax, specify the protocol. After you specify the protocol, appears in the destination
display column.
If you are using a gatekeeper server, select H.323.
If you are using a SIP server, select SIP.

• For details about IP-Fax or Internet Fax transmission, see “IP-Fax Functions” and “Internet Fax
Functions”.

• p.27 "IP-Fax Functions"


• p.31 "Internet Fax Functions"

Memory Transmission

Memory Transmission mode has standard fax, Internet Fax, and IP-Fax.

• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the Operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• If memory is full (0% appears on the top right corner of the display), Memory Transmission is disabled.
Use Immediate Transmission instead.

19
1. Transmission

1. Make sure that Memory Trans. indicator lights.

BRJ024S

Normally Memory Transmission mode is selected.


If it is not, Immediate Transmission mode is selected. Press the [Memory Trans.] key.
2. Place the original into the ADF.
3. Make the scan settings you require.
For details about the scan settings, see “Scan Settings”.
4. Using the number keys or a Quick Dial key, specify a destination.

If you make a mistake, press the [Clear/Stop] key, and then enter the correct number.
5. When sending the same original to several destinations (broadcasting), press [Add Dest]
to specify the destinations.

You do not have to press [Add Dest] when adding a destination using the destination list.
6. Specify the next destination.

Pressing [ ] switches the destination type between and .

20
Transmission Modes

A fax number, e-mail address and IP-Fax destination can be specified simultaneously.
7. Press the [Start] key.

• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”. 1
• If the combined total number of programmed destinations exceeds the maximum value, only
Immediate Transmission is possible.
• For the maximum values of the following items, see “Maximum Values”.
• Number of documents you can store in memory for Memory Transmission
• Number of pages you can store in memory (using A4 Standard <ITU-T 1 Chart>)
• Number of destinations you can specify per file
• Number of destinations you can specify for all files (including files in memory)

• p.41 "Scan Settings"


• p.58 "Using the Quick Dial Keys"
• p.258 "Maximum Values"

Sending originals using the exposure glass (Memory Transmission)


This section explains how to send originals by Memory Transmission using the exposure glass.

1. Make sure that Memory Trans. indicator lights.


2. Place the first page of the original face down on the exposure glass.
3. Specify a destination.

4. Make the scan settings you require.


5. Press the [Start] key.
The machine starts scanning.
6. Place the next original on the exposure glass within 60 seconds when you send multiple
originals, and then repeat steps 4 and 5.
Repeat this step for each page.

21
1. Transmission

1
7. Press the [ ] key.
The machine dials the destination and starts transmission.

Parallel Memory Transmission


This function dials while the original is being scanned.
Standard Memory Transmission stores the original in memory, and then dials the destination. However,
Parallel Memory Transmission allows you to confirm the connection status quickly. In addition, this function
scans the original faster than Immediate Transmission. This is useful when you are in a hurry and need to
use the original for another purpose.

• Standard Memory Transmission is used instead of Parallel Memory Transmission in the following
cases:
• When the line is busy and could not be connected to
• With Send Later
• When you store an original for Memory Transmission while another communication is in progress
• When two or more destinations are specified
• When an original is placed on the exposure glass, and then sent

• You can turn this function on or off with the User Parameter (switch 07, bit 2) in the Fax Features menu,
see “Parameter Settings”.
• Standard Memory Transmission may be used instead of Parallel Memory Transmission if there is not
enough free memory left.
• If you use this function, the Memory Storage Report will not be printed.
• If the [Clear/Stop] key is pressed, the original jams or memory runs out, Parallel Memory Transmission
will stop. The Communication Result Report is printed and files are deleted.
• When using Parallel Memory Transmission, only the page number is printed on the header of the fax,
the total number of originals is not automatically printed.

• p.226 "Parameter Settings"

22
Transmission Modes

Automatic Redial
If a fax document could not be sent because the line was busy or an error occurred during transmission,
redial is attempted at five-minute intervals up to five times.
If redialing fails after four redials, the machine cancels the transmission and prints a Communication Result 1
Report or Communication Failure Report.

• If there are a large number of files stored in memory, documents might not be sent in the order they
were scanned.

Dual Access
The machine can scan other documents into memory even while sending a fax document from memory,
receiving a document into memory, or automatically printing a report.
Since the machine starts sending the second document immediately after the current transmission ends, the
line is used efficiently.

• During Immediate Transmission or when in User Tools mode, the machine cannot scan an original.

Broadcasting sequence
Use the broadcasting function to send the same original to multiple destinations simultaneously.
To specify multiple destinations, specify the first destination, and then specify the next destination by pressing
[Add Dest].
If you dial several destinations for the same document (broadcasting), the documents are sent in the order
in which they were dialed. If the fax document could not be transmitted, the machine redials that destination
after the last destination specified for broadcasting. For example, if you specify four destinations, A through
D, for broadcasting, and if the lines to destinations A and C are busy, the machine dials the destinations
in the following order: A, B, C, D, A, and C.
To check the transmission progress, print the TX file list. See “Printing a List of Files in Memory (Print TX
Standby File List)”.
If you specify a second transmission while broadcasting to several destinations, faxes are transmitted
alternately to each remaining destination in the current and second broadcast.
For example, if you specify a broadcast to destinations A and B, and then specify a broadcast to destinations
C and D while transmission to destination A is in progress, the machine sends the faxes in the following
order: A, C, B, and then D.
If the previous file and the next file are both on standby, these are also sent in the same order.

23
1. Transmission

• To avoid accidentally specifying multiple destinations, you can disable broadcasting. You cannot
specify group destinations if you disable broadcasting. You can specify only one address at a time.
1 For details about how to disable broadcasting, contact your service representative.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.

• p.151 "Printing a List of Files in Memory (Print TX Standby File List)"


• p.226 "Parameter Settings"

If memory runs out while storing an original


If you run out of memory while storing an original (free space reaches 0%), scanning will be stopped.
If this happens, the "Memory is full. Scanning will be stopped and only scanned page(s) will be stored."
message appears.
Press [Exit] to transmit stored pages only.

• When this happens, only the scanned pages are sent. If you want to delete the scanned pages and
cancel transmission in this case, contact your service representative.

ECM (Error Correction Mode)


If part of a transmission fails because of a line problem, the lost data is automatically resent.

• For this function to work, the other machine must have ECM.
• This function is not available with Internet Fax.

Immediate Transmission

Immediate Transmission is possible with standard fax transmission and IP-Fax transmission.

• Internet Fax is performed using only Memory Transmission, which automatically starts transmission
after storing documents in memory.

24
Transmission Modes

• If you specify an Internet Fax destination after selecting Immediate Transmission, the mode
switches to Memory Transmission.
• If you try to select Immediate Transmission after specifying an Internet Fax destination, the "Dest.
and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].
1
• Group cannot be used for Immediate Transmission. You cannot send the same document to multiple
destinations (broadcasting).
• If you specify a second destination or a group after selecting Immediate Transmission, the mode
switches to Memory Transmission.
• If you try to select Immediate Transmission after specifying multiple destinations or a group, the
"Dest. and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].

1. Make sure that Memory Trans. indicator is not lit.

BRJ024S

If it is lit, Memory Transmission mode is selected. Press the [Memory Trans.] key.
2. Place the original into the ADF.
3. Select the scan settings you require.
For details about the scan settings, see “Scan Settings”.
4. Using the number keys or a Quick Dial key, specify a destination.

If you make a mistake, press the [Clear/Stop] key, and then enter the correct number.
5. Press the [Start] key.
The machine dials a destination.

25
1. Transmission

• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• Documents are not stored in memory.
1
• p.41 "Scan Settings"
• p.58 "Using the Quick Dial Keys"

Sending originals using the exposure glass (Immediate Transmission)


This section explains how to send originals by Immediate Transmission using the exposure glass.

1. Make sure that Memory Trans. indicator is not lit.


2. Place the first page face down on the exposure glass.
3. Specify a destination.

4. Make the scan settings you require.


5. Press the [Start] key.
The machine dials the destination.
6. Place the next original on the exposure glass within 10 seconds when you send multiple
originals, and then repeat steps 4 and 5.
Repeat this step for each page.

7. Press the [ ] key.

26
IP-Fax Functions

IP-Fax Functions
The IP-Fax function sends or receives documents between two facsimiles directly via a TCP/IP network.
This function has the following advantages and is suitable for communication within the same LAN: 1
• Reducing communication costs
• Communicating between IP-Faxes at higher speed than by standard fax
IP-Fax uses SIP and H.323 as the network protocol.
Specify an IP address or host name instead of a fax number for sending. When using a gatekeeper, specify
an alias telephone number. When using a SIP server, you can send by specifying SIP user name. Specify
addresses of the gatekeeper or SIP server (proxy server, registrar server, redirect server) as appropriate
under H.323 Settings, SIP Settings, or Gateway Settings in the Fax Features menu.
You can also transmit to a G3 facsimile connected to the public switched telephone network (PSTN) via a
gateway (T.38-compliant).
You can receive IP-Faxes in the same manner as standard faxes. For details about reception, see “Types
of Reception”.

27
1. Transmission

BBB015S

• To use IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions must be installed.
• To use IP-Fax functions, this machine must be connected to a LAN and its IP-Fax settings correctly
specified under IP-Fax Settings in Fax Features. For details about these settings, see “IP-Fax Settings”.
• Before using this function, configure the network in the System Settings menu. For details about the
required settings, see “Connecting the Machine”, Network and System Settings Guide.

• IP-Fax supported by this machine is ITU-T Recommendation T.38 compliant.

28
IP-Fax Functions

• SIP allows you to transmit and receive documents over an IPv6 network.
• For details about H.323 Settings, SIP Settings, or Gateway Settings, see “IP-Fax Settings”.
• This function supports both IPv4 and IPv6 addresses.
1
• p.123 "Types of Reception"
• p.205 "IP-Fax Settings"

Terminology

This section introduces you to useful IP-Fax-related terminology.


H.323
A multimedia communication protocol that sends or receives files via one-to-one communication over
a LAN or the Internet.
SIP
A communication control protocol for Internet telephone that utilizes VoIP (which converts voice
information to IP packets) and is equipped with functions such as creating, modifying, and terminating
sessions with one or more participants.
Gatekeeper (VoIP gatekeeper)
A gatekeeper manages devices connected to an IP network and converts alias telephone numbers
to IP addresses and performs authentication functions. In addition, a gatekeeper governs band
(transmission rate assignment) and access control.
SIP server
A SIP server mediates connection requests between devices connected to an IP network and is
composed mainly of servers that have the following three functions:
• Proxy server: Receives SIP requests and forwards them on behalf of the requestor.
• Registrar server: Receives information about a device's address within an IP network and registers
them in the database.
• Redirect server: Used to inquire the destination address.
Gateway (VoIP gateway)
A gateway connecting a telephone network and IP network, it has functions such as protocol
conversion for connecting these different networks, and also connects communication devices
(telephones, facsimiles, etc.) to a LAN or other network.

Notes on Using IP-Fax

This section describes notes on using IP-Fax.

29
1. Transmission

• You may not be able to send to a firewall-protected network.


• You cannot use telephones on a LAN.
• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
1 twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.

Functions Not Available for IP-Fax Transmission

This section tells you which functions are not available for IP-Fax transmission.
You can use the following functions with standard fax transmission, but not IP-Fax transmission:
• On Hook Dial
• Manual Dial

30
Internet Fax Functions

Internet Fax Functions


This machine converts scanned document images to e-mail format and transmits the data over the Internet.
The e-mail sent by this machine can be received by another Internet Fax machine. 1
Instead of dialing the telephone number of the destination you want to send to, you enter the relevant e-
mail address.
You can also print or forward received e-mail messages.

BHP003S

• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To use Internet Fax functions, this machine must be connected to a LAN and set up correctly under
“System Settings”. For details about the required settings, see “Connecting the Machine”, Network
and System Settings Guide.
• To send Internet Fax documents, in the Fax Features menu, under E-mail Settings, set [Internet Fax
Settings] to [On]. However, documents can still be forwarded or delivered to Internet Fax destinations
even if [Off] is selected. See “E-mail Settings”.
• To receive Internet Fax documents, in the System Settings menu, under File Transfer, set Fax E-mail
Account to [Receive]. See “System Settings”, Network and System Settings Guide.

• The Internet Fax function supported by this machine is compliant with ITU-T Recommendation T.37.

31
1. Transmission

• You can receive e-mail messages with an attached TIFF-F image from computers.
• Though Internet Fax documents are normally sent via an SMTP server, you can also send Internet Fax
documents directly to their destinations without going through an SMTP server. To do this, set whether

1 or not to bypass the SMTP server from [TX Mode]. For details about using this function, see “Bypassing
the SMTP server”.
• When sending Internet Fax documents, you can specify “Attach Subject” and “Return Receipt” in [TX
Mode]. For details about setting these options, see “E-mail Options”.
• You can limit the size of transmitted e-mail messages in “Maximum E-mail Size” of “Fax Features”.
For details about the setting, see “E-mail Settings”.
• See “Received images” for how e-mail is actually received by the computer.
• For details about how to confirm the transmission result, see “Checking the Transmission Result (TX
File Status)”.
• If you send Internet Fax documents specifying a user code, and the e-mail address is set as the routing
destination of the specified user code, a Communication Result Report is sent after the transmission is
completed. This makes it possible to verify the result of a transmission.
• The CC function is disabled.
• This function supports both IPv4 and IPv6 addresses.

• p.56 "Bypassing the SMTP server"


• p.104 "E-mail Options"
• p.134 "Received images"
• p.155 "Checking the Transmission Result (TX File Status)"
• p.203 "E-mail Settings"

Notes on Using Internet Fax

This section describes notes on using Internet Fax.


• When using the Internet Fax function, originals are sent at A4 size. Originals larger than A4 are
reduced to A4 size. If the receiver's machine is compliant with the T.37 full mode, originals are sent
at the size specified in the Address Book.
• When using Internet Fax transmission, documents are sent at “Detail” resolution, even if you have
specified “Fine”. To send a document at “Fine”, configure the Full Mode when registering the
destinations in the Address Book.
• If a transmission is not successful, this machine usually receives error notification e-mail. However,
error notification e-mail may not be transmitted for various reasons. It is recommended that you confirm
receipt of important document by calling the other party.

32
Internet Fax Functions

• The level of security for Internet communications is low. It is recommended that you use the telephone
network for confidential communications.
• Voice communication is not supported over a LAN.
• Internet Fax delivery might be delayed due to network congestion. Use Internet Fax transmission that
bypasses the SMTP server, a public telephone line fax, or IP-Fax whenever communication time is a
1
concern. For details about the SMTP server-bypass function, see “Bypassing the SMTP server”.
• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• You may not be able to send large files as e-mail, depending on e-mail environment conditions.
• When available memory is low, you may not be able to send Internet Fax documents.
• Because the machine sends documents as e-mail messages with an attached TIFF-F image, viewer
applications are required in order to view documents when they are received on a computer.
• With a large volume of document, it may take some time before transmission starts. This is due to the
time the machine requires to convert the data in memory.
• POP before SMTP is available in IPv4 environments only.

• For details about the T.37 full mode, see “T.37 Full Mode”.

• p.34 "T.37 Full Mode"


• p.56 "Bypassing the SMTP server"

Functions Not Available for Internet Fax Transmission

This section tells you which functions are not available for Internet Fax transmission.
The following functions are supported with standard fax transmission, but not with Internet Faxing.
• Immediate Transmission
• Transmission by SUB Code
• On Hook Dial
• Manual Dial
• JBIG Transmission
• ECM (Error Correction Mode)
• Memory File Transfer

33
1. Transmission

Functions Not Available for Internet Fax Reception

This section tells you which functions are not available for Internet Fax reception.

1 The following functions are available for standard fax reception, but not for Internet Faxing:
• Memory Lock Reception
• SEP Code reception
• Authorized Reception

E-mail Subject

If you do not enter a subject when sending e-mail, a subject will be auto generated. This section explains
how to specify the content of auto-generated subjects.
Subjects differ depending on Stamp Sender Name settings. For details about using the Stamp Sender Name
function, see “Sender Settings”.
When Stamp Sender Name is set to on:
From Sender Name(Fax Message NO.xxxx)
When Stamp Sender Name is set to off:
• If Own Fax Number and Own Name are programmed:
From “Own Fax Number”(“Own Name”)(Fax Message NO.xxxx)
• If only Own Fax Number is programmed:
From “Own Fax Number”(Fax Message NO.xxxx)
• If only Own Name is programmed:
From “Own Name”(Fax Message NO.xxxx)
• If neither Own Fax Number nor Own Name are programmed:
Fax Message NO.xxxx

• “xxxx” is the document number that appears in the Journal.

• p.101 "Sender Settings"

T.37 Full Mode

This machine is T.37 full mode compatible. T.37 full mode is an international standard for Internet Fax
transmission. (ITU-T Recommendation, RFC2532)

34
Internet Fax Functions

When an Internet Fax communication is made between T.37 full mode compatible machines, the receiver
side sends the return receipt (dispatched) in response to the reception notice request attached to the sent
e-mail. This return receipt includes the receiver's reception capability information (compression type, paper
size, and resolution). When the receiver is programmed in the Address Book as the full mode destination,
the sender side automatically registers the received information in the Address Book. This allows you to 1
send a subsequent Internet Fax document to that receiver based on this information.
Returning a Return Receipt
When e-mail is received, if the sender requests reception notice, the receiver sends a return receipt
that includes the receiving machine's capability (compression type, paper size, and resolution).
Registering the Received Reception Confirmation Contents
When the sender receives the return receipt that includes the receiver's reception capability, the sender
checks that the final recipient address sent is programmed in the Address Book. If it is programmed
as a full mode destination, the sender automatically registers the receiver's reception capability. The
registered reception capability is updated each time the sender receives new reception capability
information. The sender can send documents to the receiver based on this information.
If the receiver is programmed as the simple mode machine or not programmed in the Address Book,
the receiver's reception capability cannot be registered.
If you know the receiver's reception capability, you can set it manually.
Requesting a Reception Notice
When the receiver's machine supports T.37 full mode and is programmed as a full mode machine in
the Address Book, the machine requests the reception notice from the receiver. Then, the machine will
receive the return receipt (sent) that includes the receiver's reception capability.

• For details about requesting reception notice from this machine, see “Requesting a Reception Notice”.
• Use Web Image Monitor to manually program a receiver's reception capability information. For
details about programming receiver's information, see “Programming Destination Information from
Web Browser”.
• If you use Internet Fax transmission, you can send documents to multiple destinations at once.
However, if you specify full mode destinations, since each destination may have a different reception
capability, transmission is done one by one in the specified transmission order.

• p.105 "Requesting a Reception Notice"


• p.194 "Programming Destination Information from Web Browser"

35
1. Transmission

Placing Originals
Place the original either on the exposure glass or in the ADF.
1 For details about how to place originals, see the following:
• Placing originals on the exposure glass
See “Placing Originals on the Exposure Glass” in “Placing Originals”, Copy Reference.
• Placing originals in the ADF
See “Placing Originals in the ADF” in “Placing Originals”, Copy Reference.

• Do not lift the ADF while using it to scan originals.


How to place A4, B5 JIS (Japanese Industrial Standard), A5, 51/2 × 81/2, 81/2 × 11, and
81/2 × 14 size originals

BKQ004S

How to place A5 and 51/2 × 81/2 size originals

BKQ005S

• Originals that are clipped or creased cannot be scanned using the ADF. For details about originals
that are not recommended for the ADF, see “Originals”, Copy Reference.

36
Placing Originals

• To scan multiple originals using the ADF, set originals in a stack.


• When sending a fax, the image output at the other end depends on the size and orientation of paper
used in the receiver's machine. If the receiver does not use paper of the same size and orientation as
that of the original, the fax image may be reduced in size, trimmed at both edges, or divided across
two or more sheets. When sending an important original, ask the receiver about the size and
1
orientation of the paper in their machine.
• To send an original longer than 356 mm (14 inches), select Long Document mode with the User
Parameters (switch 14, bit 1) in the Fax Features menu. See “Parameter Settings”.
• Documents longer than 1000 mm (39 inches) must be sent by memory transmission (immediate
transmission may not be possible).
• If an original jams, press the [Clear/Stop] key, and then carefully remove the original.
• Make sure that all ink, correcting fluid etc., has completely dried before placing your original. If it is
still wet, the exposure glass will become marked and those marks will appear on the received image.
• You can send the first page from the exposure glass then the remaining pages from the ADF. You
cannot change from the ADF to the exposure glass.
• When using the Internet Fax function, originals are sent at A4 size. Originals larger than A4 are
reduced to A4 size. If the receiver's machine is compliant with the T.37 full mode, originals are sent
at the size specified in the Address Book. See “T.37 Full Mode”.
• Information about this machine is printed at the destination. This information is printed on the side of
the paper that is to your left when placing the documents on the exposure glass or the ADF.
• For acceptable types of originals, see “Acceptable Original Sizes” and “Paper Size and Scanned
Area”.

• p.34 "T.37 Full Mode"


• p.37 "Acceptable Original Sizes"
• p.38 "Paper Size and Scanned Area"
• p.226 "Parameter Settings"

Acceptable Original Sizes

This section describes the size and thickness limitations that apply to originals placed on the exposure glass
or the ADF.

37
1. Transmission

Maximum
Where original is
Acceptable original size number of Paper thickness
set
sheets

1 Exposure glass Up to A4 (210 × 297 mm), 1 sheet


81/ 2 × 14 (216 × 356 mm)

ADF, one-sided A5 to A4 (up to 1200 mm 50 sheets 52-105 g/m2 (14-28 lb)


original long) (80 g/m2,
81/ 2 × 51/ 2 to 81/ 2 × 14 20 lb)

ADF, two-sided A5 to A4 (up to 356 mm long) 50 sheets 64-105 g/m2 (17-28 lb)
original 81/2 × 51/2 to 81/2 × 14 (80 g/m2,
20 lb)

Paper Size and Scanned Area

This section explains the size of the area the machine can scan and detect.

• There may be a difference in the size of the image when it is printed at the destination.
• Even if an original is correctly placed on the exposure glass or in the ADF, a margin of 3 mm (0.1
inch) around each edge of the original may not be sent.
• If the receiver uses paper of a smaller width than the original, the image is reduced to fit that paper.
• Originals placed face down on the exposure glass are scanned at A4 (81/2 × 11). To scan originals
at 81/2 × 14, change the paper size setting with User Parameters (switch 32, bit 1) in the Fax Features
menu. See “Parameter Settings”.

• p.226 "Parameter Settings"

When placing an original on the exposure glass


This section explains how to place an original on the exposure glass.

• If you place an original larger than A4, 81/2 × 14 on the exposure glass, only an A4, 81/2 × 14
area is scanned.
• Maximum scan area
The following shows the maximum scan area:

38
Placing Originals

216 × 356 mm, 81/2 × 14 inches (W × L)

BRJ017S

When placing an original into the ADF


This section explains how to place an original into the ADF.
• Maximum scan area
The following shows the maximum scan area:
Memory Transmission: 216 × 1200 mm, 81/2 × 47 inches (W × L)
Immediate Transmission: 216 × 1200 mm, 81/2 × 47 inches (W × L)

BRJ018S

• During Immediate Transmission, the length of the scanning range can decrease to less than 1200 mm
(47 inches), depending on the resolution of the image and the configuration of the receiving machine.

Detecting Blank Sheet

Upon completion of the first page scanning, an alarm sounds if the page is nearly blank.

• The blank sheet-detecting function works only when an original is scanned using the ADF.

39
1. Transmission

• The blank sheet-detecting function is ineffective for second and subsequent pages.
This function notifies you if an original is placed wrong side down on the scanner. When this happens, a
message appears for a few seconds. The message differs depending on the number of pages to be scanned

1 and transmission mode.


• When sending a document using Immediate Transmission or when all pages have been scanned in
Memory Transmission:

• When some pages are left unscanned in Parallel Memory Transmission or Memory Transmission:

• Even if a near blank sheet is detected, it is transmitted as normal.


• You can turn this function on or off with the User Parameter (switch 11, bit 2) in the Fax Features menu.
See “Parameter Settings”.
• To cancel scanning if a blank sheet is detected, press the [Clear/Stop] key.

• p.226 "Parameter Settings"

40
Scan Settings

Scan Settings
You can configure the scan settings according to the original you are scanning.
You may want to send many different types of fax documents. Some of these may be difficult to reproduce 1
at the receiver's end. However, the machine has three settings that you can adjust to help you transmit the
document with the best possible image quality.
Original Type:
Text, Photo
Resolution:
Standard, Detail, Fine
Image Density (Contrast):
Manual Image Density (five levels)

Original Type

To optimize image clarity, select the appropriate original type.


The following settings for original types are available:
Text
Select Text to send high-contrast black-and-white image originals. Use this setting when you only want
to send clearer text, even if the original contains text and photographs.
Photo
Select Photo to send an original containing a halftone image, such as a photograph or a color original.

1. Press the [Original] key for the type you require.

BRJ025S

Press the [Original] key to switch between Text and Photo.

• If you select Photo, the transmission will take longer than when Text is selected.

41
1. Transmission

• If you send a fax document with Photo and the background of the received image is dirty, reduce the
density setting and resend the fax. For details about setting the image density, see “Image Density
(Contrast)”.

1 • You can set the original type that is selected right after the machine is turned on or whenever the [Clear
Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.

• p.43 "Image Density (Contrast)"


• p.98 "Setting Transmission Function Defaults (Home Position)"

JBIG Transmission
If you use JBIG (Joint Bi-level Image experts Group) compression, you can send originals scanned using
Photo faster than with other compression methods.

• This function is not available with the Internet Fax function.


• This function requires that the other party's fax machine has both the JBIG function and ECM function.

Resolution

Specify the resolution according to the size of the text on the original.
Images and text are scanned into the machine by converting them to a sequence of dots. The density of
the dots determines the quality of the image and how long it takes to transmit. Therefore, images scanned
at high resolution have high quality but transmission takes longer. Conversely, low resolution scanning
results in lower quality but the original is sent more quickly. Select the setting that matches your needs based
upon this trade off between speed and image clarity.
Standard (8 × 3.85 lines/mm, 200 × 100 dpi)
Select for originals containing normal size characters.
Detail (8 × 7.7 lines/mm, 200 × 200 dpi)
Select for originals containing small characters or when you require greater clarity. This resolution is
twice as fine as Standard.
Fine (8 × 15.4 lines/mm)
Select for originals with fine details or when you require the best possible image clarity. This resolution
is four times finer than Standard.

42
Scan Settings

1. Press the [Resolution] key to switch between resolutions.

BRJ026S

The indicators above the key show the current selection.


When both indicators are unlit, Standard is selected.

• If the other party's machine does not support the resolution at which you are sending, this machine
automatically switches to a resolution that is supported. You can check the resolution at which you
actually sent by printing the Journal. For details about printing the Journal, see “Printing the Journal”.
• The machine supports reception at both Standard and Detail resolution.
• You can set the resolution type that is selected right after the machine is turned on or whenever the
[Clear Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.
• When using Internet Fax transmission, documents are sent at “Detail” resolution, even if you have
specified “Fine”. To send a document at “Fine”, configure the Full Mode when registering the
destinations in the Address Book. See “T.37 Full Mode”.

• p.34 "T.37 Full Mode"


• p.98 "Setting Transmission Function Defaults (Home Position)"
• p.163 "Printing the Journal"

Image Density (Contrast)

Adjust the image density at which the originals are scanned.


Use the [Image Density] key to vary the image density within 5 levels.

43
1. Transmission

1. Press the [Lighter] or [Darker] key to change the density from five density levels.

BRJ027S

The image density changes in five increments as follows:

BRH017S

• You can set the image density that is selected right after the machine is turned on or whenever the
[Clear Modes] key is pressed. See “Setting Transmission Function Defaults (Home Position)”.

• p.98 "Setting Transmission Function Defaults (Home Position)"

Mixing Scan Settings for a Multiple Page Original

When sending an original of several pages, you can select a different scan setting for each page.
It is recommended that originals be placed on the exposure glass when mixing scan settings for a multiple
page original.

• If you are using the ADF, do not change the “Resolution” setting while originals are being scanned.
When placing originals on the exposure glass
1. Check which pages you want to scan with different settings.

44
Scan Settings

2. Remove the previous page and place the next page that you checked on the exposure glass.
3. Make the scan settings.
You have about 60 seconds (10 seconds for Immediate Transmission) to make the scan settings.
The time remaining is shown on the display. 1

Adjust the settings for each page before you press the [Start] key.
When placing originals in the ADF
1. Check which pages you want to scan with different settings.
2. Make the scan settings before the page you want to change the settings for starts being scanned.
Depending on what time the scan settings are adjusted, the settings may not be reflected in the
resulting operation.

45
1. Transmission

Specifying a Destination
This section explains how to specify a destination.
1 Fax numbers, IP-Fax destinations, and e-mail addresses can be specified.

• The display shows the percentage of free memory space for storing originals. Since fax numbers, IP-
Fax destinations, and e-mail addresses are programmed in separate memory, dialing fax numbers
using the number keys does not change the percentage on the display.

Sending over a Fax Line

This section explains how to enter a fax number.


Use the number keys on the right side of the control panel to enter numbers.

1. Press [ ] to display .

2. Enter the fax number using the number keys.

If you make a mistake, press the [Clear/Stop] key, and then enter again.
When adding a destination, pressing [ ] switches the destination type between and .
3. Press the [Start] key.
The machine starts to scan the original and stores it in memory. When scanning ends, the
Communicating indicator lights and transmission starts.

• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• You can insert pauses and tones in a fax number. For details, see “Entering a pause” or “Entering a
tone”.
• For the maximum number of digits for a destination, see “Maximum Values”.

46
Specifying a Destination

• p.47 "Entering a pause"


• p.47 "Entering a tone"
• p.58 "Using the Quick Dial Keys" 1
• p.258 "Maximum Values"

Entering a pause
This section explains how to enter a pause.
Press the [Pause/Redial] key when dialing or storing a number to insert a pause of about two seconds.

BRJ028S

• If you press the [Pause/Redial] key at the first digit, the Redial screen appears.
• A pause is shown as a “-” on the display.

• You can also program numbers including pauses in the destination list.

Entering a tone
This function allows a machine connected to a pulse dialing line to send tonal signals (for example if you
want to use a special service on a tone dialing line).
When you press [Tone], the machine dials the number using tonal signals.
This section explains how to use the tone function with On Hook Dial as an example.

47
1. Transmission

1. Press the [On Hook Dial] key.

BRJ029S

2. Enter the fax number using the number keys.

3. Press [Tone].

4. Enter the number you want to tone dial using the number keys.

5. Press the [Start] key.


Transmission starts.
If you want to cancel a transmission, press the [Clear/Stop] key, and then remove the originals.
After transmission, the standby display appears.

• Certain services may be unavailable even when using the Tone function.
• A tone is shown as a “T” on the display and the next numbers are dialed using tonal signals.

48
Specifying a Destination

Sending by IP-Fax

This section explains how to specify a destination using IP-Fax transmission.


When using IP-Fax transmission, specify the IP-Fax destination (IP address, host name, or alias telephone 1
number) in place of the fax number.

• To use IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions must be installed.
• To send an IP-Fax document, in the Fax Features menu, configure the IP-Fax Settings as follows. For
details about IP-Fax Settings, see “IP-Fax Settings”.
• If you are using a gatekeeper server, set [Enable H.323] to [On] and configure the gatekeeper
settings under [H.323 Settings].
• If you are using a SIP server, set [Enable SIP] to [On] and configure the SIP server settings under
[SIP Settings].

1. Press [TX Mode].

2. Select [Select Line] using [ ] or [ ], and then press the [OK] key.

3. Select [H.323] or [SIP] using [ ] or [ ], and then press the [OK] key.

4. Press the [Escape] key.


The standby screen appears.

49
1. Transmission

5. Press [Manual].

1
6. Enter the IP-Fax destination, and then press the [OK] key.

If you enter an incorrect character, press the [Clear/Stop] key. Then, re-enter the characters correctly.
To change the IP-Fax destination after pressing the [OK] key, press [EditDest], re-enter an IP-Fax
destination, and then press the [OK] key.

7. To add a destination, press [Add Dest].

8. Specify the next destination.

To add another destination, repeat steps 7 and 8.


Pressing [ ] switches the destination type between and .
9. Press the [Start] key.
The machine starts to scan the original and stores it in memory. When scanning ends, the
Communicating indicator lights and transmission starts.

50
Specifying a Destination

• Depending on the security settings, [Manual] might not appear and you might not be able to enter
the IP-Fax destination.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”. 1
• For a list of gateways (T.38-compliant), gatekeepers, or SIP servers that are certified as operable with
this machine, contact your local retail or service representative.
• Methods of entering a destination vary depending on the network settings made by the administrator.
Ask the machine administrator for details. For details about entering the IP-Fax destination, see “When
using a gatekeeper server or SIP server”.
• For details about text entry, see “Entering Text”, About This Machine.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.
• You can program one of the User Function keys with operations for Select Line. User Function keys
allow you to omit steps 1, 2, and 4. For details about the User Function keys, see “General Settings/
Adjust”.
• For the maximum number of digits for a destination, see “Maximum Values”.

• p.51 "When using a gatekeeper server or SIP server"


• p.58 "Using the Quick Dial Keys"
• p.199 "General Settings/Adjust"
• p.205 "IP-Fax Settings"
• p.226 "Parameter Settings"
• p.258 "Maximum Values"

When using a gatekeeper server or SIP server


The IP-Fax destination details that you must specify vary depending on the machine's configuration and
the configuration of the network to which it is connected.
Depending on this machine's configuration, specify the IP-Fax destination as follows:
When not using a gatekeeper/SIP server
• From IP-Fax to IP-Fax
Specify the IP address or host name of the receiving machine.
Example: 192.168.1.10 (IP address)
Example: IPFAX1 (host name)

51
1. Transmission

• From IP-Fax to G3 fax


Specify the G3 fax telephone number of the receiving machine.
Example: 0312345678
1 When using a gatekeeper server
• From IP-Fax to IP-Fax
Specify the alias telephone number of the receiving machine.
Example: 0311119999 (alias telephone number)
• From IP-Fax to G3 fax
Specify the G3 fax telephone number of the receiving machine.
Example: 0312345678
When using a SIP server
• From IP-Fax to IP-Fax
Specify the SIP user name of the receiving machine.
Example: ABC (SIP user name)
• From IP-Fax to G3 fax
Specify the G3 fax telephone number of the receiving machine.
Example: 0312345678

• To send to a G3 fax via a gateway connected to a public telephone line, you must specify the receiver's
machine telephone number. For example, if the receiver's fax number is “0312345678”, specify
“5678”. To send from an IP-Fax to G3 fax without using gatekeeper or SIP server, you must register
the gateway also.
• An alias telephone number is a number that is registered in the gatekeeper, and is available only in
the network to which the gatekeeper is connected.
• Pay attention to the number of telephone number digits set in the gateway/IP address conversion
table to avoid transmission error.
• SIP allows you to transmit and receive documents via an IPv6 network. This machine does not support
H.323 over IPv6.
• Although the machine can have multiple IP addresses in an IPv6 environment, only one address can
receive IP-Faxes.
• To send via IPv6, you must specify, for the receiver's IPv6 address and host name, the manually
configured address for the receiver's fax.
• For reception when not using SIP server in an IPv6 environment, you must specify this machine's IPv6
address manually. This is not necessary if you are using SIP server.

52
Specifying a Destination

• To send by IPv4 when using SIP server in a mixed IPv4/IPv6 environment, enter “v4:” at the beginning
of the IP-Fax destination. Likewise, to send by IPv6 when using SIP server in a mixed IPv4/IPv6
environment, enter “v6:” at the beginning of the IP-Fax destination.
• “SIP call setup” is performed either by IPv4 or IPv6, depending on the configuration of your
environment.
1

Setting a port number


When using IP address and port number
To send to an IP-Fax destination, depending on the receiver's network configuration, you might have
to specify the IPv4 address and port number of the receiving machine. For example, if the receiver's
IPv4 address is “192.168.1.10” and the port number is “2100”, specify “192.168.1.10:2100”.
Similarly, if the receiver's IPv6 address is “fe80::0123:4567:89ab:cdef” and the port number is
“2200”, specify “[fe80::0123:4567:89ab:cdef]:2200”. Ask your network administrator for details.
When using host name and port number
When you specify a host name, depending on the receiver's network configuration, you may need
to specify the host name and port number of the receiving machine. For example, if the receiver's host
name is “IPFAX1”and the port number is “2100”, specify “IPFAX1:2100”. Ask the network
administrator for details.

Sending to an E-mail Address

This section explains how to specify an e-mail address as a destination.


When using Internet Fax transmission, specify the e-mail address in place of the fax number.

• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To send Internet Fax, you must specify the sender.
• The sender must be registered in the Address Book in advance. Register his/her e-mail address and
register as [Sender Only] or [Dest. & Sender] using “Address Book Management” in “System
Settings”. For details about these settings, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
• Internet Fax is performed using Memory Transmission, which automatically starts transmission after
storing documents in memory.
• If you specify an Internet Fax destination after selecting Immediate Transmission, the mode
switches to Memory Transmission.

53
1. Transmission

• If you try to select Immediate Transmission after specifying an Internet Fax destination, the "Dest.
and functions that could not be specified on immediate transmission is already selected."
message appears. When this happens, press [Exit].

1 1. Press [ ] to display .

2. Press [Manual].

3. Enter the e-mail address destination, and then press the [OK] key.

If you enter an incorrect character, press the [Clear/Stop] key. Then, re-enter the characters correctly.
To change the e-mail address after pressing the [OK] key, press [EditDest], re-enter an e-mail address,
and then press the [OK] key.

4. To add a destination, press [Add Dest].

54
Specifying a Destination

5. Specify the next destination.

1
To add another destination, repeat steps 4 and 5.
Pressing [ ] switches the destination type between and .
6. Specify the sender.
For details, see “Sender Settings”.
7. Press the [Start] key.
The machine starts to scan the original and stores it in memory. When scanning ends, the
Communicating indicator lights and transmission starts.

• Depending on the security settings, [Manual] might not appear and you might not be able to enter
the e-mail address.
• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• For details about text entry, see “Entering Text”, About This Machine.
• For details about canceling a transmission, see “Canceling a Transmission”.
• The Fax Features menu includes a user parameter setting (switch 17, bit 2) that enables you to
configure the machine to force the user to press [Add Dest] whenever s/he specifies a destination
using a destination key. This prevents users accidentally sending documents to the wrong destination.
See “Parameter Settings”.
• For the maximum number of digits that can be included in a destination, see “Maximum Values”.
• When the sender is specified, the transmission result etc. is sent to the sender's e-mail address.
• If “Auto Specify Sender Name” is set to “On”, the sender is automatically specified and you can omit
the procedure for specifying a sender. If “On” is selected, either the administrator's or this machine's
e-mail address appears in the “From” field. For details about Auto Specify Sender Name, see “System
Settings”, Network and System Settings Guide.
• If “Auto Specify Sender Name” is set to “Off” in “System Settings” and no e-mail address is registered
for the sender you specified, Internet Fax documents cannot be sent.

• p.58 "Using the Quick Dial Keys"


• p.93 "Canceling a Transmission"
• p.101 "Sender Settings"
• p.226 "Parameter Settings"

55
1. Transmission

• p.258 "Maximum Values"

Bypassing the SMTP server


1 You can send Internet Fax documents directly to their destinations without going through the SMTP server.
Normally, Internet Fax is sent through the SMTP server. With this feature however, the domain part of the
destination's e-mail address is read as the SMTP server's address and transmissions bypass the SMTP server.
Since this reduces the load on the server, you can send Internet Faxes without having to take into account
the transfer time from server to destination.

• To use this function, the following settings must be specified:


• In “System Settings”, “Port No.”, in “SMTP Server”, set the port number to “25”.
• To specify the host name of the other party as the domain part of the e-mail address, register the
host name of the other party on the DNS server.
• For details about these settings, see “System Settings”, and “Special Operations under
Windows”, Network and System Settings Guide.
• If the other party's IP address is not registered on the DNS server, specify the IP address at the domain
part of the e-mail address.
• To send a document over an IPv6 network, you must specify the other party's host name (not IP address)
as the domain part.
• To use this function, the other party's fax machine must:
• be compatible with Internet Fax
• be connected to the same LAN as this machine
• have its reception protocol set to SMTP
• SMTP authentication set on the other party's fax machine is disabled when Internet Fax is transmitted
using this function.
• If an Internet Fax is transmitted from the other party using this function, even if reception fails, Error
Mail Notification is not sent to the sender.
• When an Internet Fax is transmitted using this function, even if transmission fails, the server does not
send error notification e-mail.
• When using this function, you cannot send Internet Fax to the administrator e-mail address that is
registered on this machine.
By specifying the other party's host name
Specify a destination's e-mail address by adding the other party's host name to the domain part of
the e-mail address. Specify the address after the @ as follows: “host name”, “. (dot)”, and “domain
name”.
xxxx@host name of the other party.domain name

56
Specifying a Destination

For example, if the other party's e-mail address is “abc@defcompany.com” and the host name is
“HOST”:
abc@HOST.defcompany.com
By specifying the other party's IP address 1
Specify a destination's e-mail address by changing the domain part of the e-mail address to the other
party's IP address.
xxxx@[the other party's IP address]
For example, if the other party's e-mail address is “abc@defcompany.com” and the IP address is
“192.168.1.10”:
abc@[192.168.1.10]

Use the following procedure to bypass the SMTP server.

1. Press [TX Mode].

2. Select [Send via SMTP Server] using [ ] or [ ], and then press the [OK] key.

3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

4. Press the [Escape] key.


The standby screen appears.

57
1. Transmission

• If you use [Manual] to specify the destinations directly, you can also specify whether or not to use
SMTP server for each destination.
1 • If you use the destination list to select the destinations, the SMTP server setting specified in the Address
Book is enabled. For details about making the SMTP server settings in the Address Book, see
“Registering Addresses and Users for Facsimile/Scanner Functions”, Network and System Settings
Guide.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allow you to omit steps 1, 2, and 4. For details about the User Function keys, see
“General Settings/Adjust”.
• To send Internet Fax documents from a computer, use the LAN-Fax Driver to specify whether or not
to bypass the SMTP server. When sending with the [Use device address] check box selected, the
SMTP server setting specified on this machine is enabled.

• p.199 "General Settings/Adjust"

Using the Quick Dial Keys

You can specify a destination simply by pressing the Quick Dial key to which the destination's number is
registered.
When a Quick Dial key is pressed, the destination it is registered to appears on the screen.
Pressing [ ] switches the destination list between fax number/IP-Fax destination and e-mail
address .

• In the destination list, program an individual fax number, IP-Fax destination, e-mail address and/or
groups of destinations. For details about programming destinations, see “Registering Addresses and
Users for Facsimile/Scanner Functions”, Network and System Settings Guide.

Specifying a destination using the Quick Dial key


You can select a fax number, IP-Fax destination, or e-mail address programmed to a Quick Dial key.

1. Press [ ] to switch the destination type between and .

58
Specifying a Destination

2. Press the Quick Dial key in which the destination's number is programmed.

BRJ030S

The destination's name is shown on the display.

If you make a mistake, press the [Clear/Stop] key and try again.
To select more destinations, repeat steps 1 and 2.
When you add destinations, if you switch the destination type between and , press [Add Dest],
and then repeat steps 1 and 2.
3. Press the [Start] key.

• To check the contents of Quick Dial keys, print the destination list using Address Book:Print List under
System Settings. For details about the printing method, see “System Settings”, Network and System
Settings Guide.
• You do not have to press [Add Dest] when adding the same type of destination as you specified in
step 1 using the Quick Dial keys.

Specifying a group of destinations using the Quick Dial key


If you program multiple destinations into a group, you can send documents to all destinations in that group
using just a few keystrokes.
Destinations programmed in a group are indicated by a group icon .

• In the destination list, program an individual fax number, IP-Fax destination, e-mail address, and/or
groups of destinations. For details about programming destinations, see “Registering Addresses and
Users for Facsimile/Scanner Functions”, Network and System Settings Guide.

59
1. Transmission

• Group destination can be used only for Memory Transmission; it cannot be used for Immediate
Transmission.
• If you specify a group after selecting Immediate Transmission, the mode switches to Memory

1 Transmission.
• If you try to select Immediate Transmission after specifying a group, the "Dest. and functions that
could not be specified on immediate transmission is already selected." message appears. When
this happens, press [Exit].
• The total number of destinations programmed in multiple groups should not exceed the maximum
number of destinations you can specify for one file, see “Maximum Values”.

1. Press [ ] to switch the destination type between and .


2. Press the Quick Dial key in which the group is programmed.

If you make a mistake, press the [Clear/Stop] key and try again.
To select more destinations, repeat steps 1 and 2.
When you add destinations, if you switch the destination type between and , press [Add Dest],
and then repeat steps 1 and 2.
3. Press the [Start] key.

• To view which destinations are registered in a group, print the group list using the Address Book:Print
List function under System Settings. For details about the printing method, see “System Settings”,
Network and System Settings Guide.
• A confirmation message appears if the destination group includes an address that is incompatible
with the specified destination type. Press [Select] to specify destinations where the numbers or
addresses of the specified destination type are registered. Press [Cancel] to change the destination.
• To cancel any destination(s) among the group, press [ View] and display the desired destination
using [ ] or [ ], and then press the [Clear/Stop] key.

• p.258 "Maximum Values"

Checking the Specified Destination

This section explains how to check the specified destinations.

60
Specifying a Destination

If you specified a destination from the destination list, you can display names, fax numbers, e-mail
addresses, or IP-Fax destinations. If a group is specified as the destination, you can display the fax numbers,
e-mail addresses, or IP-Fax destinations of the group.

1. Make sure the destination appears on the display. 1

2. Press the [Check Destination] key.

BRJ031S

3. If you specified more than one destination, display them one by one using [ ] or [ ].

4. Press the [OK] key when confirmation is complete.


The display returns to that of step 1.

• If you specified a group using the Quick Dial keys, , the group icon appears to the left of the
destination name by pressing the [Check Destination] key.
• When you specify a destination using the number keys, [Program] appears on the screen by pressing
the [Check Destination] key. Press [Program] to register a selected destination in the destination list.
For details about registering a destination, see “Programming Destinations from Check Destination
Screen”.

• p.72 "Programming Destinations from Check Destination Screen"

61
1. Transmission

Redial

The machine stores the latest destinations specified for each transmission method.

1 This function saves time when you are sending to the same destination repeatedly, as you do not have to
enter the destination again.

• The following kinds of destinations are not stored:


• Destinations specified using the destination list
• Destinations specified as a group destination
• Destinations specified under Memory File Transfer
• Destinations dialed using the optional handset or the external telephone
• Destinations dialed by Redial (regarded as already stored in memory)
• Second and later destinations broadcasted to
• Destinations specified in the LAN-Fax Driver on the computer
• To redial a fax number, do not dial any numbers before you press the [Pause/Redial] key. If you press
the [Pause/Redial] key after entering numbers using the number keys, a pause is entered instead.

1. Place the original, and then select the scan settings you require.
2. Press the [Pause/Redial] key.

BRJ028S

3. Select the destination you want to redial to using [ ] or [ ], and then press the [OK] key.

62
Specifying a Destination

4. Press the [Start] key.

• You can specify Internet Fax destination using the Redial function. Select this function before pressing
[Manual].
• When you press [Program], you can register a selected destination in the destination list. For details
about registering a destination, see “Programming Destinations from Redial Screen”.
• For the maximum number of redials the machine can store, see “Maximum Values”.

• p.73 "Programming Destinations from Redial Screen"


• p.258 "Maximum Values"

Preventing Transmission to the Wrong Destination

If you want to prevent documents being sent to the wrong destination, you can configure the machine to
prompt users twice for the destination, or to display the entered destination prior to transmission.

Re-entering a fax number to confirm destination


Enter the fax number again to confirm the destination is correct.
Transmission is disabled if the confirmation fax number does not match the first fax number. This function
helps prevent users accidentally sending faxes to the wrong destination.
If you want to enable this function, contact your service representative.

• When using this function, you must press [Manual] on the standby display to enter the fax number.

1. Press [Manual].

63
1. Transmission

2. Enter the fax number using the number keys, and then press the [OK] key.

1
If you make a mistake, press the [Clear/Stop] key, and then enter the number again.
3. Enter the fax number again, and then press the [OK] key.

The destination is specified.


4. Press the [Start] key.

Transmission starts.
After transmission, the standby display appears.

• If the "Entered destination is not correct." message appears, press [Exit] and check the fax number
again, and then repeat the procedure from step 1.
• If you want to specify the number of times that the fax number must be dialed, contact your service
representative. Step 3 must be repeated as many times as is set here (1 to 15).
• You cannot edit the first fax number that is entered.

Displaying the destination prior to transmission


To prevent documents being sent to the wrong destination, you can configure the machine to display the
destination again after it has been entered and before the file is sent.
If you want to enable this function, contact your service representative.
Note that the entered destination will not be displayed again if you are using any of the following to perform
transmission:
• On Hook Dial

64
Specifying a Destination

• Manual Dial

1. Specify the destination.

If you make a mistake, press the [Clear/Stop] key, and then enter the number again.
2. Press the [Start] key.

Displays the destination and the transmission settings.

To change the destination, press the [Escape] key, and then specify the destination again.
3. Press the [Start] key again.
Transmission starts.
After transmission, the standby display appears.

65
1. Transmission

Programming Destinations in the Address Book


This section explains how to register a fax number in the Address Book.
1 You can register fax numbers, Internet Fax destinations, IP-Fax destinations, and folder destinations in the
Address Book. For details about how to register Internet Fax destinations, IP-Fax destinations, and folder
destinations, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network and System
Settings Guide.

• You can also register Address Book fax numbers, e-mail addresses, IP-Fax destinations, and folder
destinations to groups.
• In the facsimile initial display, if you change the contents of the Address Book, the "Settings have been
updated. The selected dest./functions have been cancelled." message appears. Press [Exit] to bring
back the facsimile initial display.
• You can register destinations in the Address Book using Web Image Monitor or SmartDeviceMonitor
for Admin. For details about installation or operation of them, see “Monitoring and Configuring the
Printer”, Network and System Settings Guide, or, for information about the Address Book, see the
relevant Help topics.

Registering a Fax Destination

This section explains how to register a name and fax number to the Address Book.

1. Press the [User Tools/Counter] key.

BRJ032S

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

66
Programming Destinations in the Address Book

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

1
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Enter the name and then press the [OK] key.

8. Press [Details].

67
1. Transmission

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

1
10. Enter the fax number using the number keys.

11. Press [Option], and then specify the following functions for each destination, as necessary:
• SUB Code: register a SUB Code to use SUB Code Transmission.
• SEP Code: register a SEP Code to use SEP Code Reception.
• Label Insertion: if you enable this function, when the faxes you send are printed at the receiver's
end, the receiver's name is also printed.
After changing the settings, press [Exit], and then press the [OK] key.
12. Press [End].

13. Press the [OK] key.

14. Press the [User Tools/Counter] key.

• For details about the procedure in step 11, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.

Changing a Fax Destination

This section explains how to change a name and fax number registered in the Address Book.

68
Programming Destinations in the Address Book

1. Press the [User Tools/Counter] key.

BRJ032S

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

69
1. Transmission

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Enter the new name, and then press the [OK] key.

8. Press [Details].

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter the new fax number using the number keys.

11. Press [Option], and then change the settings of “SUB Code”, “SEP Code”, and “Label
Insertion”, as necessary.
After changing the settings, press [Exit], and then press the [OK] key.

70
Programming Destinations in the Address Book

12. Press [End].

1
13. Press the [OK] key.

14. Press the [User Tools/Counter] key.

• For details about the procedure in step 11, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.

Deleting a Fax Destination

This section explains how to delete destination information from the Address Book.

1. Press the [User Tools/Counter] key.

BRJ032S

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

71
1. Transmission

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

1
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Delete] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

To specify a destination using a Quick Dial key, press a registration number from 001 to 016.
7. Press [Yes].

8. Press the [User Tools/Counter] key.

Programming Destinations from Check Destination Screen

This section explains how to register a directly entered fax number, e-mail address, or IP-Fax destination
to the Address Book using the Check Destination screen.

72
Programming Destinations in the Address Book

If [Program] appears on the screen, it is possible to register a destination displayed on the check destination
screen to the Address Book.

1. On the check destination screen, select the destination you want to register to the Address
Book. 1

For the operating procedure, see “Checking the Specified Destination”.


2. Press [Program].
For details about registering destinations, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.
3. Make the settings, and then press the [OK] key.
The screen returns to that of step 1.

• Depending on the security settings, [Program] might not appear and you might not be able to register
the destination.

• p.60 "Checking the Specified Destination"

Programming Destinations from Redial Screen

This section explains how to register a directly entered fax number, e-mail address, or IP-Fax destination
to the Address Book using the Redial screen.
If [Program] appears on the screen, it is possible to register a destination displayed on the Redial screen
to the Address Book.

1. On the Redial screen, select the destination you want to register to the Address Book.

For the operating procedure, see “Redial”.

73
1. Transmission

2. Press [Program].
For details about registering destinations, see “Registering Addresses and Users for Facsimile/
Scanner Functions”, Network and System Settings Guide.

1 3. Make the settings, and then press the [OK] key.


The screen returns to that of step 1.

• Depending on the security settings, [Program] might not appear and you might not be able to register
the destination.

• p.62 "Redial"

74
Searching for a Destination in the Address Book

Searching for a Destination in the Address Book


Use this function to search for a destination registered in the destination list or on the LDAP server.
1
• To search for a destination from an LDAP server, the LDAP server must be registered in advance, under
Prog/Chnge/Del LDAP Server, in System Settings. For details about registering LDAP servers, see
“System Settings”, Network and System Settings Guide.

• The search returns destinations whose first characters match the entered characters.
• A warning message appears if the search returns more than the maximum number of destinations you
can search for at a time. Press [Exit] and change the destination name to view fewer destinations.
• For the maximum number of destinations you can search at a time, see “Maximum Values”.

• p.258 "Maximum Values"

Search by Name

This section explains how to search for a destination registered in the Address Book by name.

• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

1. Press [ ] to switch the destination type between and .

75
1. Transmission

2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Search by Name] using [ ] or [ ], and then press the [OK] key.

5. Enter the destination name you want to search for, and then press the [OK] key.

Depending on the type of characters to enter, press the [Shift] key to switch the mode.
If you enter the wrong destination name, before pressing the [OK] key, press the [Clear/Stop] key,
and then enter the correct destination name.
6. Check the characters you have entered are correct, and then press the [OK] key.

When the search is finished, the results appear.

76
Searching for a Destination in the Address Book

7. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).

1
Multiple destinations can be selected.
Press [ ] to deselect a destination.
8. Press the [OK] key.

• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
• For details about text entry, see “Entering Text”, About This Machine.

Search by Destination List

This section explains how to search for a destination registered in the Address Book using the destination
list.

• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

1. Press [ ] to switch the destination type between and .

77
1. Transmission

2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Display List] using [ ] or [ ], and then press the [OK] key.

Destinations appear in registration number order.


5. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).

Multiple destinations can be selected.


Press [ ] to deselect a destination.
6. Press the [OK] key.

• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.

78
Searching for a Destination in the Address Book

Search by Registration Number

This section explains how to search for a destination by specifying a registration number registered in the
Address Book.
1
• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

1. Press [ ] to switch the destination type between and .

2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Search by Registration No.] using [ ] or [ ], and then press the [OK] key.

79
1. Transmission

5. Enter the three-digit registration number using the number keys, and then press the [OK]
key.

If you enter the wrong registration number, before pressing the [OK] key, press the [Clear/Stop] key,
and then enter the correct registration number.
When the search is finished, the result appears.
6. Press the [OK] key.

• If no destination matches the specified registration number, the "Specified destination is not
programmed." message appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allow you to omit steps 2 through 4, and 6. For details about the User Function keys,
see “General Settings/Adjust”.

• p.199 "General Settings/Adjust"

Search by Fax Number

This section explains how to search for a destination registered in the Address Book by fax number.

• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

80
Searching for a Destination in the Address Book

1. Press [ ] to display .

1
2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.

If [Search Fax Destination] does not appear, press the [Escape] key to return to step 1, and then switch
the destination type to .
5. Enter the number you want to search for, and then press the [OK] key.

If you enter the wrong number, before pressing the [OK] key, press the [Clear/Stop] key, and then
enter the correct number.

81
1. Transmission

6. Check the fax numbers you have entered are correct, and then press the [OK] key.

1
When the search is finished, the results appear.
7. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).

Multiple destinations can be selected.


Press [ ] to deselect a destination.
8. Press the [OK] key.

• If no destination matches the specified fax number, the "Specified destination is not programmed."
message appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.

Search by E-mail Address

This section explains how to search for a destination registered in the Address Book by e-mail address.

• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

1. Press [ ] to display .

82
Searching for a Destination in the Address Book

2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Search by E-mail Address] using [ ] or [ ], and then press the [OK] key.

If [Search by E-mail Address] does not appear, press the [Escape] key to return to step 1, and then
switch the destination type to .
5. Enter the e-mail address you want to search for, and then press the [OK] key.

If you enter the wrong e-mail address, before pressing the [OK] key, press the [Clear/Stop] key, and
then enter the correct e-mail address.
6. Check the characters you have entered are correct, and then press the [OK] key.

83
1. Transmission

When the search is finished, the results appear.


7. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).

Multiple destinations can be selected.


Press [ ] to deselect a destination.
8. Press the [OK] key.

• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.

Search by IP-Fax Destination

This section explains how to search for a destination registered in the Address Book by IP-Fax destination.

• If [LDAP Search] is set to [Off] in Administrator Tools, in the System Settings menu, the display for
selecting either [Search Address Book] or [Search LDAP] does not appear.

1. Press [ ] to display .

84
Searching for a Destination in the Address Book

2. Press the [Search Destination] key.

BRJ033S

3. Select [Search Address Book] using [ ] or [ ], and then press the [OK] key.

4. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.

If [Search Fax Destination] does not appear, press the [Escape] key to return to step 1, and then switch
the destination type to .
5. Press [IP].

The Search IP-Fax Destination screen appears.


6. Enter the IP-Fax destination you want to search for, and then press the [OK] key.

85
1. Transmission

If you enter the wrong destination, before pressing the [OK] key, press the [Clear/Stop] key, and
then enter the correct destination.
7. Check the characters you have entered are correct, and then press the [OK] key.

When the search is finished, the results appear.


8. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).

Multiple destinations can be selected.


Press [ ] to deselect a destination.
9. Press the [OK] key.

• If no destination matches the specified text, the "Specified destination is not programmed." message
appears. Press [Exit] to return to the display of step 4.
• You cannot specify destinations twice. If you try, the "This destination has already been programmed."
message appears. Press [Exit] to return to the standby screen.
• Press [Add Dest] to specify other destinations.

Search by LDAP Server

This section explains how to search for a destination registered in the Address Book using the LDAP server.

• This function is not available if [LDAP Search] is set to [Off] under Administrator Tools, in the System
Settings menu.

86
Searching for a Destination in the Address Book

1. Press the [Search Destination] key.

BRJ033S

2. Select [Search LDAP] using [ ] or [ ], and then press the [OK] key.

3. Select [Select Server] using [ ] or [ ], and then press the [OK] key.

4. If more than one server is programmed, select the server you want to search using [ ] or
[ ], and then press the [OK] key.

The screen returns to that of step 3.


5. Select [Advanced Search] using [ ] or [ ], and then press the [OK] key.

87
1. Transmission

6. Select a search condition using [ ] or [ ], and then press the [OK] key.

1
Conditions (Name, E-mail Address, Fax Destination, Company Name, and Department Name) are
those programmed in the LDAP server.
7. Enter a partial string, and then press the [OK] key.

Depending on the type of characters you need to enter, press the [Shift] key to switch between modes.
To search for an IP-Fax destination, press [IP] on the Fax Destination screen.
8. Select the search criteria using the scroll keys, and then press the [OK] key.

The meanings of the search criteria are as follows:


• [Include]: Search for strings that include the specified character.
Example: When searching for “ABC”, enter “A”, “B”, or “C”.
• [Exclude]: Search for strings that do not include the specified character.
Example: When searching for “ABC”, enter “D”.
• [First Word]: Search for strings that start with the specified character.
Example: When searching for “ABC”, enter “A”.
• [Last Word]: Search for strings that end with the specified character.
Example: When searching for “ABC”, enter “C”.
• [Exact Match]: Search for strings that fully match the specified character.
Example: When searching for “ABC”, enter “ABC”.
• [Fuzzy Search]: Perform a fuzzy search (according to the searching method supported by the
LDAP server).

88
Searching for a Destination in the Address Book

9. Press the [Escape] key.


The screen returns to that of step 5.
10. Press [Search].
1

When the search is finished, the results appear.


11. Select a destination using [ ] or [ ], and then press [ ] to specify it (put a tick against it).
Multiple destinations can be selected.
Press the [Check Destination] key to display details about the selected destination.
Press [ ] to deselect a destination.
12. Press the [OK] key.

• Although one user can program multiple e-mail addresses, only one address can be retrieved by the
search. The address retrieved by the search depends on the searching method supported by the LDAP
server. However, the address programmed first is normally retrieved.
• You can add one additional search condition for LDAP servers by specifying the Search Options
under Prog/Chnge/Del LDAP Server under System Settings. See “System Settings”, Network and
System Settings Guide.
• The string you enter in the [Name] condition field in step 6 is read as the first or last name, depending
on the administrator's setting. For example, to search for the name “John Smith”, ask the system
administrator whether you should enter “John” or “Smith”.
• For details about text entry, see “Entering Text”, About This Machine.

89
1. Transmission

On Hook Dial
The On Hook Dial function allows you to dial while listening to the tone from the internal speaker.
1 You can send a fax checking the connection.

• This function is not available for Internet Fax and IP-Fax.

1. Place the original, and then select the scan settings you require.
2. Press the [On Hook Dial] key.

BRJ029S

You will hear a low tone from the internal speaker.


If you want to cancel this operation, press the [On Hook Dial] key again.
3. Dial.

The machine immediately dials the destination.


If you make a mistake, press the [On Hook Dial] or [Clear Modes] key, and then try again.
4. When the line is connected and you hear a high-pitched tone, press the [Start] key.
Transmission starts.
If you want to cancel a transmission, press the [Clear/Stop] key, and then remove the originals.
After transmission, the standby display appears.

• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• This function is unavailable in some countries.

90
On Hook Dial

• Press [ ] or [ ] to adjust the volume of the on-hook sound in eight increments. At the maximum volume
level, changes to . Similarly, at the minimum level, changes to . The volume can also be
preprogrammed in the Fax Features menu.
• If you have the optional handset or an external telephone on the fax machine, you can speak with
the other party when you hear a voice. If you hear a voice before pressing the [Start] key, pick up the
1
optional handset or the handset of the external telephone and tell the receiver you want to send a fax
document (ask them to switch to facsimile mode).
• The Fax Features menu contains the On Hook Release Time setting, which allows you to specify the
time after which On Hook mode is deactivated. See “General Settings/Adjust”.

• p.58 "Using the Quick Dial Keys"


• p.199 "General Settings/Adjust"

91
1. Transmission

Manual Dial
Pick up the optional handset or the handset of the external telephone and dial. If you hear a voice at the
1 other end, continue conversation as normal.

• The optional handset or an external telephone is required.


• This function is not available for Internet Fax and IP-Fax.

1. Place the original, and then select the scan settings you require.
2. Pick up the handset.
You will hear a dial tone.
3. Dial.

The machine immediately dials the destination.


If you make a mistake, replace the handset, and then try again from step 2.
4. When the line is connected and you hear a high-pitched tone, press the [Start] key to send
your fax document.
If you hear a voice, tell the receiver that you want to send them a fax document (ask them to switch
to facsimile mode).
Transmission starts.
5. Replace the handset.
If you want to cancel a transmission, press the [Clear/Stop] key, and then remove the originals.
After transmission, the standby display appears.

• To specify a destination using a Quick Dial key, see “Using the Quick Dial Keys”.
• When the operation switch is off, even if the main power switch is on, you cannot operate this machine
using only the optional handset or the handset of the external telephone. You must first press the
operation switch to turn on the machine.

• p.58 "Using the Quick Dial Keys"

92
Canceling a Transmission

Canceling a Transmission
This section explains how to cancel a fax transmission.
1
• Remember that the Communicating indicator turns off almost immediately when an Internet Fax is
being sent.

Before the Original Is Scanned

Use this procedure to cancel a transmission before pressing the [Start] key.

1. Press the [Clear Modes] key.

BRJ034S

• When originals are placed into the ADF, you can cancel transmission simply by removing them.

While the Original Is Being Scanned

Use this procedure to cancel a transmission while the originals are being scanned after the [Start] key has
been pressed.

93
1. Transmission

1. Press the [Clear/Stop] key.

BRJ035S

The machine stops scanning.

• Scanning may be completed while you are performing the cancel operation.

While the Original Is Being Transmitted

This section explains how to cancel a transmission while the Communicating indicator is lit.

1. Press the [Clear/Stop] key.

BRJ035S

2. Select the file you want to cancel using [ ] or [ ], and then press [Stop TX].

94
Canceling a Transmission

3. Press [Delete].

1
To cancel stopping transmission, press [No].
4. Press the [Escape] key.
The standby display appears.

• If you cancel a document while it is being sent, the transmission is halted as soon as you finish the
cancellation procedure. However, some pages of the document may already have been sent and
received at the other end.
• If the transmission finishes while you are carrying out this procedure, it will not be canceled.
• If multiple destinations were specified, only one destination number appears.

Before the Transmission Is Started

Use this procedure to cancel a transmission after the original is scanned.


This function is useful to cancel a transmission when you notice a mistake in destination or with the originals
after storing. To cancel Memory Transmission, search for the file to be canceled among the files stored in
memory, and then delete it.
You can cancel transmission of a file while the file is being sent, stored in memory, or fails to transmit. All
the scanned data is deleted from memory.

• This function is unavailable with Immediate Transmission.

1. Press the [Job Information] key.

BRJ036S

95
1. Transmission

2. Select [Check/Stop TX File] using [ ] or [ ], and then press the [OK] key.

1
3. Select the file you want to cancel using [ ] or [ ], and then press [Stop TX].

4. Press [Delete].

The display returns to that of step 3.


To cancel another file, repeat from step 3.
To cancel stopping transmission, press [No].
5. Press the [Escape] key twice.
The standby display appears.

• If you cancel a transmission while the file is being sent, some pages of your file may have already
been sent and is received at the other end.
• If the transmission finishes while you are carrying out this procedure, transmission cannot be canceled.
• If multiple destinations were specified, only the number of the destinations that have not received the
document you sent is shown.
• If multiple destinations were specified, only one destination number appears.

96
Checking the Storage Result (Memory Storage Report)

Checking the Storage Result (Memory Storage


Report)
This report is printed after an original is stored in memory. It helps you review the contents and the
1
destinations of stored originals.

• If you use Parallel Memory Transmission, the Memory Storage Report is not printed.

• You can turn this report on and off with the User Parameter (switch 03, bit 2) in the Fax Features menu.
• Even if the machine is set up not to print this report, it is still printed if an original could not be stored.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.

• p.226 "Parameter Settings"

97
1. Transmission

Setting Transmission Function Defaults (Home


Position)
1 You can specify a default for each document transmission function setting.
A “default” is the value that a setting returns to following power on or whenever the [Clear Modes] key is
pressed.
You can specify defaults for the following settings:
Image Density, Resolution, Original Type, Transmission Mode, Label Insertion, Fax Header
For details about how to set, see “Home Position”.

• p.237 "Home Position"

98
2. Other Transmission Features
This section explains functions you can apply using the [TX Mode] setting, such as Sending at a Specific
Time (Send Later) and Label Insertion. TX Mode allows you to use various functions with transmissions.

Sending at a Specific Time (Send Later)


2
Using this function, you can instruct the machine to delay transmission of your fax document until a specified
later time.
This allows you to take advantage of off-peak telephone charges without having to be by the machine at
the time.

• If the machine is switched off for about twelve hours, all fax documents stored in memory are lost. If
documents are lost for this reason, a Power Failure Report is automatically printed when the operation
switch is turned on. Use this report to check the list of lost documents. For details, see “Turning Off the
Main Power / In the Event of Power Failure”, Troubleshooting.
• This function is unavailable with Immediate Transmission. If you specify Immediate Transmission for
this function, the "Dest. and functions that could not be specified on immediate transmission is already
selected." message appears. When this happens, press [Exit], and then switch to Memory
Transmission.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [Send Later] using [ ] or [ ], and then press the [OK] key.

4. Select [Send at Specified Time] using [ ] or [ ], and then press the [OK] key.

99
2. Other Transmission Features

To cancel the setting, select [Off], and then press the [OK] key. The display returns to that of step 3.
5. Enter the time using the number keys and press [AM/PM] to switch between AM and PM.
Then press the [OK] key.

2
When entering numbers smaller than 10, add a zero at the beginning.
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.
To cancel Send Later, press the [Escape] key. The display returns to that of step 3.
6. Press the [Escape] key.
The standby display appears.
To check the settings, press [TX Mode].
7. Specify a destination, and then press the [Start] key.

• You can specify a time within 24 hours of the current time.


• If the current time shown is not correct, change it using Set Time under System Settings. For details
about the setting, see “System Settings”, Network and System Settings Guide.
• You can cancel the transmission setup for Send Later. See “Canceling a Transmission”.

• p.93 "Canceling a Transmission"

100
Sender Settings

Sender Settings
Select a user that you want to specify as a sender.
If the sender's e-mail address is registered in the destination list, the sender can receive transmission results
by e-mail.
Also, if you enable the Stamp Sender Name, the registered sender's name (user name) appears on the
receiver's sheet, lists, and report.
2

• To receive transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
• You must first register the senders in the destination list using “Address Book Management” under
“System Settings” to specify their e-mail addresses, and then specify “Register as” for [Sender Only]
or [Dest. & Sender]. If you want senders to receive e-mail notification of transmission results, you must
specify [Dest. & Sender]. For details about these settings, see “Registering Addresses and Users for
Facsimile/Scanner Functions”, Network and System Settings Guide.
• If user authentication is set, the user logged in is set as sender. The transmission result is sent to the
logged-in user's e-mail address.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [Sender Settings] using [ ] or [ ], and then press the [OK] key.

4. Select a sender.

If a destination protection code is set, the entry screen appears. Enter the protection code for
destination using the number keys, and then press the [OK] key.

101
2. Other Transmission Features

5. Confirm the selected sender, and then press the [OK] key.

2 6. To print the sender's name on the receiver's sheet, select [Stamp] using [ ] or [ ], and then
press the [OK] key.
If you enable this function, the sender's name (user name) appears on the receiver's sheet, lists, and
report.

7. To confirm transmission results by e-mail notification, select [E-mail] using [ ] or [ ], and


then press the [OK] key.

If the sender's e-mail address is registered, you can specify whether or not to send the transmission
result by e-mail to the sender. If you enable this function, the transmission result is sent to the registered
e-mail address.
The display returns to that of step 3.
8. Press the [Escape] key.
The standby display appears.
To check the settings, press [TX Mode].
9. Specify the destination, and then press the [Start] key.

• You can confirm transmission results by using both the E-mail TX Result function, which sends the results
by e-mail, and the Communication Result Report printed by the machine. You can set whether to use
both of these together in User Parameter (switch 10, bit 6) in the Fax Features menu. See “Parameter
Settings”.
• You can program one of the User Function keys with operations for Sender Settings. User Function
keys allow you to omit steps 2, 3, and 7. For details about the User Function keys, see “General
Settings/Adjust”.

102
Sender Settings

• You can use Communication Result Report, etc. to check usage status by specified users. If user
authentication is set, you can check usage by logged-in users. If User Code is set to sender, you can
count the number of uses by each user.
• To cancel the Sender Settings, cancel the transmission. See “Canceling a Transmission”.

• p.93 "Canceling a Transmission"


• p.199 "General Settings/Adjust"
2
• p.226 "Parameter Settings"

103
2. Other Transmission Features

E-mail Options
This section explains the settings required for using the Internet Fax function.

• To use Internet Fax functions, the Hard Disk Drive Option and printer/scanner functions must be
2 installed.

Entering the Subject

Allows you to enter a subject for the e-mail document you want to send.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [E-mail Options] using [ ] or [ ], and then press the [OK] key.

4. Select [Attach Subject] using [ ] or [ ], and then press the [OK] key.

5. Enter the subject line, and then press the [OK] key.

Depending on the type of characters to enter, press the [Shift] key to switch the mode.
The screen returns to that of step 4.

104
E-mail Options

6. Press the [Escape] key twice.


The standby screen returns.
To check the settings, press [TX Mode].
7. Specify a destination.
8. Specify the sender.
For details, see “Sender Settings”. 2
9. Press the [Start] key.

• If you send e-mail without setting a subject, a subject is automatically inserted. For details about how
the subject is automatically inserted, see “E-mail Subject” and “Received images”.
• You cannot send a subject only as e-mail without an original.
• You can program one of the User Function keys with operations for E-mail Options. User Function
keys allow you to omit steps 2 and 3. For details about the User Function keys, see “General Settings/
Adjust”.
• For details about text entry, see “Entering Text”, About This Machine.
• For the maximum number of characters for an e-mail subject, see “Maximum Values”.

• p.34 "E-mail Subject"


• p.101 "Sender Settings"
• p.134 "Received images"
• p.199 "General Settings/Adjust"
• p.258 "Maximum Values"

Requesting a Reception Notice

You can confirm sent documents were properly received using e-mail or the Journal.
When Reception Notice is set under “E-mail Options”, the receiver sends back a reception notice message.
Once the reception notice message is received, “OK” appears in the Result column of the Journal, allowing
the originator to verify the transmission was received.

• The Reception Notice feature is only available if the receiver supports MDN (Message Disposition
Notification).

1. Place the original, and then select the scan settings you require.

105
2. Other Transmission Features

2. Press [TX Mode].

2 3. Select [E-mail Options] using [ ] or [ ], and then press the [OK] key.

4. Select [Return Receipt] using [ ] or [ ], and then press the [OK] key.

5. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 4.


6. Press the [Escape] key twice.
The standby screen returns.
To check the settings, press [TX Mode].
7. Specify a destination.
8. Specify the sender.
For details, see “Sender Settings”.
9. Press the [Start] key.

• If the fax is not received normally, “Error” appears in the Result column.
• Only the last 50 communications appear in the Journal. If you do not receive a reception notice
message before the last 50 communications are finished, “OK” might not be printed in the Journal's
Result column. This may happen even if the mail is received normally at the other end.

106
E-mail Options

• If you specify mailing list addresses, do not set for Reception Notice. Otherwise, you will receive
multiple reception notice messages from e-mail recipients, and the Result column will be overwritten
each time a new notice message is received. However, if you receive a reception notice message
indicating an error, “Error” appears in the Result column and will not be overwritten, even if you
subsequently receive a reception notice message as “OK” following the error message.
• Reception notice results are only shown in the Journal. The Result column in all other files, lists, and
transmission reports show “--”.
2
• Reception notice messages themselves are not recorded in the Journal.
• You can select whether the Reception Notice is printed every time or printed only when an error
occurs. This can be set with User Parameter (switch 21, bit 0) in the Fax Features menu. See “Parameter
Settings”.
• You cannot broadcast e-mail using Reception Notice. The documents are sent to the destinations in
the order in which they were specified.
• You can program one of the User Function keys with operations for E-mail Options. User Function
keys allow you to omit steps 2 and 3. For details about the User Function keys, see “General Settings/
Adjust”.

• p.101 "Sender Settings"


• p.199 "General Settings/Adjust"
• p.226 "Parameter Settings"

107
2. Other Transmission Features

Fax Header Print


When the Fax Header is set to “On”, the stored name is printed on the receiver's paper.

• In the USA, the Fax Header must contain the telephone number of the line your machine is connected
2 to. It will be printed on the header of every page you send. Required in the USA.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [Print Fax Header] using [ ] or [ ], and then press the [OK] key.

4. Select [On] using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 3.


5. Press the [Escape] key.
The standby screen returns.
To check the settings, press [TX Mode].
6. Specify a destination, and then press the [Start] key.

• You can program fax header names using the Program Fax Information function in the Fax Features
menu. For details about the programming method, see “Registering Fax Information”.
• You can select whether or not dates, fax header names, file numbers, or page numbers are printed
by changing their respective User Parameters (switch 18, bit 3, 2, 1, 0) in the Fax Features menu.
See “Parameter Settings”.

108
Fax Header Print

• You can program one of the User Function keys with operations for this function. Using the User
Function key allows you to omit steps 2 through 5. For details about the User Function keys, see
“General Settings/Adjust”.
• In the USA, law requires that your telephone number be included in the Fax Header. Register the
telephone number (own fax number) and switch on Fax Header Print with User Parameters (switch
18, bit 1) in the Fax Features menu.
2
• p.199 "General Settings/Adjust"
• p.217 "Registering Fax Information"
• p.226 "Parameter Settings"

109
2. Other Transmission Features

Label Insertion
With this function you can have the receiver's name printed on the document that is received at the other
end.

2 • To use this function, set Label Insertion to [On] when registering fax destinations in the Address Book,
and also select [Programmed Name] when sending fax documents.
• When there is an image around the area where the Label is to be printed, that image is deleted.
The receiver's name is printed as follows:
• Receiver's name: printed at the top of the page and preceded by “To:”.
Set this function as follows:
• Set Label Insertion to [On] when programming fax destinations.
• Select [Programmed Name] for Label Insertion when sending fax documents.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.

4. Select [Programmed Name] or [Off] using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 3.


5. Press the [Escape] key.
The standby screen returns.
To check the settings, press [TX Mode].

110
Label Insertion

6. Specify a destination, and then press the [Start] key.

• [Programmed Name] is selected by default.

111
2. Other Transmission Features

Setting SUB Codes for Transmission


This section explains how to send a document with a SUB Code as a confidential transmission.
A SUB Code is an ID consisting of numbers, , , and spaces. Document transmitted with a SUB Code
is stored in the other party's memory, and not printed automatically. The other party inputs the SUB Code
to print the received document. Privacy can be mutually protected when transmitting a confidential
2 document intended for a particular receiver, since only a person who knows the SUB Code can print the
document.
Documents can also be sent via facsimiles that have the Transfer Station function.
This function helps you save costs when you send the same document to more than one place in a distant
area, and saves time since many documents can be sent in a single operation.

• Documents can be sent to facsimiles that have the Personal Box function.
• A SUB Code cannot be used with Internet Fax.
• To use this function, set [SUB Code TX] to [On].
• Program this function to one of the User Function keys in advance. For details about the User Function
keys, see “General Settings/Adjust”.
• Obtain the SUB Code of the other party in advance.
• When sending a confidential document, inform the other party of the SUB Code in advance.
• This machine cannot receive documents that are transmitted with a SUB Code.

1. Place the original, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [SUB Code TX] using [ ] or [ ], and then press the [OK] key.

112
Setting SUB Codes for Transmission

4. Select [On] using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 3. 2


5. Press the [Escape] key.
The standby screen returns.
6. Enter the fax number of a destination or an IP-Fax destination.

7. Press the User Function key ([F1] to [F3]) programmed with [SUB/SEP Code].

BRJ037S

8. Enter a SUB Code, and then press the [OK] key.

If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.

113
2. Other Transmission Features

9. When a password is required, enter the SID Code using the number keys, and then press
the [OK] key.

2
When a SID Code is not required, just press the [OK] key.
The standby screen returns.
10. Press the [Start] key.
If you use Immediate Transmission and the fax machine at the destination does not support the SUB
Code function, a message will appear on the display to inform you of this. When this happens, press
[Exit] to cancel the transmission.

• Make sure the number of digits in the SUB Code matches the specification of the machine to which
you are sending. For the maximum number of digits for the SUB Code of this machine, see “Maximum
Values”.
• You can store SUB Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.
• The SUB Code is printed on lists and reports.

• p.199 "General Settings/Adjust"


• p.258 "Maximum Values"

Setting a Password

There are times when you may want to use an “SID” (Sender ID) when sending confidential faxes with the
SUB Code function.
When you use a Transfer Box that has a password, enter the SID Code as the password.

• For the maximum number of digits for the SID Code, see “Maximum Values”.
• You can enter numbers, , , and spaces.
• You can store SID Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.

114
Setting SUB Codes for Transmission

• The SID Code is printed on lists and reports.

• p.258 "Maximum Values"

115
2. Other Transmission Features

Setting SEP Codes for Reception


This section explains how to enter a SEP Code to request the destination to transmit a document.
You can receive a document stored in the destination's memory if the document has the same SEP Code
as the SEP Code you entered.

2 This function enables the machine to receive documents from multiple destinations.

• Documents can be received from facsimiles that have Information Boxes.


• A SEP Code cannot be used with Internet Fax.
• To use this function, set [SEP Code RX] to [On].
• Program this function to one of the User Function keys in advance. For details about the User Function
keys, see “General Settings/Adjust”.

1. Press [TX Mode].

2. Select [SEP Code RX] using [ ] or [ ], and then press the [OK] key.

3. Select [On] using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 2.


4. Press the [Escape] key.
5. Enter the fax number of a destination or an IP-Fax destination.

116
Setting SEP Codes for Reception

6. Press the User Function key ([F1] to [F3]) programmed with [SUB/SEP Code].

BRJ037S

7. Enter a SEP Code, and then press the [OK] key.

If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then try again.
8. When a password is required, enter the PWD Code using the number keys, and then press
the [OK] key.

When a PWD Code is not required, just press the [OK] key.
The standby screen returns.
9. Press the [Start] key.

• Make sure the number of digits in the SEP Code matches the specification of the machine from which
you are receiving. For the maximum number of digits for the SEP Code of this machine, see “Maximum
Values”.
• You can enter numbers, , , and spaces.
• You can store SEP Codes as well as names and fax numbers in the destination list. For registering into
the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”, Network
and System Settings Guide.
• The SEP Code is printed on lists and reports.

117
2. Other Transmission Features

• p.199 "General Settings/Adjust"


• p.258 "Maximum Values"

Entering a Password
2
There are times you may want to use a password when receiving faxes by SEP Code Reception.

• For the maximum number of digits for the PWD Code, see “Maximum Values”.
• You can enter numbers, , , and spaces.
• You can store PWD Codes as well as names and fax numbers in the destination list. For registering
into the destination list, see “Registering Addresses and Users for Facsimile/Scanner Functions”,
Network and System Settings Guide.
• The PWD Code is printed on lists and reports.

• p.258 "Maximum Values"

SEP Code RX Reserve Report

This report is printed after SEP Code Reception is set up.


You can use this report to check the reservations for SEP Code Reception.

• You can turn this function on or off with the User Parameter (switch 03, bit 3) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.

• p.226 "Parameter Settings"

SEP Code RX Result Report

This report is printed after each SEP Code Reception is completed and shows its result.

118
Setting SEP Codes for Reception

• You can turn this function on or off with the User Parameter (switch 03, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
2
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• You can also check the result of a SEP Code Reception with the Journal.

• p.226 "Parameter Settings"

119
2. Other Transmission Features

Two-Sided Transmission (Double-Sided


Transmission)
Use this function to send two-sided originals.

2 • When you use [2 Sided TX] under [TX Mode], the originals cannot be sent by using the exposure
glass.
• This function is only available with Memory Transmission.

1. Place the original in the ADF, and then select the scan settings you require.
2. Press [TX Mode].

3. Select [2 Sided TX] using [ ] or [ ], and then press the [OK] key.

4. Select the transmission mode using [ ] or [ ], and then press the [OK] key.

Select [2 Sided from 1st Page] to send a two-sided original from the first page.
Select [1 Sided for 1st Page] if you want to send a cover letter as the first page.
5. Select the position of the placed document using [ ] or [ ], and then press the [OK] key.

To cancel Two-Sided Transmission, press the [Escape] key. The display returns to that of step 3.

120
Two-Sided Transmission (Double-Sided Transmission)

6. Select the page opening orientation using [ ] or [ ], and then press the [OK] key.

The screen returns to that of step 3. 2


7. Press the [Escape] key.
The screen returns to the standby screen.
8. Specify a destination, and then press the [Start] key.

• The front and back of the scanned original will be printed in order on separate sheets at the other
end. The orientation of alternate sheets may be reversed at the other end. If you want to print the
original with the same orientation at the other end, specify the original position and page opening
orientation.

BRJ021S

• For details about acceptable original size and paper thickness for two-sided scanning with the ADF,
see “Acceptable Original Sizes”.
• You can program one of the User Function keys with operations for this function. Using the User
Function keys allows you to omit steps 2, 3, and 7. For details about the User Function keys, see
“General Settings/Adjust”.
• Make sure that the specified original position matches the orientation of originals loaded in the ADF.

• p.37 "Acceptable Original Sizes"


• p.199 "General Settings/Adjust"

121
2. Other Transmission Features

122
3. Reception
This section explains reception and reception functions such as printing received documents or routing
received documents to other fax machines.

Types of Reception
This section explains different ways of receiving fax documents.

3
Immediate Reception

Each page of a fax document is printed as soon as it is received. This method is used for standard fax
documents.

BBB032S

• When receiving important fax documents, it is recommended that you confirm the contents of the
received documents with the senders.
• The machine may not be able to receive fax documents when free memory space is low.
• If free memory reaches 0% during Immediate Reception, any further reception becomes impossible
and the current communication is terminated.

• Reception is always by Immediate Reception unless “Combine Two Originals” or [2 Sided Print] is
set to “On”, in which cases the machine switches to Memory Reception.
• If the Substitute Reception is used, a fax document is not printed: it is stored in memory.
• This machine supports Standard and Detail resolutions for reception. Faxes sent at Fine or Super Fine
resolution is printed on your machine at Detail resolution. This may differ from the sender's intended
resolution.

123
3. Reception

Memory Reception

The machine waits until all pages of the document have been received into memory before printing it.

BBB033S

• If there is a power failure (the main power switch is turned off) or the machine is unplugged for about
twelve hours, all the documents stored in memory are deleted. As soon as the main power switch is
turned on, the Power Failure Report is printed to help you check the list of deleted files. Simply turning
off the power by pressing the operation switch does not delete stored documents. See “Turning Off
the Main Power / In the Event of Power Failure”, Troubleshooting.
• The machine might not be able to receive large numbers of documents or documents with high data
content. If this is the case, we recommend that you disable “Combine Two Originals” or “2 Sided
Print”.
• The machine may not be able to receive fax documents when free memory space is low.
• If free memory reaches 0% during Memory Reception, any further reception becomes impossible and
the current communication is terminated.

• Reception is always by Immediate Reception unless “Combine Two Originals” or “2 Sided Print” is
set to “On”, in which cases the machine switches to Memory Reception.

Substitute Reception

Substitute Reception is used when the machine cannot print any fax documents.
In Substitute Reception, a received fax document is stored in memory instead of being printed. Fax
documents received using Substitute Reception are automatically printed when the condition which caused
the machine to use Substitute Reception is rectified.
Depending on why the machine cannot print, Substitute Reception might be used for all fax documents
received, or for only those documents that match a condition specified in the User Parameters in the Fax
Features menu.

124
Types of Reception

The Receive File indicator lights to let you know when fax documents have been received using Substitute
Reception.

3
BRJ038S

• Reception may not take place if there is not enough free memory.
• If free memory reaches 0% during Substitute Reception, any further reception becomes impossible
and the current communication is terminated.

• When a fax document is received after “Store(Notify)” or “Store(Do not Notify)” is selected for
Reception File Setting in the Fax Features menu, the Receive File indicator lights. For details about
Reception File Setting, see “Reception File Setting”.
• The Receive File indicator may light even when receiving documents using Immediate Reception.

• p.214 "Reception File Setting"

Receiving documents unconditionally


When faxes cannot be printed as normal, Substitute Reception allows fax reception. This section describes
the conditions under which this will occur.
If one of the conditions in the following list occurs, the machine receives all fax documents using Substitute
Reception.

Problems Causes Solutions

The machine is printing with a The machine is busy printing The document is automatically printed
different function. with a different function. after the current job finishes.

is lit. The cover is open. Close the cover shown in the display.

125
3. Reception

Receiving documents according to parameter-specified settings


When faxes cannot be printed as normal, Substitute Reception allows reception of faxes that match the
criteria specified in User Parameters. This section describes the conditions under which this will occur.
If any of the conditions listed below applies, the machine receives only faxes that match the criteria specified
in User Parameters.

Problems Causes Solutions

is lit. Paper is jammed. Remove the jammed paper.


3 For details about removing the paper, see
“Clearing Misfeeds”, Troubleshooting.

is lit. All trays are out of Add paper.


paper. For details about adding paper, see “Adding
Paper”, About This Machine.

is lit. Toner is empty. Replace the toner cartridge.


For details about replacing the toner cartridge, see
“Adding Toner”, About This Machine.

The message “Problem All trays are out of Call your service representative.
with this tray” appears. action.

In User Parameters (switch 05, bit 2, 1) on the Fax Features menu, specify the following conditions for
Substitute Reception:
• When Own Name or Own Fax Number is received
The machine switches to Substitute Reception only when the sender has programmed their Own Name
or Own Fax Number. If the power is switched off for more than twelve hours, all the documents stored
in memory are deleted. In this case, the Journal can be used to identify the senders of the deleted
documents, so you can ask them to resend.
If a sender has not programmed their Own Name or Own Fax Number, the machine may fail to
receive an important fax document. It is recommended that you ask important senders to program an
Own Name or Own Fax Number in advance.
• Free
The machine switches to Substitute Reception regardless of whether or not the sender has programmed
their Own Name or Own Fax Number.
• Disable
The machine does not receive any documents.

126
Types of Reception

• For details about Parameter Setting, see “Parameter Settings”.

• p.226 "Parameter Settings"

127
3. Reception

Reception Modes
There are three ways you can set up the machine to handle incoming calls.
• Auto Switch
• Manual Reception (the optional handset or an external telephone required)
• Auto Reception
The reception mode can be switched under Switch Reception Mode in the Fax Features menu. See
“Reception Settings”.
3
• The optional handset or an external telephone is required to use this machine as a telephone.

• p.201 "Reception Settings"

Auto Switch

In this mode, the machine rings a number of times. You can answer the call while the machine is ringing. If
you do not answer the call, the machine automatically changes to receive fax documents.

• You can change the number of rings using “RX Mode Auto Switch Time” in the Fax Features menu.
See “Reception Settings”.
• When the other party send a fax document, the machine changes to receive the fax document
automatically.
• You can connect a telephone answering machine with Auto Switch.
• Set a smaller number of rings for the telephone answering machine than for the fax machine.
• This function will not work with certain answering machines.

• p.201 "Reception Settings"

Manual Reception

When a telephone call comes in, the machine rings. If the call is a fax document, you must switch manually
to facsimile mode.

1. When the machine rings, pick up the optional handset or the handset of the external
telephone.

128
Reception Modes

2. If you hear beeps, press the [Start] key or the User Function key programmed with Start
Manual Reception. (The [Start] key is only available in facsimile mode when an original is
not placed.)
3. If you pressed the [Start] key in step 2, press [Start RX].

4. Replace the optional handset or the handset of the external telephone. The machine will 3
start receiving.

• When the operation switch is off, even if the main power switch is on, you cannot operate this machine
using only the optional handset or the handset of the external telephone. You must first press the
operation switch to turn on the machine.

Auto Reception

When a telephone call comes in, the machine automatically receives it as a fax document.
Use this setting on a dedicated fax line.

Switching the Reception Mode

This section explains how to switch the reception mode.


You can switch reception modes using Switch Reception Mode in Reception Settings.
If you program a User Function key with Switch Reception Mode, you can switch the reception mode
quickly.

1. Press the [Switch RX Mode] key.

BRJ039S

129
3. Reception

2. Select the reception mode using [ ] or [ ], and then press the [OK] key.

The standby display appears.


To cancel the selection, press the [Escape] key.

3
• For details about Switch Reception Mode, see “Reception Settings”.
• For details about the User Function keys, see “General Settings/Adjust”.

• p.199 "General Settings/Adjust"


• p.201 "Reception Settings"

130
Receiving E-mail

Receiving E-mail
This section explains this machine's e-mail reception functions.

• To use Internet Fax and Mail to Print functions, the Hard Disk Drive Option and printer/scanner
functions must be installed.
If a TIFF-F file is attached to an e-mail, the machine receives the e-mail by Internet Fax. If a JPEG or PDF
file is attached to an e-mail, the machine receives the e-mail by Mail to Print.
Only one attached file can be printed from a received e-mail.
3
When multiple files are attached to an e-mail, the reception method and the file that is printed vary
according to the file type and the order of the attached files.

File type attached File to be printed Reception method

Text Text Internet Fax

Text TIFF Text TIFF Internet Fax

Text JPEG JPEG Mail to Print

Text TIFF JPEG JPEG Mail to Print

Text JPEG TIFF JPEG Mail to Print

TIFF TIFF .... TIFF TIFF .... Internet Fax

JPEG(1) JPEG(2) .... JPEG(1) Mail to Print

TIFF JPEG JPEG Mail to Print

JPEG TIFF JPEG Mail to Print

Text PDF PDF Mail to Print

TIFF PDF PDF Mail to Print

JPEG PDF JPEG Mail to Print

PDF JPEG PDF Mail to Print

PDF(1) PDF(2) .... PDF(1) Mail to Print

If JPEG or PDF files are attached along with other types of file, the machine receives the e-mail by Mail to
Print. Only the first JPEG or PDF file is printed and the other files are deleted.

131
3. Reception

• If Reception Protocol is set to POP3 or IMAP4, you can use the E-mail Storage in Server setting (in
System Settings) to configure the machine to either retain or delete the received e-mail from the server.
See “System Settings”, Network and System Settings Guide.
• To specify whether or not the machine prints the header (title) and text (body) of each e-mail it receives,
use [Parameter Setting] (switch 21 bit 5) in [Fax Features]. See “Parameter Settings”.

• p.226 "Parameter Settings"


3
Receiving Internet Fax Documents

You can receive e-mail documents by Internet Fax.


There are two methods of receiving e-mail: Auto E-mail Reception and Manual E-mail Reception.

• If [Require Secure Password Authentication (SPA) for all client connections] is selected in Windows
Server 2003/2003 R2, reception is not possible.

• With User Parameter (switch 21, bit 1) in the Fax Features menu, you can have the machine send the
return receipt in response to the reception notice request attached to the sent e-mail. For details about
Parameter Setting, see “Parameter Settings”.

• p.226 "Parameter Settings"

Auto e-mail reception


When this function is turned on, the machine periodically checks the e-mail server for incoming e-mail and
downloads it as necessary.

• If memory runs out, e-mail will not be received at the specified intervals. Reception will resume when
sufficient memory becomes available.
• E-mail auto-reception should be set in “System Settings”. When you select auto-reception, set the
reception interval in minutes under E-mail Recept. Interval, in System Settings. See “System Settings”,
Network and System Settings Guide.
• E-mail can also be received manually. For details about the manual reception, see “Manual e-mail
reception”.

132
Receiving E-mail

• p.133 "Manual e-mail reception"

Manual e-mail reception


Use this function to receive an e-mail by accessing the e-mail server manually.

• Program the Manual E-mail Reception function to a User Function key beforehand. For details about
the User Function keys, see “General Settings/Adjust”. 3
1. Press the User Function key ([F1] to [F3]) programmed with Manual E-mail Reception.

BRJ037S

2. Press the [Start] key.

The machine accesses the server to check for e-mail and receives any new e-mail.
The standby display appears.

• Alternatively, press the [Job Information] key, and then select [Manual E-mail Reception] to receive
e-mail.

• p.199 "General Settings/Adjust"

133
3. Reception

Received images
Here is an example of an Internet Fax document sent from this machine and received on a computer using
the Outlook Express e-mail application.
The received image varies according to the e-mail application.

• When Internet Fax e-mail is sent to computer, the following information is always inserted in the e-
mail text “This E-mail was sent from “Host Name” (product name) Queries to: “Administrator's e-mail
address””. To check the machine's host name and administrator's e-mail address, use Host Name or
3 Admin. E-mail Address under System Settings. For details about Host Name and Admin. E-mail
Address, see “System Settings”, Network and System Settings Guide.

BBB034S

1. E-mail transmitted without specifying a subject in “E-mail Options”.


2. E-mail transmitted with a subject specified in “E-mail Options”.
3. From
The name (e-mail address) of the sender
4. Date
The date and time of e-mail transmission
5. To
The e-mail address of the recipient

134
Receiving E-mail

6. Subject
Shows the subject specified in “E-mail Options” at the time of transmission. If no subject is specified, one is
automatically assigned in the format shown in 1 above.
7. The message is inserted in all e-mail. “xxxx” is the machine name.
8. Attachment File
Any document included by the sender is displayed as an attached document.

• The display format of the sender name differs according to that of the Stamp Sender Name setting
and other functions. 3
• The display format of the subject varies according to Stamp Sender Name and other settings. For the
format of the subject, see “E-mail Subject”.

• p.34 "E-mail Subject"

Mail to Print

JPEG or PDF files that are attached to e-mails are printed using the Mail to Print function.
The reception method for e-mail is the same as the method for Internet Fax. For details about reception
methods, see “Auto e-mail reception” and “Manual e-mail reception”.
Mail to Print is not available with the following functions:
Checkered Mark, TSI Print (Transmitting Subscriber Identification Print), Reception Time, Auto Fax Reception
Power-Up, Memory Lock, Program Special Sender, Resolution, Page Separation and Length Reduction,
Center Mark, 2 Sided Print, Communication Page Count, Forwarding, Auto Paper Select function, Just size
printing

• To print a JPEG or PDF file, the optional PostScript 3 unit must be installed.
• Version 1.3, 1.4, 1.5, and 1.6 PDF files are printable. However, this machine might not be able to
print PDF files if they were sent from certain machines or created in certain environments.
• This machine cannot print Exif format JPEG images captured by digital cameras, but it can print JFIF
format JPEG images created on multi-function peripherals. However, this machine might not be able
to print JPEG images if they were sent from certain machines or created in certain environments.

• The Fax Features menu provides a user parameter setting (switch 21, bit 2) that you can use to enable
or disable this function. Text and TIFF files will still be printed even if this function is disabled.

135
3. Reception

• If a JPEG or PDF file is received when the Mail to Print function is disabled, the file will be detected as
an error and Error Mail Notification is sent back to the sender. You can turn this function on or off with
the User Parameter (switch 21, bit 7) in Parameter Settings.
• For details about Parameter Setting, see “Parameter Settings”.
• Only one attached file can be printed from a received e-mail. If multiple JPEG or PDF files are attached,
the first JPEG or PDF file is printed and the other files are deleted.
• If an e-mail contains multiple or unsupported files, its reception result is detected as an error, but an
error notification is not sent to the sender.

3 • Printing is in black and white even if the image that is received contains color.
• Printed JPEG images and PDF files are counted as printer jobs.
• If an encrypted PDF is received, the PDF file is printed only if its password matches this machine's
password.
• You can check the results of Mail to Print reception using the Journal. In the Journal, “P.1” is always
printed in the number of pages column and “S”, which indicates the Standard resolution, is always
printed in the communication mode column regardless of the actual page/resolution. If the machine
receives files that are unprintable due to their format, “error” will be printed in the result column.
• When receiving by Mail to Print, this machine does not respond to reception notification requests
attached to the received e-mail.

• p.132 "Auto e-mail reception"


• p.133 "Manual e-mail reception"
• p.226 "Parameter Settings"

136
Reception Functions

Reception Functions
This section explains useful functions for receiving fax documents.

• To use Internet Fax and IP-Fax functions, the Hard Disk Drive Option and printer/scanner functions
must be installed.

Forwarding Received Documents 3


This machine can forward received documents to other destinations programmed in this machine.

BBB038S

• To use this function, specify the Forwarding destination in advance. Forwarding can be specified
under Forwarding on the Fax Features menu. See “Forwarding”.

• A fax number, Internet Fax address, IP-Fax destination, or folder address can be set as a forwarding
destination.
• If an e-mail address is programmed as the destination, documents received are forwarded as e-mail.
• If you would like the machine to forward received documents to a particular destination according
to the sender, specify the Forwarding destination for each sender under Fax Features, Administrator
Tools, Program Special Sender. Documents from other senders are forwarded to the default
Forwarding destination specified for this function. For details about Program Special Sender, see
“Program Special Sender”.

137
3. Reception

• You can select whether the machine prints out the documents it forwards with User Parameter (switch
11, bit 6) in the Fax Features menu. For details, see “Parameter Settings”.
• You can set whether or not the Folder Transfer Result Report is transmitted to the specified e-mail
address if folders are programmed as the forwarding destinations to which documents are sent from
all senders or Special Senders. For details, see “Administrator Tools”.
• The Fax Features menu provides a user parameter setting (switch 32, bit 0) that allows you to select
a priority order for alternative destinations for sent documents. When this parameter is set, if the
specified receiver is a group destination that includes an address not registered for the specified
transmission type, the document is routed to an alternative destination.
3 • User Parameters (switch 37, bit 4) on the Fax Features menu allows you to include the sender's name
in the names of files sent to folders. For details, see “Parameter Settings”.
• Garbling of the file name and data loss can result if the receiver's operating system cannot accept
certain characters in file names. To prevent this, use User Parameters (switch 37, bit 5) to limit the file
names to plain characters only. For details, see “Parameter Settings”.
• If you limit file names to plain characters only but errors still occur, disable display of the sender's
name in the file name of documents forwarded to folders.
• Using the User Parameters (switch 38, bit 7-0 and switch 39, bit 7-0) on the Fax Features menu, you
can specify the number of fax resend attempts and the interval between them. These settings become
useful when the receiver is a folder destination and the connection to the destination computer fails.
For details, see “Parameter Settings”.
• For the maximum number of destinations you can program in a group, see “Maximum Values”.

• p.208 "Administrator Tools"


• p.222 "Forwarding"
• p.226 "Parameter Settings"
• p.241 "Program Special Sender"
• p.258 "Maximum Values"

SMTP Reception Using Internet Fax

You can receive a document sent by Internet Fax using SMTP reception.
With SMTP reception, e-mail is received as soon as it is sent to the e-mail address set by the machine.

138
Reception Functions

BBB037S
3
• Set this machine beforehand using the MX record of the DNS server to enable SMTP reception.
• Use the Reception Protocol setting in System Settings to set the reception protocol. See “System
Settings”, Network and System Settings Guide.

• You can route received e-mail to other Internet Fax machines as well.
• Even if SMTP reception is enabled on the DNS server, e-mail sent from the SMTP server will not be
received and the machine reports an error if SMTP reception is not set in “System Settings”. Also, the
SMTP server sends error notification e-mail to the originator.
• If an error occurs while receiving e-mail, reception is aborted, the e-mail is deleted, and Error Report
is printed. Also, the SMTP server will send error notification e-mail to the originator.
• When the SMTP server attempts to route received documents to this machine while the machine is
transmitting e-mail, the machine will respond to the SMTP server with a “busy” signal. Then, the SMTP
server usually tries resending the documents until the set timeout.

Routing e-mail received via SMTP


E-mail received via SMTP can be routed to other fax machines.

139
3. Reception

BBB038S

• Before routing e-mail received via SMTP, you first must set “SMTP RX File Delivery” to “On” in the
Fax Features menu. See “E-mail Settings”.
• Depending on security settings, this function may not be available.
The originator can request transfer of e-mail sent to another fax machine by specifying the e-mail address
as follows:
Fax Number
fax=destination fax number@host name of this machine. domain name
Example: to transfer to fax number 212-123-4567, specify:
fax=2121234567@abc.company.com
Single destination programmed in the Quick Dial Keys
fax= registration number of 3 digits or less@host name of this machine.domain name
Example: to transfer to the destination number 001:
fax= 001@abc.company.com
Group destination programmed in the destination list
fax= registration number of 3 digits or less@host name of this machine.domain name
Example: to transfer to the destination programmed under group number 004:
fax= 004@abc.company.com

• E-mail received via SMTP can also be routed to single or group destinations programmed in the
destination list.

140
Reception Functions

• If an e-mail transfer request is received when the “SMTP RX File Delivery” is “Off” in the Fax Features
menu, this machine responds with an error message to the SMTP server.
• You can make settings that limit transfer to specified originators.
• Using this function, you can also send documents from your e-mail application to e-mail addresses
and G3 fax machines' destinations through this machine simultaneously.
• For the maximum number of destinations you can program in a group, see “Maximum Values”.
• The Fax Features menu provides a user parameter setting (switch 32, bit 0) that allows you to select
a priority order for alternative destinations for sent documents. When this parameter is set, if the
specified receiver is a group destination that includes an address not registered for the specified
transmission type, the document is routed to an alternative destination. See “Parameter Settings”.
3

• p.203 "E-mail Settings"


• p.226 "Parameter Settings"
• p.258 "Maximum Values"

JBIG Reception

If you use JBIG (Joint Bi-level Image Experts Group) compression, you can send photographic originals
faster than with other methods of compression. It allows you to receive documents sent in the JBIG format
through JBIG Transmission.

• This function is not available with Internet Fax function and Mail to Print functions.

Auto Fax Reception Power-Up

This machine can be set to shut down automatically if no one has used it for a while. In these situations,
even though the operation switch is off, the machine can still receive incoming documents as long as the
main power switch is on.

• Reception is not possible if both the operation switch and the main power switch are turned off.

• You can set whether documents are printed as soon as they are received (Immediate Reception) with
the User Parameter (switch 14, bit 0) in the Fax Features menu. See “Parameter Settings”.
• You can also have fax documents received by Memory Reception (Substitute Reception) printed after
the machine is turned on.

141
3. Reception

• p.226 "Parameter Settings"

142
Printing Options

Printing Options
This section explains useful functions for printing received documents.

Print Completion Beep

When this function is turned on, the machine beeps to let you know when a received document is printed.

• You can alter the volume of the beep or turn it off completely using “Adjust Sound Volume” in General
3
Settings/Adjust (set the volume to the minimum level). See “Adjusting the Volume”, Troubleshooting.

Checkered Mark

When this function is turned on, a Checkered Mark is printed on the first page of fax documents to help
you separate them.

BBB039S

• You can turn this function on or off using Checkered Mark in the Fax Features menu. See “Reception
Settings”.

• p.201 "Reception Settings"

Center Mark

When this function is enabled, marks are printed halfway down the left side and at the top center of each
page received.
This makes it easy for you to position a hole puncher correctly when you file received documents.

143
3. Reception

3 BBB040S

• You can enable or disable this function using Center Mark in the Fax Features menu. See “Reception
Settings”.
• The Center Mark may deviate a little from the exact center of the edge.

• p.201 "Reception Settings"

Reception Time

You can have the date, time, and file number printed at the bottom of the document when it is received.

• You can turn this function on or off using Print Reception Time in the Fax Features menu. See “Reception
Settings”.
• When a received document is split and printed on two or more sheets, the reception time is printed
on the last sheet.
• The time when the document was printed can also be recorded on the document. If you need this
function, contact your service representative.

• p.201 "Reception Settings"

Two-Sided Printing

You can have a received document printed on both sides of a sheet.

144
Printing Options

BBA047S

3
• To use this function, all pages of the received document must be of the same size-inform the sending
party of this beforehand if necessary. You must also have paper set in the machine of the same size
as that sent by the sending party. In Two-Sided Printing, this machine will correctly receive in A4 ,
B5 JIS (81/2 × 14 , 81/2 × 11 ). The following table shows the results that can be achieved
when receiving with this machine.

BRJ022S

• This function works only when all pages are of the same width and received into memory.
• This function cannot be used with Combine Two Originals.

• You can turn this function on or off using 2 Sided Print in the Fax Features menu. For details, see
“Reception Settings”.
• Printouts may vary depending on how the sender sets the originals.
• You can select to have documents only from selected senders printed in this way.
• Stored documents of the same size are printed on the same paper. Some stored documents may be
unavailable for this printing option.

• p.201 "Reception Settings"

145
3. Reception

Combine Two Originals

When two documents of the same size and orientation are received consecutively, they are printed on a
single sheet when you turn this function on. This can help you economize on paper.

• This function does not work with documents larger than A5 or 81/2 × 51/2 . When A5 or
81/2 × 51/2 size paper is loaded in the machine, each page of the received document is printed
on a single sheet.
3 • If paper matching the size and orientation of a received document is available, Combine Two
Originals is not possible.

BAS038S

• Two A5 documents are printed side by side on a sheet of A4 .


• Two 81/2 × 51/2 documents are printed side by side on a sheet of 81/2 × 11 .

• You can turn this function on or off with the User Parameter (switch 10, bit 1) in the Fax Features menu.
See “Parameter Settings”.
• This function uses Memory Reception.

• p.226 "Parameter Settings"

Page Separation and Length Reduction

If the size of a received document is longer than the paper loaded in the machine, each page of the
document can be split and printed on several sheets, or reduced and printed on a single sheet.

146
Printing Options

BBB045S
3
For example, this function splits the document if the document length is 20 mm (0.79 inch) or longer than
the paper used. The document is reduced if it is less than 20 mm (0.79 inch). When a document is split, an
asterisk ( ) is inserted at the split position and about 10 mm (0.39 inch) of the split area is duplicated on
the top of the second sheet.

• Your service representative can customize this function with the following settings:
• Reduction
• Print split mark
• Overprinting
• Overprinting length
• Guideline for split
• You can adjust the overprinting and reduction lengths within the following ranges:
• Overprinting length: 4 mm (0.16 inch), 10 mm (0.39 inch), 15 mm (0.59 inch)
• Guideline for split: 5-155 mm (5 mm steps)/0.2-6.1 inches (0.2 inch steps)

TSI Print (Transmitting Subscriber Identification Print)

You can have the sender's Own Name or Own Fax Number printed on documents that this machine
receives.
Usually the sender's Fax Header is printed on received documents. When you receive an Internet Fax
document, the e-mail address of the sender is printed. If the sender has not programmed their Fax Header,
you will not be able to identify them. However, if you turn this function on, the sender's Own Name or Own
Fax Number is printed instead so you can find out where the document came from.

• You can turn this function on or off with the User Parameter (switch 02, bit 3) in the Fax Features menu.
See “Parameter Settings”.

147
3. Reception

• p.226 "Parameter Settings"

If There Is No Paper of the Correct Size

If there is no paper in the machine that matches the size of a received document, the machine will choose
a paper size based on the paper available.
If you have not set the same size paper in the paper tray, incoming fax documents are printed on the nearest
3 size available.
For example, if your machine does not have 51/2 × 81/2 loaded and you receive a 51/2 × 81/2 size
document, the document is printed on 81/2 × 11. If your machine does not have 81/2 × 11 loaded and
you receive an 81/2 × 11 size document, the document is printed on two sheets of 51/2 × 81/2.

• The document is split over two sheets of paper depending on the paper size. See “Page Separation
and Length Reduction”.
• Paper placed in the bypass tray is not usually selected for printing a received document.
• Widths that this machine can receive are A4 and 81/2 × 11. Any documents narrower than A4 or
81/2 × 11 are received at A4 or 81/2 × 11 width. The length of documents depends on the document.
• The paper size used to print a received document may be different from the size of the sent original.

• p.146 "Page Separation and Length Reduction "

Setting priority trays


With the same size of paper loaded into multiple trays, you can make the machine use one tray for one
function and another tray for another function.
For example, you may load white A4 paper into tray 1 to use when making copies, and yellow A4 paper
into tray 2 to use when printing received faxes. You can then easily identify for which purpose paper has
been output. You can perform this setting in “Ppr Tray Priority:Fax” in “System Settings”. See “System
Settings”, Network and System Settings Guide.

• When a different size of document from the priority tray is received, the tray containing the same size
of paper as the received document is used.

Just size printing


If you enable this function, received documents are printed on the sheet that has the highest priority.

148
Printing Options

This function is enabled with User Parameter (switch 05, bit 5) in the Fax Features menu. See “Parameter
Settings”.
If the paper tray is not stocked with paper of a suitable size to print a received document, a message
appears on the display prompting you to load paper of the required size. When you have loaded new
paper, press [Exit] to print the document.

3
• After pressing [Exit], procedure varies depending on machine status when the message occurred.
• If any received documents or reports were being printed automatically, the machine
automatically continues printing from where it left off.
• If any documents or reports were being printed manually, the machine does not resume printing.
Perform the operation from the beginning again.

• p.226 "Parameter Settings"

149
3. Reception

150
4. Confirming Communication
Information
This section explains the features of the [Job Information] key, which you can use to confirm communication
results on the screen or printed reports.

Printing a List of Files in Memory (Print TX


Standby File List)
Print this list if you want to find out which files are stored in memory and what their file numbers are.
Knowing the file number can be useful (for example when erasing files). 4
1. Press the [Job Information] key.

BRJ036S

2. Select [Print TX Standby File List] using [ ] or [ ], and then press the [OK] key.

To cancel printing before pressing the [OK] key, press the [Escape] key. The standby display appears.
3. Press the [Start] key.

To cancel printing after pressing the [Start] key, press the [Clear/Stop] key. The display returns to that
of step 2.

151
4. Confirming Communication Information

The display returns to that of step 2 after printing a TX Standby File List.
4. Press the [Escape] key.
The standby display appears.

• The contents of a file stored in memory can also be printed.


• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu. See “Parameter Settings”.

• p.226 "Parameter Settings"

152
Printing a File from Memory

Printing a File from Memory


If you want to check the contents of a file that is stored in memory and not yet sent, use this procedure to
print it out.

1. Press the [Job Information] key.

BRJ036S

2. Select [Check/Stop TX File] using [ ] or [ ], and then press the [OK] key.

3. Select the file you want to print using [ ] or [ ].

To cancel printing, press the [Escape] key. The display returns to that of step 2.
4. Press [Print].

153
4. Confirming Communication Information

5. Press the [Start] key.

If you want two-sided printing, press [2 Sided].


To cancel printing after pressing the [Start] key, press the [Clear/Stop] key. The display returns to that
of step 3.
The display returns to that of step 3 after printing a TX Standby File.
Repeat from step 3, if you want to print another file.
4 6. Press the [Escape] key twice.
The standby display appears.

154
Checking the Transmission Result (TX File Status)

Checking the Transmission Result (TX File Status)


You can confirm transmission by the display, report, or e-mail.

Confirming on Display

Use this function to display the transmission results.

1. Press the [Job Information] key.

BRJ036S

2. Select [TX File Status] using [ ] or [ ], and then press the [OK] key.

3. Check the transmission results using [ ] or [ ].

When a fax is sent, the Own Fax Number or Own Name information of the receiver appears. When
an Internet Fax is sent, the e-mail address you entered or the name programmed in the machine's
destination list appears. For a transmission from a computer, “-- LAN-Fax -->” is shown.
4. Press the [Escape] key twice.
The standby display appears.

• Only the transmission results of the latest communications are displayed. For the maximum number of
communication results you can check on this machine, see “Maximum Values”.

155
4. Confirming Communication Information

• You can view sent fax documents and their lists, using Web Image Monitor on a network computer.
For details, see the Web Image Monitor's Help.
• If a transmission is completed while you are using this function, the result will not appear. To view the
latest result, exit TX File Status, and then try again.
• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1 and 2. For details about the User Function keys, see “General Settings/Adjust”.
• When documents are transmitted from the computer to the machine, “--LAN-Fax -->” appears. To
check if the documents are sent to the receiver, confirm the same File No.

• p.199 "General Settings/Adjust"

4 • p.258 "Maximum Values"

Confirming by Report

Print reports for confirmation.


Memory Transmission
You can confirm the result with a Communication Result Report.
This report is printed each time a Memory Transmission is completed if turned on with User Parameter
(switch 03, bit 0) in the Fax Features menu.
You can also print the report by programming the Print TX Status Report to a User Function key and
pressing this when specifying a destination.
If you turn the Communication Result Report on, the Communication Failure Report is not printed.
For details about the contents printed in the reports, see “Communication Result Report (Memory
Transmission)” or “Communication Failure Report”.
Immediate Transmission
You can confirm the result with an Immediate TX Result Report.
Select to print this report with User Parameter (switch 03, bit 5) in the Fax Features menu. A report is
printed after every Immediate Transmission is completed.
You can also print the report by programming the Print TX Status Report to a User Function key and
pressing this when specifying a destination.
For details about the contents printed in the report, see “Immediate TX Result Report (Immediate
Transmission)”.

• For details about Parameter Setting and User Function key, see “Parameter Settings” or “General
Settings/Adjust”.

156
Checking the Transmission Result (TX File Status)

• p.158 "Communication Result Report (Memory Transmission)"


• p.159 "Immediate TX Result Report (Immediate Transmission)"
• p.159 "Communication Failure Report"
• p.199 "General Settings/Adjust"
• p.226 "Parameter Settings"

Confirming by E-mail

Use the E-mail TX Result function to send reports by e-mail to a computer, and then confirm them on the
computer. 4
The available reports are:
• Communication Result Report.
• Immediate TX Result Report.
• Polling with SEP RX Result.

• To confirm transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
• You must first register the e-mail addresses of the destinations the report is to be sent to on the
destination list. For details about registering e-mail addresses, see “Registering Addresses and Users
for Facsimile/Scanner Functions”, Network and System Settings Guide.

• For details about E-mail TX Result, see “Sender Settings”.


• For details about the contents of the reports, see “Communication Result Report (Memory
Transmission)”, “Immediate TX Result Report (Immediate Transmission)”, and “SEP Code RX Result
Report”.
• When using the Sender Settings function to select the sender, the transmission results are sent to
senders' e-mail addresses that have been registered. Select the sender from the Internet Fax
destinations in the destination list. For details, see “Sender Settings”.
• If you send fax documents from a computer, use LAN-Fax Driver to specify whether or not the e-mail
notification of transmission results is sent to the computer.

• p.101 "Sender Settings"


• p.118 "SEP Code RX Result Report"
• p.158 "Communication Result Report (Memory Transmission)"

157
4. Confirming Communication Information

• p.159 "Immediate TX Result Report (Immediate Transmission)"

Confirming by Report and E-mail

You can confirm transmission results using both the E-mail TX Result function, which sends the results by e-
mail, and the Communication Result Report printed by the machine.
You can set whether to use both of these together in User Parameter (switch 10, bit 6) in the Fax Features
menu. See “Parameter Settings”.

• p.226 "Parameter Settings"


4
Communication Result Report (Memory Transmission)

This report is printed when a Memory Transmission is completed, so you can check the result of the
transmission.

• You can turn this function on or off with the User Parameter (switch 03, bit 0) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
• The Pg(s) column gives the total number of pages. The Page Not Sent column gives the number of
pages that could not be sent successfully.
• “--” indicates that the Internet Fax document was sent to the mail server programmed in this machine.
(However, this does not mean the e-mail was delivered.)
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• If two or more destinations are specified, this report is printed after the fax document is sent to all the
destinations.
• If the machine is set up not to print this report and the fax document could not be successfully
transmitted, a Communication Failure Report is printed. See “Communication Failure Report”.

• p.159 "Communication Failure Report"

158
Checking the Transmission Result (TX File Status)

• p.226 "Parameter Settings"

Immediate TX Result Report (Immediate Transmission)

If you turn this report on, a report is printed after every Immediate Transmission so you have a record of
whether the transmission was successful or not.
If the machine is set up not to print this report and the fax document could not be successfully transmitted,
the Error Report is printed instead.

• You can switch this report on or off in the User Parameter (switch 03, bit 5) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter 4
(switch 04, bit 4) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.
• To view the report without text disruption, select a font of even character width in your e-mail
application's settings.
• If the page was sent successfully, the Page column gives the total number of pages sent successfully.

• p.226 "Parameter Settings"

Communication Failure Report

This report is printed when a document could not be successfully transmitted with Memory Transmission.
If the machine is set up to print a Communication Result Report, this report is not printed. Use it to keep a
record of failed transmissions so you can send them again.

• You can select whether the Communication Failure Report is automatically printed using the User
Parameter (switch 04, bit 1) in the Fax Features menu.
• This report is only printed if the Communication Result Report is turned off and a document could not
be successfully transmitted with Memory Transmission.
• You can select whether to include part of the original image on the report with the User Parameter
(switch 04, bit 7) in the Fax Features menu.
• If user authentication is set, you can select whether to display a destination with the User Parameter
(switch 04, bit 4) in the Fax Features menu.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.

159
4. Confirming Communication Information

• The Pg(s) column gives the total number of pages. The Page Not Sent column gives the number of
pages that could not be sent successfully.
• “Unprogrammed” indicates that the document could not be sent because the forwarding destination
is not programmed.
• “--” indicates that the Internet Fax document was sent to the mail server programmed in this machine.
(However, this does not mean the e-mail was delivered.)

• p.226 "Parameter Settings"

160
Checking the Reception Result (RX File Status)

Checking the Reception Result (RX File Status)


Confirm the reception result on the screen or in a report.

Confirming on Display

Use this function to display the reception result.

1. Press the [Job Information] key.

BRJ036S

2. Select [RX File Status] using [ ] or [ ], and then press the [OK] key.

3. Check the reception results using [ ] or [ ].

When a fax or IP-Fax is received, the sender's fax number or Fax Header information appears. When
an Internet Fax is received, the sender's e-mail address appears.
4. Press the [Escape] key twice.
The standby display appears.

• Only the reception results of the latest communications are displayed. For the maximum number of
communication results you can check on this machine, see “Maximum Values”.

161
4. Confirming Communication Information

• You can view received fax documents and their lists, using Web Image Monitor on a network
computer. For details, see the Web Image Monitor's Help.
• If a document is received while you are using this function, the result will not appear. To view the latest
result, exit RX File Status, and then try again.
• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1 and 2. For details about the User Function keys, see “General Settings/Adjust”.

• p.199 "General Settings/Adjust"


• p.258 "Maximum Values"

4 Confirming by Report

Print a report to confirm reception results.

Journal
Print the Journal to confirm the latest reception results.
For details, see “Printing the Journal”.

• p.163 "Printing the Journal"

162
Printing the Journal

Printing the Journal


You can print the Journal manually.

• The contents of a Journal printed automatically are deleted after printing. Keep the journal if you
require a record of transmissions and receptions.

1. Press the [Job Information] key.

BRJ036S

2. Select [Print Journal] using [ ] or [ ], and then press the [OK] key.

3. Press the [Start] key.


To cancel printing after pressing the [Start] key, press the [Clear/Stop] key. The display returns to that
of step 2.
The display returns to that of step 2 after printing the Journal.
4. Press the [Escape] key.
The standby display appears.

• You can set whether the Journal is automatically printed after every 50 communications with the User
Parameter (switch 03, bit 7) in the Fax Features menu.
• Depending on security settings, the Journal is not automatically printed.
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu.
• For details about Parameter Setting, see “Parameter Settings”.

163
4. Confirming Communication Information

• You can program one of the User Function keys with operations for this function. Using the key allows
you to omit steps 1, 2, and 4. For details about the User Function keys, see “General Settings/Adjust”.
• Depending on security settings, the Destination/Sender name may not appear.
• For the maximum number of communication results printed in the Journal, see “Maximum Values”.

• p.199 "General Settings/Adjust"


• p.226 "Parameter Settings"
• p.258 "Maximum Values"

Journal
4
This section explains the items printed in the Journal.

BRJ041S

1. Printing date
Shows the date and time the report was printed.
2. Programmed Fax Header
Shows the sender name programmed for printing.

164
Printing the Journal

3. Date
Shows the transmission or reception date.
4. Time
Shows the transmission or reception start time.
5. Other end
• For fax destinations
Shows the name (for display) programmed by the other end.
Shows the programmed fax number if the name (for display) was not programmed.
If neither name nor fax number was programmed by the other end, an entered fax number or a name
programmed in a destination list is shown for transmissions.
• For Internet Fax destinations
At time of transmission, it shows the e-mail address or name programmed in the destination list. At time of 4
reception, it shows the e-mail address of the sender.
At time of broadcasting transmission, it shows the number of destinations after the e-mail addresses or
names of destination.
When documents are transmitted from the computer to the machine, “--LAN-Fax -->” appears. To check if
the documents are sent to the receiver, confirm the same File No.
• For IP-Fax destinations
Shows the IP-Fax destination or name programmed in the destination list. The fax destination details appear
on the reception report.
• For Folder destinations
Shows the name programmed in the destination list.
6. Communication mode
• For fax transmissions and receptions
After “G3”, “T” for outgoing faxes or “R” for incoming faxes, and the communication mode appear in
alphabetical letters or symbols.
• For Internet Fax transmissions and receptions
After (e-mail mark), “T” for outgoing e-mail or “R” for incoming e-mail, and the communication mode
appear in alphabetical letters or symbols. Documents sent from Internet Fax destinations are received by
Internet Fax, and documents sent from e-mail destinations are received by Mail to Print. “Q” indicates
outgoing e-mail for which a Reception Notice is set in “TX Mode”, whereas “A” indicates reception notice
e-mail.
• For IP-Fax transmissions and receptions
After (IP-Fax mark), “T” for outgoing faxes or “R” for incoming faxes, and the communication mode
appear in alphabetical letters or symbols.
• For forwarding to the folder destinations
After (folder mark) and “T” for outgoing faxes, the communication mode appears in alphabetical letters
or symbols.
7. Communication time
Shows time taken for transmissions or receptions.

165
4. Confirming Communication Information

8. Number of pages
Shows the number of pages transmitted or received.
9. Communication result
Shows the result of transmissions or receptions.
OK: All pages were properly transmitted or received. When Reception Notice is activated using the Internet Fax
E-mail Options, receipt of Reception Notice is shown.
--: The Internet Fax document was sent to the mail server programmed in this machine. (However, this does not
mean the e-mail was delivered.) When using LAN-Fax, the results of communication from a computer to this
machine are shown.
E: A communication error occurred.
D: Power was disconnected during communication. Not all fax documents were transmitted.

4 10. User name


Shows the sender's name.
11. File number
Shows file management numbers.

• For Mail to Print reception, “P.1” is always printed in the number of pages column and “S”, which
indicates the Standard resolution, is always printed in the communication mode column regardless
of the actual page/resolution.
• To prioritize a fax number or name programmed in the destination list, contact your service
representative.

Transmitting Journal by E-mail

Use this function to send the Journal to the administrator's e-mail address.
The Journal is sent automatically after every 50 communications. A CSV format Journal is attached to the
e-mail.

• To transmit the Journal by e-mail, the Hard Disk Drive Option and printer/scanner functions must be
installed.
• To transmit the Journal by e-mail, it is necessary to make settings with User Parameter (switch 21, bit
4) in the Fax Features menu. See “Parameter Settings”.
• This machine does not store sent CSV files. It is recommended that you double-check the e-mail address
of an administrator before the Journal is transmitted. If the e-mail address of the administrator is not
correct, your important Journal may be lost. Sent CSV files are not left on the fax machine.

• If the administrator's address is wrong, you may not be able to acquire the Journal.

166
Printing the Journal

• If the Journal fails to be transmitted in e-mail format, the Journal is printed out.
• The name of an attached CSV file is “JOURNAL year, month, date, hours, minutes”. For example,
the file name transmitted in 14:40 on 20th, December, 2007 is “JOURNAL200712201440.csv”.
• The subject of a Journal sent by e-mail begins with “Journal”.

• p.226 "Parameter Settings"

Journal by e-mail
If the setting is made so that the Journal is transmitted as e-mail, it is transmitted to the e-mail address of an
administrator.
4
• If user authentication is set, you can select whether to display a sender name with the User Parameter
(switch 04, bit 5) in the Fax Features menu. For details about Parameter Setting, see “Parameter
Settings”.
• To confirm the administrator's e-mail address, use Admin. E-mail Address under System Settings. See
“System Settings”, Network and System Settings Guide.
• Depending on security settings, the Destination/Sender name may not appear.

• p.226 "Parameter Settings"

167
4. Confirming Communication Information

Printing a File Received with Memory Lock


Prints files received with Memory Lock.
This is a security function designed to prevent unauthorized users from reading your documents. If Memory
Lock is switched on, all received documents are stored in memory and are not automatically printed.
To print the documents, you have to enter the Memory Lock ID. When your machine has received a
document with Memory Lock, the Receive File indicator blinks.
Before using this function, the following preparations are required in the Fax Features menu.
• Program your Memory Lock ID under Program Memory Lock ID.
• Set Memory Lock to On.
4 For details about these settings, see “Administrator Tools”.

• If the main power switch is turned off for about twelve hours, all documents protected by Memory
Lock are deleted. When this happens, the Power Failure Report is printed so you can confirm which
documents have been deleted. See “Turning Off the Main Power / In the Event of Power Failure”,
Troubleshooting.

1. Confirm that the Receive File indicator is blinking.

BRJ038S

2. Press the [Job Information] key.

BRJ036S

168
Printing a File Received with Memory Lock

3. Select [Print Memory Lock File] using [ ] or [ ], and then press the [OK] key.

If no documents were received while Memory Lock was switched on, the message "There are no
memory lock files." is shown, and then the display returns to that of step 3.
4. Enter a 4-digit Memory Lock ID with the number keys, and then press the [Start] key.

If the Memory Lock ID does not match, the "Specified code does not match the programmed Memory
Lock ID." message appears, and then the display returns to the previous screen. Retry after checking
the Memory Lock ID.
5. Press the [Escape] key.
The standby display appears.

• Even when Memory Lock is available, if free memory is insufficient, reception is not possible.
• You can also apply a Memory Lock to documents that come only from certain senders.
• Documents received by SEP Code Reception are automatically printed even if this function is switched
on.
• If you print a Memory Lock File, it is deleted.

• p.208 "Administrator Tools"

169
4. Confirming Communication Information

170
5. Fax via Computer
This section explains how to use this machine's facsimile function from a computer via a network.

Sending Fax Documents from Computers


You can send a document created with a Windows application from a computer connected to the machine
to another fax machine.
Connect computers to the machine via parallel port, LAN, wireless LAN, or USB 2.0.
• To send a fax, simply select [Print...] from the Windows application, then select LAN-Fax as the printer,
and then specify a destination. LAN-Fax enables paperless faxing from your computer to the other
destinations.
• In addition to sending faxes, the LAN-Fax Driver allows this machine to be used for printing out
documents prepared on a computer for proof checking.
• To use the LAN-Fax Driver, connect this machine to computers and make the necessary network
5
settings, and then install the LAN-Fax Driver and the related utilities on your computer.

BBB052S

• To specify IP-Fax destinations or Internet Fax destinations, the Hard Disk Drive Option and printer/
scanner functions must be installed.
• Errors occurring when the machine is used as a LAN-Fax will not be displayed on the computer. Check
for errors by using Web Image Monitor. See Web Image Monitor help.

171
5. Fax via Computer

• It is recommended that you use Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
• This function supports both IPv4 and IPv6 addresses.

Before Use

To use LAN-Fax features, LAN-Fax Driver must be installed on your computer.


Use the LAN-Fax Driver included on the printer CD-ROM. You must also make the required computer to
fax network settings on the machine, according to the type of connection.

• When a personal computer and the machine are connected in parallel, See “Printing with Parallel

5 Connection”, Printer Reference and “Connecting the Machine”, Network and System Settings Guide.
• When using Ethernet or wireless LAN, see “Connecting the Machine”, Network and System Settings
Guide.

Using the Software

This section provides information about LAN-Fax Driver, Address Book, and LAN-Fax Cover Sheet Editor.

LAN-Fax Driver
This driver allows you to use LAN-Fax functions.

• All operations cannot be guaranteed depending on the system environment.


Location of the file
The following folder is on the CD-ROM:
• LAN-Fax Driver for Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008
\DRIVERS\LAN-FAX\XP_VISTA
Operating environment
• Computer
PC/AT compatible
• Operating systems
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003/2003 R2/2008

172
Sending Fax Documents from Computers

• Display
VGA 640 × 480 pixels or more

• Before beginning installation, exit all other applications.

Address Book
Address Book helps you edit LAN-Fax transmission destinations.
Operating systems
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003/2003 R2/2008

LAN-Fax Cover Sheet Editor 5


LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover sheets.
Operating systems
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003/2003 R2/2008

Auto Run program


The installers for various drivers and utilities launch automatically as Auto Run programs when you insert
the CD-ROM.
LAN-Fax Driver, Address Book, and LAN-Fax Cover Sheet Editor can be installed by Auto Run.

• If the plug and play function starts, click [Cancel] in the [Found New Hardware] dialog box, and then
insert the CD-ROM.
• Auto Run might not work automatically with certain OS settings. If this is the case, double-click
“Setup.exe”, located on the CD-ROM root directory.
• If you want to cancel Auto Run, hold down the [SHIFT] key (when your system is Windows 2000/
XP/Vista or Windows Server 2003/2003 R2, hold down the left [SHIFT] key) while inserting the CD-
ROM. Keep the [SHIFT] key held down until the computer stops reading the CD-ROM.
• Clicking [Cancel] during installation aborts the installation. If you cancel the installation, restart your
computer and install the rest of the software or printer driver.

173
5. Fax via Computer

• If your operating system is Windows 2000/XP/Vista or Windows Server 2003/2003 R2/2008,


installing a printer driver using Auto Run requires Administrator permissions. When you install LAN-
Fax Driver using Auto Run, log on using an account that has Administrator permissions.

Installing Individual Applications

You need to install a LAN-Fax Driver on your computer before using the LAN-Fax functions.
The LAN-Fax Driver is on the CD-ROM included with the machine.
Address Book and LAN-Fax Cover Sheet Editor are installed with the LAN-Fax Driver. Address Book helps
you edit LAN-Fax transmission destinations. LAN-Fax Cover Sheet Editor helps you edit LAN-Fax cover
sheets.
Use the following procedure to install LAN-Fax Driver, Address Book, and LAN-Fax Cover Sheet Editor at
5 one time.

• Before installing the above applications, install SmartDeviceMonitor for Client. For details about
installing SmartDeviceMonitor for Client, see “Using the SmartDeviceMonitor for Client Port”, Printer
Reference.

1. Quit all applications currently running.


2. Insert the CD-ROM included with this machine into the CD-ROM drive of your computer.
The installer launches automatically, and the language selection window appears.
Depending on your operating system settings, the installer may not launch automatically. If it does
not, double-click “Setup.exe” in the CD-ROM root directory to launch the installer.
3. Select the interface language of the software, and then click [OK].
4. Click [LAN-Fax Driver].
The software license agreement window appears.
5. Read all of the terms and, if you agree, select [I accept the agreement.], and then click
[Next].
If you select [I don't accept the agreement.], you cannot complete the installation.
6. Confirm that the [LAN-Fax Driver] check box is selected, and then click [Next].
7. Confirm that the [Printer Name:<LAN-Fax M13>] check box is selected, and then click
[Continue].
Select the desired port.
8. Click [Finish].
The installation completion dialog box appears.

174
Sending Fax Documents from Computers

9. Click [Finish].
10. Click [Exit].

Setting LAN-Fax Driver Properties

This section explains how to set properties required for using the LAN-Fax Driver.

• If your operating system is Windows 2000/XP/Vista or Windows Server 2003/2003 R2/2008,


log on using an account that has Administrator rights.

Setting print properties


This section explains how to make settings such as paper size or resolution.

1. On the [Start] menu, select [Control Panel]. Then select [Printers and Other Hardware], and
5
then [Printers and Faxes].
In Windows 2000, point to [Settings] on the [Start] menu, and then click [Printers].
In Windows XP Professional, Windows Server 2003/2003 R2, select [Printers and Faxes] on the
[Start] menu.
In Windows Vista or Windows Server 2008, select [Control Panel] on the [Start] menu. Then select
[Hardware and Sound], and then [Printers].
2. Select to highlight [LAN-Fax M13], then click [Properties] on the [File] menu.
In Windows Vista, click [Set printer properties].
3. Click [Printing Preferences...] to set the following properties.
• Paper Size
• Orientation
• Tray
• Resolution
4. Click [OK].

Making settings for option configuration


Make settings for optional units installed in this machine.

1. On the [Start] menu, select [Control Panel]. Then select [Printers and Other Hardware], and
then [Printers and Faxes].
In Windows 2000, point to [Settings] on the [Start] menu, and then click [Printers].

175
5. Fax via Computer

In Windows XP Professional, Windows Server 2003/2003 R2, select [Printers and Faxes] on the
[Start] menu.
In Windows Vista or Windows Server 2008, select [Control Panel] on the [Start] menu. Then select
[Hardware and Sound], and then [Printers].
2. Select to highlight [LAN-Fax M13], then click [Properties] on the [File] menu.
With Windows Vista, click [Set printer properties].
3. Click the [Accessories] tab, and then make the settings for the option configuration.
4. When the machine is connected to a network, option configuration is automatically
performed. If the settings do not match the installed optional units, click [Load from Device].
5. When the machine is connected locally to your computer, select the check boxes for the
installed optional units.
6. Click [Apply].
Option configuration settings are complete.
5 7. Click [OK].
[Accessories] tab
The [Accessories] tab contains the following items besides option configuration items.
• Prohibit manual destination entry
Check this option to inhibit direct destination specification.
• Enable E-mail
Check this when using Internet Fax with the LAN-Fax function.
• IP-Fax
Check this option when using IP-Fax.
After checking this option, select a protocol by clicking an appropriate radio button.

• If the options on this machine are not configured as instructed, LAN-Fax functions may fail.
• When this machine is connected to a network and the port is set via the “SmartDeviceMonitor for
Client” port, option configuration is automatically performed. For details, see LAN-Fax Driver's Help.

Basic Transmission

This section explains how to send fax documents created using Windows applications.
To send a fax, simply select [Print...] from the Windows application, then select [LAN-Fax M13] as the
printer, and then specify a destination in the [LAN-Fax] dialog box.
Open the application document you want to send or create a new document, and then perform the following
procedure.

176
Sending Fax Documents from Computers

For details, see LAN-Fax Driver's Help.

• When using SmartDeviceMonitor for Client, you cannot send documents to this machine using more
than one LAN-Fax at the same time.

1. On the [File] menu, click [Print...].


2. Select [LAN-Fax M13] in the list.
3. Click [Print].
The LAN-Fax dialog box appears.
The setting method may differ depending on the application you are using. In all cases, select [LAN-
Fax M13] for the printer.
4. Specify the destination.
You can specify the destination using the following methods:
• “Specifying a destination using a destination list” 5
• “Specifying a destination using Address Book”
• “Entering a destination directly”
When user authentication is used with this machine, click [User Settings...].
5. Specify necessary options.
For details about specifying options, see “Specifying Options” and “Confirming Transmission Results
by E-mail”.
6. Click [Send].
When you click [Send & Print], the fax is sent to the destination and your machine prints a copy of the
document you sent.

• The machine can retain documents sent from a LAN-Fax Driver as files to be sent.
• For the maximum values of the following items, see “Maximum Values”.
• Number of destinations you can specify per file
• Number of documents sent from a LAN-Fax Driver that the machine can retain as files to be sent

• p.178 "Specifying a destination using a destination list"


• p.178 "Specifying a destination using Address Book"
• p.179 "Entering a destination directly"
• p.180 "Specifying Options"
• p.183 "Confirming Transmission Results by E-mail"
• p.258 "Maximum Values"

177
5. Fax via Computer

Specifying a destination using a destination list


This section explains how to specify destinations in the machine's Address Book using the LAN-Fax Driver.

• To use a destination list to specify a destination, you must insert the machine's address book data into
the destination table of the LAN-Fax Driver. See “Using the Machine's Address Book as the LAN-Fax
Destination List”.

1. Click the [Address Book] or [Specify Destination] tab.


The [Address Book] or [Specify Destination] tab appears.
2. Select the [Device Address] (or [Use device address]) check box.
Device addresses that were registered by selecting the [Use device address] check box of the [Specify
Destination] tab appear.
3. Click the destination in the destination list to highlight it. On the [Specify Destination] tab,
5 enter the registration number of the destination list in the [Device Address:] box.
4. Click [Set as Destination].
The entered destination is added and appears in the [List of Destination:] box.
If you add a destination by mistake, click the wrong destination, and then click [Delete from List].
5. To specify more destinations, repeat steps 3 and 4.

• For details about specifying destinations, see the LAN-Fax Driver's Help.

• p.189 "Using the Machine's Address Book as the LAN-Fax Destination List"

Specifying a destination using Address Book


This section explains how to specify a destination using Address Book.

• In order to use this method, you need to register destinations in the address list using Address Book.
• To use device address data as the LAN-Fax Driver destination table, you must convert the destinations
registered on the machine to a CSV file and send that file to your computer. For details, see “Using
the Machine's Address Book as the LAN-Fax Destination List”.

1. Click the [Address Book] tab.


The [Address Book] tab appears.

178
Sending Fax Documents from Computers

2. Select a CSV file containing the desired destination list, from the [Address Book:] dropdown
menu.
Up to the three most recently used files appear in the dropdown menu. To use a destination list that
did not appear, click [Browse...], and then select the file.
3. Select [Contact] or [Group] in the [Name:] dropdown menu as the display format.
Destination list contents change as follows, depending on the option selected:
• Contact: Individual name, company name, department name, fax number
• Group: Group name
4. If you selected [Contact] in step 3, select the type of fax from the [Type:] dropdown menu.
To send by standard fax or IP-Fax, select [Fax]. To send by Internet Fax, select [E-mail].
5. Click the destination in the destination list to highlight it, and then click [Set as Destination].
The selected destination is added and appears in the [List of Destination:] box.
If you add a destination by mistake, click the wrong destination, and then click [Delete from List]. 5
In the Address Book list box, directly enter the name you want to search for. You can then jump to the
name you entered.
6. To specify more destinations, repeat steps 2 through 4.

• For details about specifying destinations, see the LAN-Fax Driver's Help.
• Destination list contents can be narrowed down by selecting the first letter of a contact name, company
name or group name in the [Search] dropdown menu.

• p.189 "Using the Machine's Address Book as the LAN-Fax Destination List"

Entering a destination directly


This section explains how to enter a destination manually.

1. Click the [Specify Destination] tab.


The [Specify Destination] tab appears.
2. Select the type of fax from the [Type:] dropdown menu.
To send by standard fax or IP-Fax, select [Fax]. To send by Internet Fax, select [E-mail].
After you select the fax type, the items corresponding to the selected type appear.
3. Specify the destination.
Specify the destination depending on the selected fax type as follows:
• If you selected [Fax]: enter the fax number. To send by IP-Fax, enter the IP-Fax destination.

179
5. Fax via Computer

• If you selected [E-mail]: enter the e-mail address.


To enter a pause in the fax number, click [Pause]. If you selected [E-mail] in step 2, [Pause] is not
available.
4. Specify settings according to the type of fax transmission.
Specify settings according to the type of fax transmission selected in step 2, as follows:
• If you selected [Fax], select a line or a protocol in the [Line:] list.
• If you selected [E-mail], select the [Do not use SMTP server] check box if you want to bypass the
SMTP server.
5. Click [Set as Destination].
The entered destination is added and appears in the [List of Destination:] box.
If you add a destination by mistake, click the wrong destination, and then click [Delete from List].
6. To specify more destinations, repeat steps 2 through 5.

5
• For details about specifying destinations, see the LAN-Fax Driver's Help.
• For the maximum number of digits that can be included in a destination, see “Maximum Values”.

• p.258 "Maximum Values"

Specifying Options

You can specify the transmission options when sending a fax.


• Sending at specific time
• Print Fax Header
• Attach a Cover Sheet
• 2 sided printing
• Preview
• Save as file

• For details about transmission options, see the LAN-Fax Driver's Help.

To send a fax document at a specific time


Specify a time for sending fax documents.

180
Sending Fax Documents from Computers

1. Click [Send Options].


The [Send Options] tab appears.
2. Select the [Sending at specific time] check box, and then specify a transmission time.

To print a sender stamp


Print a sender stamp that is registered in the machine.

1. Click [Send Options].


The [Send Options] tab appears.
2. Select the [Print Fax Header] check box.

To attach a cover sheet


Attach a cover sheet to a document. 5
1. Click [Send Options].
The [Send Options] tab appears.
2. Select the [Attach a Cover Sheet] check box.
A cover sheet is attached to the document you are sending.

• Click [Edit Cover Sheet...] to edit the cover sheet. For details, see “Editing Fax Cover Sheets”.

• p.187 "Editing Fax Cover Sheets"

To specify two-sided printing


You can configure this machine to perform two-sided printing.

1. Click [Send Options].


The [Send Options] tab appears.
2. Select the [2 sided printing] check box.

To display preview
Selecting the [Preview] check box allows you to check how the fax document will be output at the
destination.

181
5. Fax via Computer

1. Click [Send Options].


The [Send Options] tab appears.
2. Select the [Preview] check box.
3. Click [Print], [Send], or [Send & Print].
The [Preview] window appears.
4. Click [Next] or [Previous] to check the image.
To close the [Preview] window, click [Cancel].

Saving as files
You can save the fax document in TIFF format (TIFF-F).

1. Click [Send Options].

5 The [Send Options] tab appears.


2. Select the [Save as file] check box.
3. Click [Save to...].
4. Select a folder on the folder tree.
5. Select a method of file naming.
To enter a file name manually, select the [Specify file name when saving] check box. To have the file
assigned a name and saved automatically, select the [Automatically create a new file] check box.
6. Click [OK].
7. Click [Save] or [Save & Send].
If you select [Automatically create a new file], the image file is assigned a name and saved under the
specified folder.
The file name will be RicHHMMSS.tif (HH: hours, MM: minutes, SS: seconds).
8. Enter a file name.
You can also change the folder in this step.
9. Click [Save].
The image file is saved in the specified folder.

• Single-page documents are saved as single-page TIFF files, and multiple-page documents are saved
as multi-page TIFF files.

182
Sending Fax Documents from Computers

Checking Transmission Using LAN-Fax Driver

From “SmartDeviceMonitor for Admin”, “SmartDeviceMonitor for Client”, or Web Image Monitor, you
can check information about files sent using LAN-Fax Driver.
For the maximum number of transmission results you can check, see “Maximum Values”.
Also, you can save the contents of the Journal in a personal computer as a CSV file using [Load Fax Journal]
in “SmartDeviceMonitor for Admin”.

• When data is transmitted from the LAN-Fax Driver via the “SmartDeviceMonitor for Client” port, the
"Data-transmission complete." message appears on the computer's display, so you can easily
ascertain the communication progress. However, if the volume of communication data from the LAN-
Fax to this machine increases, the message may appear during the operation, due to the differences
in memory capacity between this machine and “SmartDeviceMonitor for Client”. For more accurate
fax transmission results, use “E-mail TX results”.
5
• The job history may differ from the machine's transmission results. In that case, refer to the machine's
transmission results.
• See the relevant Help for details.

• p.258 "Maximum Values"

Confirming Transmission Results by E-mail

After communicating in the LAN-Fax mode, this function transmits the communication results with the
computer by e-mail.

• To confirm transmission results by e-mail, the Hard Disk Drive Option and printer/scanner functions
must be installed.
When you have done [Send] or [Send & Print] using the LAN-Fax, and when the communication was
successful, it transmits e-mail of the transmission result.
Result notification e-mail is sent when printing is complete, or if an error occurs during communication
between this machine and a computer.

1. Click the [E-mail Settings] tab.


2. Select the [Notify] check box under [E-mail TX results].
3. Enter the destination.
When entering the e-mail address directly, click the [Specify destinations] radio button, and then enter
the e-mail address in the [Specify destinations] field.

183
5. Fax via Computer

When entering the machine's programmed address, click the [Device Address] radio button, and then
enter the registration number of the destination list in the [Device Address] box.
The [Device Address] box is unavailable when [Specify destinations] is selected, and you cannot enter
anything in the text box.
4. Click [Send] or [Send & Print].

• You can confirm transmission results using the E-mail TX Result function and the Communication Result
Report. You can set whether to use both of these together in User Parameter (switch 10, bit 6) in the
Fax Features menu. See “Parameter Settings”.
• If there be any insufficient configurations in the e-mail menu on this machine, or if “Auto Specify Sender
Name” is set to “Off”, the LAN-Fax result notification e-mail is not transmitted, and the LAN-Fax Result
Report is printed. See “Connecting the Machine”, Network and System Settings Guide for the e-mail
settings, and see “LAN-Fax Result Report” for the LAN-Fax Result Report.

5
• p.184 "LAN-Fax Result Report"
• p.226 "Parameter Settings"

LAN-Fax Result Report

This section explains the LAN-Fax Result Report.


If “E-mail TX results” is set to “Notify”, if there be any insufficient configurations in the e-mail menu on this
machine, or if “Auto Specify Sender Name” is set to “Off”, the LAN-Fax result notification e-mail is not
transmitted, and the LAN-Fax Result Report is printed. If the “E-mail TX Result” of “Sender Settings” has not
been set at “E-mail”, the LAN-Fax Result Report is printed.

• Whether or not the LAN-Fax Result Report is printed, can be configured with User Parameter (Switch
20, bit 0) in the Fax Features menu. See “Parameter Settings”.
• When executing [Send] or [Send & Print] with the LAN-Fax Driver, and when the E-mail TX Result
Report has not arrived, the Communication Result Report is printed. For details about Communication
Result Report, see “Communication Result Report (Memory Transmission)”.

• p.158 "Communication Result Report (Memory Transmission)"


• p.226 "Parameter Settings"

184
Sending Fax Documents from Computers

Printing and Saving

You can print documents created using Windows applications.


Open the application document you want to print or create a new document, and then perform the following
procedure.

1. On the [File] menu, click [Print...].


2. Select [LAN-Fax M13] in the list, and then click [Print].
The [LAN-Fax] dialog box appears.
The setting method may differ depending on the application you are using. In all cases, select [LAN-
Fax M13] for the printer.
3. Click [Print] or [Send & Print].

• You can also save documents in TIFF format. For details about saving in TIFF format, see “Saving as 5
files”.
• You can select the length of time the machine keeps document data in memory if print failed due to
problems such as paper shortage or paper jams. Make this setting with User Parameters (switch 20,
bit 5, 4, 3, 2) in the Fax Features menu. Data is deleted when the specified length of time elapses.
See “Parameter Settings”.
• For details about printing the fax image, see the LAN-Fax Driver's Help.

• p.182 "Saving as files"


• p.226 "Parameter Settings"

Editing Address Book

You can program and edit destinations in the address list using the Address Book.

• For details about the Address Book, see the LAN-Fax Driver's Help.
• You can use files created in CSV format as Address Book data. For this purpose, create CSV files that
conform to a certain format. For more information, see Help.

Programming new destinations


Register a new destination in the LAN-Fax Address Book.

185
5. Fax via Computer

1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [Address
Book].
The [Address Book] dialog box appears.
If LAN-Fax Driver has already started up, click [Edit Address Book...].
2. Click [New/Browse...], and then select the CSV file containing the address list to be edited.
3. Enter the destination and name.
You can enter a contact name, company name, department name, fax number, e-mail address, and
IP-Fax address. The name and destination (Fax Number, E-mail address or IP-Fax address) cannot
be omitted.
4. Click [Add].
The destination is added to the destination list.
5. Click [Close].

5 6. If you made changes to a destination, a confirmation message appears. To save the


changes, click [Yes].
If you do not want to save the changes and want to quit editing, click [No].
To return to the editing display, click [Cancel].
The confirmation dialog box does not appear when you have not made any changes after starting
Address Book.

• To program the contents of the destination list of this machine to the Address Book, select the [Use
device address] check box, then enter the destination list's registration number in the [Device Address:]
field.
• For [Line:] under [Fax Number:], the following line types are selectable; G3, G3-2, G3-3, G4, G3
Dir. Auto, G3 PABX Auto, or I-G3. However, this machine supports G3 only.
• For [Protocol:] under [IP-Fax address:], select [H.323] or [SIP].
• To bypass the SMTP server, under the [E-mail address:] box, select the [Do not use SMTP server]
check box.

Editing programmed destinations


Edit destinations registered in the LAN-Fax Address Book.

1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [Address
Book].
The [Address Book] dialog box appears.
If LAN-Fax Driver has already started up, click [Edit Address Book...].
2. Click [New/Browse...], and then select the CSV file containing the address list to be edited.

186
Sending Fax Documents from Computers

3. Select the destination you want to edit so it is highlighted in the list.


4. Edit the data.
5. Click [Update].
6. Click [Close].
7. If you made changes to a destination, a confirmation message appears. To save the
changes, click [Yes].
If you do not want to save the changes and want to quit editing, click [No].
To return to the editing display, click [Cancel].
The confirmation dialog box does not appear when you have not made any changes after starting
Address Book.

Deleting programmed destinations


Delete destinations registered in the LAN-Fax Address Book. 5
1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [Address
Book].
The [Address Book] dialog box appears.
If LAN-Fax Driver has already started up, click [Edit Address Book...].
2. Click [New/Browse...], and then select the CSV file containing the address list to be edited.
3. Select the destination you want to delete so it is highlighted in the list.
4. Click [Delete].
5. Click [Yes].
6. Click [Close].
7. If you made changes to a destination, a confirmation message appears. To save the
changes, click [Yes].
If you do not want to save the changes and want to quit editing, click [No].
To return to the editing display, click [Cancel].
The confirmation dialog box does not appear when you have not made any changes after starting
Address Book.

Editing Fax Cover Sheets

LAN-Fax Cover Sheet Editor allows you to edit the format for fax cover sheets.

187
5. Fax via Computer

• It is necessary to create a cover sheet file before attaching a cover sheet to fax document using LAN-
Fax Driver.

Creating a cover sheet


This section explains how to create a fax cover sheet.
You can edit the following items using LAN-Fax Cover Sheet Editor.
• Company name as destination information
• Department name as destination information
• Contact name as destination information
• Company name as sender information

5 • Department name as sender information


• Contact name as sender information
• Telephone number as sender information
• Fax number as sender information
• Date
• Message

1. On the [Start] menu, point to [All Programs], [LAN-Fax Utilities], and then click [LAN-Fax
Cover Sheet Editor].
The [LAN-Fax Cover Sheet Editor] dialog box appears.
2. Edit the cover sheet.
For details about operations, see Help.
3. Click [Save as...] on the [File] menu.
4. Select a folder, and then enter a file name.
5. Click [Save].

• Cover sheet data is stored in its own format (using “fcp” as its extension).

Attaching a created cover sheet


This section explains how to attach a created cover sheet file to a fax document.

1. On the [File] menu, click [Print...].

188
Sending Fax Documents from Computers

2. Select [LAN-Fax M13] in the list, and then click [Print].


The [LAN-Fax] dialog box appears.
3. Click [Edit Cover Sheet...].
The [Cover Sheet] dialog box appears.
4. Select a cover sheet file from the dropdown list or after clicking [Browse...] in [Select Cover
Sheet].
The selection made in [Select Cover Sheet] is not canceled unless you select another file. If you want
to change only destination information, omit this step and proceed to step 5.
5. Select the type of information from [To:].
You can select [Use Address Book], [To Whom It May Concern], [Edit Names], or [(None)]. Selecting
[Edit Names] allows you to enter company, department, and contact names.
6. To print the date, select the [With a Date] check box.
7. Enter the sender information.
5
You can enter company, department, and contact names, and telephone and fax numbers.
To add a message, select the [With a Message] check box, and then enter a message.
8. Click [OK].
9. Specify a destination.
10. Click the [Send Options] tab, and then select the [Attach a Cover Sheet] check box.
11. Click [Send] or [Send & Print].

Managing Facsimile Functions Using SmartDeviceMonitor for Admin

You can check information about this machine's fax functions using a computer and save files on a computer
using SmartDeviceMonitor for Admin.

• For details about SmartDeviceMonitor for Admin and its installation, see “Using SmartDeviceMonitor
for Admin”, Network and System Settings Guide.
• For details, see “Using SmartDeviceMonitor for Admin”, Network and System Settings Guide and
SmartDeviceMonitor for Admin Help.

Using the Machine's Address Book as the LAN-Fax Destination List

Using SmartDeviceMonitor for Admin, you can copy the machine's Address Book data as a CSV file to a
computer. This file can then be used as the LAN-Fax Destination List, and can also be installed on the
machine using [Address Management Tool]. This section explains how to use the Address Book for LAN-
Fax.

189
5. Fax via Computer

• SmartDeviceMonitor for Admin must be installed in advance.

• When destinations registered in groups by this machine are inserted into Address Book, each person's
destination is determined according to the following order of priority (check before inserting and
changing the order of priority, if necessary): IP-Fax destination Fax number E-mail address
• You may not be able to use the machine when it is updating the Address Book using CSV files (retrieved
using SmartDeviceMonitor for Admin) that contain user codes.
• For details, see “SmartDeviceMonitor for Admin” Help.

Copying the Machine's Address Book to a Computer

1. Launch SmartDeviceMonitor for Admin


5 The machine is automatically detected and its model and IP address appear in the network list.
If nothing appears in the list, select [Search/Monitoring Settings] in the [Group] menu, enter the
machine's IP address, then click [Add], and then click [OK]. Then check the machine's IP address. To
do this, on the machine's control panel, press the [User Tools/Counter] key, then select [System
Settings], [Interface Settings], [Network], and then [Machine IPv4 Address]. Then press [IP Add.]. If
the machine's IP address still does not appear in the list, check the settings of any security applications
that are installed, as these settings might be disabling display of the IP address.
2. Select the model of your machine, click [Tools], and then click [Address Management Tool].
3. In the [Enter Authentication Information] dialog box, specify the user name and password,
and then click [OK].
Enter the factory-set user name “admin”, and leave the password blank.
The “Address Management Tool - Receiving Information” message appears briefly, and then the
machine's Address Book appears.
4. In the [Address Management Tool] dialog box, click [File], and then click [Export Data].
If the “The password information cannot be reused in any device” message appears, click [OK].
5. Select where to store the file, and then click [Save].
The following three files will be stored:
• “Machinemodel_addr.csv”
• “Machinemodel_faxinfo.csv”
• “Machinemodel_taginfo.csv”
“Machinemodel_addr.csv” will be used as the Address Book file.
The Address Book data is now stored in the computer.

190
Sending Fax Documents from Computers

6. Close the [Address Management Tool] dialog box, and then close SmartDeviceMonitor for
Admin.
This will be followed by a procedure for displaying the computer's Address Book file on the LAN Fax
screen.

Using the Address Book Stored in the Computer for LAN-Fax

1. On the [File] menu, click [Print...].


2. Select the [Printer Name:<LAN-Fax M13>], and then click [Print].
The LAN-Fax dialog box appears.
3. In [Address Book], click [Browse...].
4. Select the Address Book file, and then click [Open].
Select “Machinemodel_addr.csv”.
The Address Book appears.
5
5. Specify the destination.
For details about sending the file, see “Sending Fax Documents from Computers”.

• p.171 "Sending Fax Documents from Computers"

LAN-Fax Operation Messages

This section explains typical operation error messages displayed on the computer when using the LAN-
Fax Driver, and solutions to those messages.

Message Causes and Solutions

The number of entries in Destinations The number of destinations specified exceeds the maximum
exceed the limits. Up to 300 entries can possible. The maximum number of destinations that can be
be entered. specified at one time is 300.

“LAN-Fax” has already been launched. The [LAN-Fax] dialog box is already open. Quit LAN-Fax
Cannot launch it again. once, and then start it up again.

Failed to allocate memory. Available memory on the computer is insufficient. Quit


applications currently not in use.

191
5. Fax via Computer

Viewing Fax Information Using a Web Browser


You can view received fax documents and their lists or print these documents using Web Image Monitor
on a network computer.

• To use this function, the Hard Disk Drive Option and printer/scanner functions are required.

• It is recommended that you use a Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
• When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
“192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
• You need to select “Store(Notify)” or “Store(Do not Notify)” as the “Reception File Setting” in the Fax
5 Features menu. For details about Reception File Setting, see “Reception File Setting”.
• You can also check and manage the documents using DeskTopBinder. For details about the operation
on DeskTopBinder, see the DeskTopBinder's manual and Help.
• For details about using Web Image Monitor, see “Monitoring and Configuring the Printer”, Network
and System Settings Guide.

• p.214 "Reception File Setting"

Viewing, Printing, and Deleting Received Fax Documents Using Web Image
Monitor

This section explains how to view and/or print received fax documents using Web Image Monitor.

Viewing received fax documents using a Web browser


Check the content of received documents stored in the machine.

1. Start a Web browser.


2. Enter “http://(IPv4 address, IPv6 address or host name of this machine)/” in the address
bar.
The top page of Web Image Monitor is displayed.
3. Click [Fax Received File] in the left pane.
4. If you have programmed a user code for the stored reception file, enter the code, and then
press [OK].
A list of the received fax documents appears.

192
Viewing Fax Information Using a Web Browser

If the programmed user code was deleted using the Address Book Management function under System
Settings, a message indicating incorrect user code entry appears. If this is the case, reprogram a user
code.
5. Click the property icon of the desired fax document.
When viewing a list of the fax documents, you can select the thumbnail display, icon display, or detail
display. Click , , or .
6. View the content of the fax document.
7. To download the received fax document, click [PDF] or [Multi-page: TIFF], and then click
[Download].
A downloading confirmation dialog box appears.
When you select [PDF], make the necessary “PDF File Security Settings” before clicking [Download].
Acrobat Reader starts and the selected document is displayed.
8. Close the Web browser.
5
• If your computer cannot be connected to Web Image Monitor, see “Monitoring and Configuring the
Printer”, Network and System Settings Guide.
• To enlarge the preview image, click [Enlarge Image]. Enlargement cannot be performed without
Acrobat Reader installed. For more information, see Help on the Web Image Monitor.
• To download the document data on the list of received fax documents, click [TIFF] or [PDF]. For details
about downloading, see the Web Image Monitor Help.
• The method for downloading differs depending on the selected format. For more information, see
Help on the Web Image Monitor.

Printing fax information using a Web browser


Print received documents stored in the machine.

1. Start a Web browser.


2. Enter “http://(IPv4 address, IPv6 address or host name of this machine)/” in the address
bar.
The top page of Web Image Monitor is displayed.
3. Click [Fax Received File] in the left pane.
The list of received fax documents appears.
4. Select the check box of the fax document to be printed.
When viewing a list of the fax documents, you can select the thumbnail display, icon display, or detail
display. Click , , or .
5. Click [Print].

193
5. Fax via Computer

6. Click [Print].
To cancel printing, press [Cancel] before clicking [Print].
7. Click [OK].
The display returns to that of step 5.
8. Close the Web browser.

• You can change the printing order of selected multiple documents. You can also have documents
printed on both sides of the paper. For more information, see Help on the Web Image Monitor.

Deleting fax information using a Web browser


Delete received documents stored in the machine.

5 1. Start a Web browser.


2. Enter “http://(IPv4 address, IPv6 address or host name of this machine)/” in the address
bar.
The top page of Web Image Monitor is displayed.
3. Click [Fax Received File] in the left pane.
The list of received fax documents appears.
4. Select the check box of the fax document to be deleted.
When viewing a list of the fax documents, you can select the thumbnail display, icon display, or detail
display. Click , , or .
5. Click [Delete].
6. Click [Delete File(s)].
To cancel deletion, press [Cancel] before clicking [Delete File(s)].
7. Click [OK].
The display returns to that of step 5.
8. Close the Web browser.

• After selecting multiple documents, you can also cancel deletion of some of the selected documents.
For more information, see Help on the Web Image Monitor.

Programming Destination Information from Web Browser

If the receiving machine is compliant with T.37 full mode Internet Fax, you can program the receiver's
properties from Web Image Monitor.

194
Viewing Fax Information Using a Web Browser

You can program the following properties:


• Compression Type
• Paper size
• Resolution

• For a detailed description, see Help for Web Image Monitor.


• For details about the T.37 full mode, see “T.37 Full Mode”.
• When a receiver that is programmed as full mode in the Address Book returns a Reception Notice e-
mail, the contents of the newly received e-mail overwrite the existing information.

• p.34 "T.37 Full Mode"

To edit machine properties already programmed


5
Use Web Image Monitor to edit information about the destination machine registered in the Address Book.

1. Start a Web browser.


2. Enter “http://(IPv4 address, IPv6 address or host name of this machine)/” in the address
bar.
The top page of Web Image Monitor is displayed.
3. Click [Login], and then enter the Administrator's name and password.
4. Click [Address Book] in the left pane.
The Address Book is displayed.
5. Click the radio button to the left of the machine you want to modify, and then click [Change].
The [Change User] page appears.
6. Set the properties for Internet Fax data format other than the mode selection.
If you change the mode to “Simple Mode”, you cannot set machine properties.
7. Click [OK] at the upper or lower left of the screen.
To cancel the setting, click [Cancel] at the upper or lower left of the screen.
The Address Book is displayed.
8. Close the Web browser.

To add new receiver


Use Web Image Monitor to add a new destination to the Address Book.

195
5. Fax via Computer

1. Start a Web browser.


2. Enter “http://(IPv4 address, IPv6 address or host name of this machine)/” in the address
bar.
The top page of Web Image Monitor is displayed.
3. Click [Login], and then enter the Administrator's name and password.
4. Click [Address Book] in the left pane.
The Address Book is displayed.
5. Click [Add User].
The [Add User] page appears.
6. Enter the registration number, name, and e-mail address, then set the necessary properties.
You can set the Internet Fax data format after entering the e-mail address.
7. Click [Full Mode] under [Internet Fax Data Format], and set the properties according to the
5 receiver's properties.
If you change the mode to “Simple Mode”, you cannot set machine properties.
8. Click [OK] at the upper or lower left of the screen.
To cancel the setting, click [Cancel] at the upper or lower left of the screen.
The Address Book is displayed.
9. Close the Web browser.

196
6. Fax Features
This section describes User Tools in the Fax Features menu.

Accessing User Tools


User Tools allow you to change or set defaults.

• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off or the [Clear Modes] key is pressed.
• Default settings are shown in bold type.

Changing Default Settings


6
This section describes how to change the settings of User Tools.

• If Administrator Authentication Management is specified, contact your administrator.

1. Press the [User Tools/Counter] key.

BRJ032S

2. Select the menu using [ ] or [ ], and then press the [OK] key.
To change the Fax Features, select [Fax Features].
3. Select the item using [ ] or [ ], and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.

197
6. Fax Features

• To cancel changes made to settings and return to the initial display, press the [User Tools/Counter]
key.

Quitting User Tools

This section describes how to end User Tools.

1. Press the [User Tools/Counter] key.

6
BRJ032S

• You can also quit User Tools by pressing the [Escape] key.

198
General Settings/Adjust

General Settings/Adjust
This section describes the User Tools in the General Settings/Adjust menu under Fax Features.
Adjust Sound Volume
Adjust the sound volume during On Hook Mode and Immediate Transmission.
The default setting is 2 (the second lowest level).
For details about how to adjust the sound volume, see “Adjusting the Volume”, Troubleshooting.
Program Fax Information
Register the sender details that appear on the recipient's fax machine and faxed document.
For details about Program Fax Information, see “Registering Fax Information”.
On Hook Release Time
Use this function to specify a time to cancel On Hook mode after you transmit using On Hook dialing.
This is useful when On Hook dialing is cancelled in fax information service.
The default setting is 3 minutes.
Set User Function Key 6
Frequently used functions can be programmed as User Function key.
The User Function keys can be programmed with the following items:
• Print Journal
• TX File Status (Transmission File Status)
• RX File Status (Reception File Status)
• 2 Sided TX (Two-sided transmission)
• Print Fax Header
• Forwarding
• Switch Reception Mode
• Start Manual Reception
• Sender Settings
• E-mail Options
• Print TX Status Report (Print Transmission Status Report)
• Manual E-mail Reception
• Select Line/SMTP
• SUB/SEP Code
• Specify Dest. Reg. No. (Specify Destination Registration Number)
• Not programmed

199
6. Fax Features

Up to three functions can be programmed to User Function keys.


The default setting for User Function Key 1 is Start Manual Reception.
The default setting for User Function Key 2 is Switch Reception Mode.
The default setting for User Function Key 3 is Print Journal.

• For details about the display panel and how to use the keys, see “Reading the Display Panel and
Using Keys”.

• p.14 "Reading the Display Panel and Using Keys"


• p.217 "Registering Fax Information"

200
Reception Settings

Reception Settings
This section describes the User Tools in the Reception Settings menu under Fax Features.
Switch Reception Mode
Specify the method for receiving fax documents.
The default setting is Auto Reception.
RX Mode Auto Switch Time
Specify the number of rings with the Auto Switch Time.
In Auto Switch Mode, the machine rings a number of times to give you the chance to pick up the
handset before taking the call automatically.
The default setting is 8 Times.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Reception Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [RX Mode Auto Switch Time] using [ ] or [ ], and then press the [OK] key.
4. Enter the number of rings from 1 to 29 using the number keys, and then press the [OK] key. 6
5. Press the [User Tools/Counter] key.
Authorized Reception
Specify whether or not unwanted fax documents are to be screened out.
The default setting is Off.
To use this function, program the Special Senders function in advance. For details, see “Programming
Initial Set Up of a Special Sender”.
Checkered Mark
Specify whether or not a checkered mark is to be printed on the first page of received fax documents.
The default setting is On.
Center Mark
Specify whether or not a center mark is to be printed halfway down the left side and at the top center
of each page received.
The default setting is Off.
Print Reception Time
Specify whether or not received date and time are to be printed at the bottom of received fax
documents.
The default setting is Off.
2 Sided Print
Specify whether or not received fax documents are to be printed on both sides of the paper.

201
6. Fax Features

The default setting is Off.


Reception File Setting
Select whether received documents are saved on the hard disk to be printed later or printed
immediately without being saved.
The default setting is Print.
For details about Reception File Setting, see “Reception File Setting”.
Stored Recpt.File User Set (Stored Reception File User Setting)
The administrator can be specified for managing documents stored on the machine after fax
documents are received. To specify the administrator, enter the administrator user code for managing
documents using Web Image Monitor or DeskTopBinder.
You must register the administrator's User Code to the destination list in advance.
This function is available when [Store(Notify)] or [Store(Do not Notify)] is selected in “Reception File
Setting”.
It is recommended that you use Web Image Monitor operating under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
6 The default setting is Do not Set.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Reception Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Stored Recpt.File User Set] using [ ] or [ ], and then press the [OK] key.
4. If you want to use a user code, select [Set] using [ ] or [ ], and then press the [OK] key.
5. Search and select a user using the Quick Dial keys or the [Search Destination] key, and then
press the [OK] key.
6. Press the [User Tools/Counter] key.
If the programmed user code was deleted using the Address Book Management function under
System Settings, you cannot view received and saved documents using Web Image Monitor.
Select [Do not Set] in step 4 or reprogram the user code.

• p.214 "Reception File Setting"


• p.249 "Programming Initial Set Up of a Special Sender"

202
E-mail Settings

E-mail Settings
This section describes the User Tools in the E-mail Settings menu under Fax Features.
Default settings are shown in bold type.
Internet Fax Settings
You can select to display or not. When you want to send an Internet Fax, set On to display
the icon.
The default setting is Off.
Maximum E-mail Size
Use this setting to limit the size of sent e-mail, so that destinations that refuse e-mail over a certain size
can still receive your e-mail. When this function is set to on, you cannot send e-mail that is larger than
the specified limit.
The default setting is Off.
When e-mail exceeds the maximum file size, an Error Report is output, and the e-mail is deleted.
Even when e-mail does not exceed the size limit, it may be rejected if it does not meet the requirements
of the server settings. 6
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Maximum E-mail Size] using [ ] or [ ], and then press the [OK] key.
4. Select [On] using [ ] or [ ], and then press the [OK] key.
5. Enter an upper limit on the size of outgoing e-mail using the number key, and then press the [OK]
key.
Specify a size limit of 128 - 102,400 KB.
If you make a mistake, press the [Clear/Stop] key, and then reenter the number.
6. Press the [User Tools/Counter] key.
SMTP RX File Delivery
This function is available on systems that allow routing of e-mail received via SMTP.
The default setting is Off.
When an authorized e-mail is set, e-mail received from addresses that do not match the authorized
address is discarded and an error message is returned to the SMTP server.
The authorized e-mail address is compared with the addresses of e-mail originators, as illustrated by
the following examples.
• When the authorized e-mail address is set to “@aaa.abcd.com”:
abc@aaa.abcd.com - accepted
def@aaa.xyz.com - not accepted

203
6. Fax Features

abc@abcd.com - not accepted


No Error Report is output even when e-mail is discarded.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [SMTP RX File Delivery] using [ ] or [ ], and then press the [OK] key.
4. Select [On] using [ ] or [ ], and then press the [OK] key.
5. Enter the authorized e-mail address and then press the [OK] key.
You can enter up to 128 characters for the e-mail address.
If you make a mistake, press the [Clear/Stop] key, and then enter again.
6. Press the [User Tools/Counter] key.

• For details about the display panel and how to use the keys, see “Reading the Display Panel and
Using Keys”.

6 • p.14 "Reading the Display Panel and Using Keys"

204
IP-Fax Settings

IP-Fax Settings
This section describes the User Tools in the IP-Fax Settings menu under Fax Features.
Default settings are shown in bold type.
Make settings to use IP-Fax.
Set H.323 for the gatekeeper, SIP for SIP server, and the VoIP gateway to G3 fax if necessary. Check the
settings of the network to which this machine is connected before making settings.
The following characters can be used for registration of the alias telephone number in H.323 Setting. Make
sure you enter these characters correctly:
• Numbers
• Symbols ( and )
The following characters can be used for registration of the SIP User Name in SIP Settings. Make sure you
enter these characters correctly:
• Alphanumeric symbols (lower and upper cases)
• Symbols (;?:&= $,-_.!~ '@()%/[])
Use numbers and periods (“.”) to enter the correct IP addresses for the gatekeeper, SIP server, and VoIP
6
gateway. To obtain the correct IP addresses, consult administrator.
Enable H.323
Specify whether or not H.323 is used for IP-Fax transmission.
The default setting is Off.
Enable SIP
Specify whether or not SIP is used for IP-Fax transmission.
The default setting is Off.
H.323 Settings
Set the IPv4 address and alias telephone number of the gatekeeper.
To use the gatekeeper, set the parameter setting (switch 34, bit 0) to “On”.
The default parameter setting for switch 34, bit 0 is Off.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [H.323 Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Gatekeeper Address (Main)] using [ ] or [ ], and then press the [OK] key.
5. Enter the IPv4 address of the gatekeeper, and then press the [OK] key.
6. Select [Own Fax No.] using [ ] or [ ], and then press the [OK] key.
7. Enter Own Fax No. and then press the [OK] key.

205
6. Fax Features

8. Press the [User Tools/Counter] key.


SIP Settings
Set the SIP server's IP address or host name, and SIP user name. You can register either an IPv4 or
IPv6 address for the SIP server. You cannot register an IPv4-mapped address.
To use the SIP server, set the parameter setting (switch 34, bit 1) to “On”.
The default parameter setting for switch 34, bit 1 is Off.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [SIP Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Proxy Server Addr. (Main)] using [ ] or [ ], and then press the [OK] key.
A proxy server relays call requests and responses.
5. Enter the IP address of the proxy server, and then press the [OK] key.
6. Select [Redirect Svr. Addr. (Main)] using [ ] or [ ], and then press the [OK] key.
A redirect server processes request destination inquiries.
6 7. Enter the IP address of the redirect server, and then press the [OK] key.
8. Select [Registrar Address (Main)] using [ ] or [ ], and then press the [OK] key.
A register server registers location information of user agents (which correspond to telephones
or facsimiles on public telephone lines) on an IP network.
9. Enter the IP address of the register server, and then press the [OK] key.
10. Select [SIP User Name] using [ ] or [ ], and then press the [OK] key.
11. Enter SIP User Name, and then press the [OK] key.
12. Select [SIP Digest Authentication] using [ ] or [ ], and then press the [OK] key.
13. Specify whether to perform SIP digest authentication, and then press the [OK] key.
If you select [On], enter the password using up to 128 characters.
14. Press the [User Tools/Counter] key.
Gateway Settings
Register, change, or delete the VoIP gateway used for transmission to IP-Fax. Register to use the VoIP
gateway without using the gatekeeper/SIP server. You can register either an IPv4 or IPv6 address
for the Gateway. You cannot register an IPv4-mapped address.
Programming/Changing the VoIP gateway:
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Gateway Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

206
IP-Fax Settings

5. Select [Not Programmed] using [ ] or [ ], and then press the [OK] key.
6. Enter the Prefix using the number key, and then press the [OK] key.
For documents sent using a VoIP gateway to G3 Fax, prefixes can be used. If the first several
digits of IP-Fax number and the VoIP gateway- specific prefix are identical, documents can be
transmitted using the registered digits of the VoIP gateway. For example, if both 03 and 04 have
been registered as VoIP gateway number while 0312345678 is also specified, documents can
be transmitted via a VoIP gateway for which 03 is used as a prefix.
When you wish to use the VoIP gateways regardless of the IP-Fax destination numbers, register
only the VoIP gateway addresses without registering the prefix.
7. Enter VoIP gateway address and then press the [OK] key.
8. Select [H.323] or [SIP] using [ ] or [ ], and then press the [OK] key.
9. Press the [User Tools/Counter] key.
Deleting VoIP gateway:
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [IP-Fax Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Gateway Settings] using [ ] or [ ], and then press the [OK] key. 6
4. Select [Delete] using [ ] or [ ], and then press the [OK] key.
5. Select the VoIP gateway you want to delete using [ ] or [ ], and then press the [OK] key.
6. Press [Yes].
7. Press the [User Tools/Counter] key.

• For details about setting parameters, see “Parameter Settings”.

• p.226 "Parameter Settings"

207
6. Fax Features

Administrator Tools
This section describes the User Tools in the Administrator Tools Settings menu under Fax Features.
Print Journal
Prints a Journal. Up to 50 of the latest results of transmission/reception results can be checked on this
machine.
You can also print the journal using the [Job Information] key.
Print TX Standby File List
Use this function to print the transmission standby file list.
You can also print the transmission standby file list using the [Job Information] key.
Communication Page Count
Checks the transmission and reception on the display.
Memory Lock
When you switch Memory Lock on, received documents are stored in memory and not printed
6 automatically. When a document is received in the Memory Lock mode, the Receiving File indicator
blinks. To print this document, enter the Memory Lock ID. A user without the ID cannot print the
document. This prevents unauthorized users from accessing the document.
To use Memory Lock, program the Memory Lock ID, and then switch Memory Lock on.
To store incoming documents from Special Senders only in Memory Lock, program each sender with
“Program Special Sender”.
This function cannot be used with Internet Fax or Mail to Print.
The default setting is Off.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Memory Lock] using [ ] or [ ], and then press the [OK] key.
4. Select [On] using [ ] or [ ], and then press the [OK] key.
5. Press the [User Tools/Counter] key.
Forwarding
Specify whether or not received fax documents are to be forwarded to a programmed receiver.
The default setting is Off.
For details about Forwarding, see “Forwarding”.
Folder TX Result Report
When a folder is included in the forwarding destination or the forwarding destination by special
sender, the specified destination will be notified of the results of forwarding.

208
Administrator Tools

To forward to two or more destinations, specify group destination. For details about how to specify
group destination, see “Registering a Names to a Group”, Network and System Settings Guide.
Even if the Folder Transfer Result Report is not successfully transmitted, the report is not printed on this
machine.
The default setting is Do not E-mail.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Folder TX Result Report] using [ ] or [ ], and then press the [OK] key.
4. Select [E-mail] using [ ] or [ ], and then press the [OK] key.
5. Search and select a receiver using the Quick Dial keys or the [Search Destination] key, and then
press the [OK] key.
6. Press the [User Tools/Counter] key.
Parameter Setting
Parameter Setting allows you to customize various settings to suit your needs. To change function
settings, set the Parameter Switches. For details, see “Parameter Settings”.
Program Special Sender 6
Program/Change/Delete Special Senders, perform initial setup, and print the Special Sender List.
You can set functions for each sender if Special Senders are preprogrammed. For details, see
“Program Special Sender”.
Program Memory Lock ID
Program a Memory Lock ID to be entered before printing documents when the Memory Lock function
is activated.
Preprogram the ID when you set “Memory Lock” and “Program Special Sender”-“Memory Lock”.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Program Memory Lock ID] using [ ] or [ ], and then press the [OK] key.
4. Enter the ID using the number key, and then press the [OK] key.
A Memory Lock ID can be any four-digit number, except 0000.
If you make a mistake, press the [Clear/Stop] key before pressing the [OK] key, and then enter
again.
5. Press the [User Tools/Counter] key.
For details about printing a file received with Memory Lock, see “Printing a File Received with Memory
Lock”.
Select Dial/Push Phone
Use this function to select a line type.

209
6. Fax Features

Dial and Push lines are available for selection.


This function is not available in some areas.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [Select Dial/Push Phone] using [ ] or [ ], and then press the [OK] key.
4. Select [Push Phone] or [Dial Phone (10PPS)] using [ ] or [ ], and then press the [OK] key.
5. Press the [User Tools/Counter] key.
G3 Analog Line
You need to make the following settings for the G3 Analog Line before you connect the machine to
a standard G3 analog line.
• When your machine is connected through a PABX, set to Extension. If it is connected directly to
the telephone network, set to Outside.
The default setting is Outside.
• Outside Access No.

6 Use this setting if your machine is connected to a PABX that requires you to dial a certain number
such as “0” followed by a pause to connect to the outside line. By programming “0” as the
Outside Access No., a pause will be inserted automatically after the “0” when dialing.
1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
3. Select [G3 Analog Line] using [ ] or [ ], and then press the [OK] key.
4. Select [Extension/Outside] using [ ] or [ ], and then press the [OK] key.
5. Select [Extension] or [Outside] using [ ] or [ ], and then press the [OK] key.
6. Select [Outside Access No.] using [ ] or [ ], and then press the [OK] key.
7. Enter the Outside Access No. using the number key, and then press the [OK] key.
You can program the number up to two digits.
If you make a mistake, press the [Clear/Stop] key, and then enter again.
8. Press the [User Tools/Counter] key.
Memory File Transfer
If the printer has stopped functioning or run out of toner or paper, you can transfer the files in facsimile
memory to another machine for printing. Note that this function forwards all documents that are stored
in memory, including files that were received with Memory Lock. Use this function only in emergencies.
For details, see “Memory File Transfer”.
RDS On/Off (Remote Diagnostic System)
If your machine has a problem, a service representative can perform various diagnostic tasks over
the telephone line from the service station to try to find out what is wrong with your machine. The

210
Administrator Tools

service representative can also use RDS to change some of your machine's settings if you request it.
When the machine is shipped, this feature is turned on.
Menu Protect
Using Menu Protect, you can prevent unauthenticated users from changing the User Tools.
For details, consult your administrator.

• p.168 "Printing a File Received with Memory Lock"


• p.212 "Memory File Transfer"
• p.222 "Forwarding"
• p.226 "Parameter Settings"
• p.241 "Program Special Sender"

211
6. Fax Features

Memory File Transfer


If the printer has stopped functioning or run out of toner or paper, you can transfer the files in facsimile
memory to another machine for printing. Note that this function forwards all documents that are stored in
memory, including files that were received with Memory Lock. Use this function only in emergencies.

• This function is not available with Internet Fax.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Memory File Transfer] using [ ] or [ ], and then press the [OK] key.

4. Press [Line], then use [ ] or [ ] to select [G3], [H.323], or [SIP], and then press the [OK]
key.

5. Enter the forwarding destination, and then press the [Start] key.

212
Memory File Transfer

If you make a mistake, press the [Clear/Stop] key, and then try again.
6. Press the [User Tools/Counter] key.

• The document is not deleted after you forward it. It is stored in the machine.
• All documents stored in facsimile memory are forwarded, including received with Memory Lock.
• If you program SUB Codes as User Function keys beforehand, you can use SUB Codes and a
password to specify a forwarding destination. Take care to change only those settings that are
required. For details about the User Function keys, see “General Settings/Adjust”.

• p.199 "General Settings/Adjust"

213
6. Fax Features

Reception File Setting


Specify whether received documents are to be saved on the hard disk or printed immediately without being
saved. You can print stored documents repeatedly and download them as images to a computer using
Web Image Monitor or DeskTopBinder. If you select printing without saving, documents are printed each
time they are received.

• To use this function, the Hard Disk Drive Option and printer/scanner functions are required.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Reception Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Reception File Setting] using [ ] or [ ], and then press the [OK] key.

4. Select [Store(Notify)], [Store(Do not Notify)] , or [Print] using [ ] or [ ], and then press the
[OK] key.

If you select [Store(Notify)] and specify a notification destination, notification that the document was
received is sent to the specified e-mail address. Further, you can register a group destination. For the
maximum number of destinations you can specify in a group, see “Maximum Values”.
5. Press the [User Tools/Counter] key.

214
Reception File Setting

• You can use “Parameter Settings” (switch 10, bit 5) to select whether or not to print stored received
documents. See “Parameter Settings”.
• Documents saved on the hard disk are categorized as received and stored documents.
• You cannot change to a different setting if received documents have been stored on the hard disk. To
change to different setting, print documents stored on the hard disk if necessary, and then delete them.
• You cannot use the control panel to manage stored documents.
• With [Store(Notify)] or [Store(Do not Notify)] selected, more memory space is used as the number of
saved documents increases. After memory space becomes insufficient, no more documents are saved
on the hard disk. When this happens, the machine starts printing and then overwriting old documents,
or it deletes the received document data without printing it and then prints the Reception File Erased
Report.
• You can store received documents up to a total of approximately 320 pages of A4 size Standard
<ITU-T 1Chart>.
• You cannot send received documents.
• It is recommended that you use Web Image Monitor running under the same network environment
as this machine. Otherwise, the Web browser may not open and an error may occur.
6

• p.226 "Parameter Settings"


• p.258 "Maximum Values"

Specifying Automatic Deletion of Incoming Faxes when an Error Occurs

Even if the machine is set to store documents on its hard disk when it cannot print them if they cannot be
stored normally because of the following conditions, the machine usually prints them.
• Error occurs on the hard disk of the machine
• The memory is full
• The number of received documents exceeds the number of received documents you can store on the
machine's hard disk or facsimile memory
In this case, you can have machine delete the document data without printing it. The machine prints the
Reception File Erased Report to confirm information in the received document instead.
Using the User Parameters (switch 10, bit 7) on the Fax Features menu, you can select whether or not to
turn on this function. See “Parameter Settings”.

• For details about storing documents on the machine's hard disk, see “Reception File Setting”.

215
6. Fax Features

• You cannot change to a different setting if received documents have been stored on the hard disk. To
change to different setting, print documents stored on the hard disk if necessary, and then delete them.

• p.214 "Reception File Setting"


• p.226 "Parameter Settings"

Reception Report e-mail

When a received document is stored, this report is sent to the e-mail address set as the destination for
notification.

• Depending on your e-mail application, a phishing warning might appear after you receive a
“Reception Report e-mail”. To prevent phishing warnings appearing after you receive a “Reception
Report e-mail”, you must add the sender to your e-mail application's exclusion list. For details about
how to do this, see your e-mail application's Help.
6

216
Registering Fax Information

Registering Fax Information


This section describes Fax Information.
You can send information to the other party when transmitting or receiving a fax document. This information
is shown on the display of the other machine and printed in a report. The following information can be sent.

• You can confirm programmed settings from the Parameter Settings List. It is recommended to print and
keep the Parameter Settings List when you program or change settings. For information about how to
print the Parameter Settings List, see “Printing the Parameter Settings List”.
Fax Header
The Fax Header is printed as the header of every fax you send. You should include your name in the
Fax Header.
You can register “Fax Header” using up to 32 alphanumeric characters, symbols, and spaces.
You can set whether or not to print the Fax Header (for printing) in [Print Fax Header] under [TX Mode].
For details about how to set, see “Fax Header Print”.
Own Name 6
The Own Name is sent to the other party when you send or receive a fax. This name should include
your name. The Own Name is shown on the display of the other machine and printed in a report.
Own Name works only if the other machine is of the same manufacturer and has the Own Name
function.
You can register “Own Name” using up to 20 alphanumeric characters and symbols.
Own Fax Number (facsimile number of sender)
The sender's Own Fax Number is sent to the other party when sending a fax. The Own Fax Number
is shown on the display of the other machine and printed in a report.
This function is available regardless of the manufacturer of the other party's machine.
You can register “Own Fax Number” using up to 20 numbers, spaces, and the “ ” symbol.

• p.108 "Fax Header Print"


• p.235 "Printing the Parameter Settings List"

217
6. Fax Features

Registering Fax Information

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.

3. Select [Program Fax Information] using [ ] or [ ], and then press the [OK] key.

4. Select fax information you want to program/change using [ ] or [ ], and then press the
[OK] key.

5. Program/change the selected fax information, and then press the [OK] key.
6. Press the [User Tools/Counter] key.

Programming/Changing Fax Header

1. Select [Fax Header] using [ ] or [ ], and then press the [OK] key.

218
Registering Fax Information

2. Enter the fax header, and then press the [OK] key.

To change the programmed Fax Header, press the [Clear/Stop] key, and then enter again.

• You can register “Fax Header” using up to 32 alphanumeric characters, symbols, and spaces.
• For details about entering text, see “Entering Text”, About This Machine.

Programming/Changing Own Name

1. Select [Own Name] using [ ] or [ ], and then press the [OK] key.

2. Enter the own name, and then press the [OK] key.

To change the programmed Own Name, press the [Clear/Stop] key, and then enter again.

• You can register “Own Name” using up to 20 alphanumeric characters and symbols.
• For details about entering text, see “Entering Text”, About This Machine.

Programming/Changing Own Fax Number

1. Select [Own Fax Number] using [ ] or [ ], and then press the [OK] key.

219
6. Fax Features

2. Enter the own fax number using the number keys, and then press the [OK] key.

To change the programmed Own Fax Number, press the [Clear/Stop] key, and then enter again.
When you enter “ ” and space, press [ ], [Space] for each.
If you make a mistake, press the [Clear/Stop] key, and then enter again.

• You can register “Own Fax Number” using up to 20 numbers, space, and “ ” symbol.

Deleting Fax Information

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.
6

2. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.

3. Select [Program Fax Information] using [ ] or [ ], and then press the [OK] key.

4. Select fax information you want to delete using [ ] or [ ], and then press the [OK] key.

220
Registering Fax Information

5. Press the [Clear/Stop] key.

The programmed information is deleted.


6. Press the [OK] key.

7. Press the [User Tools/Counter] key.

221
6. Fax Features

Forwarding
Print documents received and forward to a specified end receiver. This is useful if, for example, you are
visiting another office and would like a copy of your documents to be sent to that office.
You can also specify a “folder” as the forwarding destination.

• To use this function, set [Forwarding] under [Administrator Tools] to [On].


• The Forwarding function does not forward documents received with Memory Lock.
• You can select end receivers only from among destinations programmed in the Address Book. You
cannot specify programmed transfer stations as end receivers.
A fax number, e-mail address, IP-Fax destination, and folder can be set as the forwarding destination.
When you wish to change the end receivers depending on the senders, specify the end receivers by the
senders, at “Program Special Sender”. Documents not received from specified senders are sent to the
destination specified in this function. For details about programming special sender, see “Program Special
Sender”.
6 You can set whether or not to print the forwarded documents on this machine in “Parameter Setting” (switch
11, bit 6). See “Parameter Settings”.
Deleting a destination specified as a forward destination from the destination list causes the settings of the
forward destination to be deleted, so they must be registered again. When a destination is changed, a
document is transmitted to the new destination. If there is no destination of the specified type, you can set
which destination to be used as an alternative destination in “Parameter Setting” (switch 32, bit 0). See
“Parameter Settings”.
You can program one of the User Function keys with operations for this function. See “General Settings/
Adjust”.
If you have specified a folder for forwarding, you can specify the file format used for forwarding in
“Parameter Setting” (switch 21, bit 3). See “Parameter Settings”.
User Parameters (switch 37, bit 4) on the Fax Features menu allows you to include the sender's name in
the names of files sent to folders. However, garbling of the file name and data loss can result if the receiver's
operating system cannot accept certain characters in file names. To prevent this, use User Parameters
(switch 37, bit 5) to limit the file names to plain characters only. If you limit file names to plain characters
only but errors still occur, disable display of the sender's name in the file name of documents forwarded to
folders. For details, see “Parameter Settings”.
Using the parameter setting (switches 38 and 39), you can specify the maximum number of resends that
the machine attempts if it fails to forward a fax (including faxes from special senders) to a folder destination,
and the interval between the resend attempts.

• p.199 "General Settings/Adjust"

222
Forwarding

• p.226 "Parameter Settings"


• p.241 "Program Special Sender"

Programming an End Receiver

• One end receiver can be registered for each special sender. To register two or more end receivers,
use group destination. Up to 100 destinations can be specified in a group. However, when adding
a group to another group, a maximum of 150 destinations can be specified in a group.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key. 6

3. Select [Forwarding] using [ ] or [ ], and then press the [OK] key.

4. Select [On] using [ ] or [ ], and then press the [OK] key.

To cancel forwarding, press [Off] and proceed to step 6.


5. Search and select a receiver using the Quick Dial keys, and then press the [OK] key.
Pressing switches the destination.

223
6. Fax Features

If you make a mistake, press the [Clear/Stop] key, and then enter again.
6. Press the [User Tools/Counter] key.

• In Step 5, you can search for and specify the forwarding destination by pressing the Search Destination
key or a User Function key. To specify a forwarding destination by pressing a User Function key, you
must first register the [Specify Dest. Reg. No.] function as a User Function key. For details about the
User Function keys, see “General Settings/Adjust”.
• For details about how to register folders, see “Registering Folders”, Network and System Settings
Guide.

6 • p.199 "General Settings/Adjust"

Quitting the Forwarding Function

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Forwarding] using [ ] or [ ], and then press the [OK] key.

224
Forwarding

4. Select [Off] using [ ] or [ ], and then press the [OK] key.

The set receiver name is deleted.


5. Press the [User Tools/Counter] key.

Forwarding Mark

This section describes Forwarding Mark.


You can print a Forwarding Mark on receiver's documents that have been forwarded.
The receiver can distinguish between forwarded and normally received documents.

BBM015S

You can specify whether or not to print a Forwarding Mark in the User Parameters (switch 02, bit 0). See
“Parameter Settings”.
This function is not available when Forwarding is performed to a folder destination.

• p.226 "Parameter Settings"

225
6. Fax Features

Parameter Settings
User Parameters allow you to customize various settings to suit your needs. To change function settings, set
the User Parameter Switches.
Switches and Bits
Each User Parameter has a set of switches, and each of the switches consist of eight bits, whose values
are “0” or “1”. The right most bit is bit 0 and the left most is bit 7. You can adjust the settings to match
your needs by switching the value of bits between “0” and “1”.
Switch 02:

0 0 0 1 1 0 1 1

7 6 5 4 3 2 1 0

6 User Parameter List

User Parameter Switches are outlined in the following list.


Switch: 02, Bit: 0
Forwarding Mark
• 0: Off
• 1: On
Switch: 02, Bit: 3
TSI Print
• 0: Off
• 1: On
Switch: 03, Bit: 0
Automatic printing of the Communication Result Report
• 0: Off
• 1: On
Switch: 03, Bit: 2
Automatic printing of the Memory Storage Report
• 0: Off
• 1: On

226
Parameter Settings

Switch: 03, Bit: 3


Whether or not to print the SEP Code RX Reserve Report automatically
• 0: Off
• 1: On
Switch: 03, Bit: 4
Whether or not to print the SEP Code RX Result Report automatically
• 0: Off
• 1: On
Switch: 03, Bit: 5
Automatic printing of the Immediate TX Result Report
• 0: Off
• 1: On
Switch: 03, Bit: 7
Automatic printing of the Journal
• 0: Off 6
• 1: On
Switch: 04, Bit: 1
Automatic printing of the Communication Failure Report
• 0: Off
• 1: On
Switch: 04, Bit: 4
Indicate the parties
• 0: Off
• 1: On
Switch: 04, Bit: 5
Include sender's name on reports
• 0: Off
• 1: On
Switch: 04, Bit: 7
Include a portion of the image on reports
• 0: Off
• 1: On

227
6. Fax Features

Switch: 05, Bit: 0


Receive Service Call (SC) Condition (Substitute Reception during service call)
• 0: Possible (Substitute RX)
• 1: Not possible (Reception off)
Switch: 05, Bit: 2, 1
Substitute the reception when the machine cannot print (because paper is jammed, all paper trays
have run out of paper, toner is empty, or all paper trays are out of order)
• 00: Enabled unconditionally (Free)
• 01: Enabled when Own Name/Own Fax Number is received
• 11: Disabled (Reception off)
Switch: 05, Bit: 5
Just size printing
• 0: Off
• 1: On
6 Switch: 05, Bit: 7
Empty tray alert (Paper Empty Warning) even when one paper tray is empty
• 0: Off
• 1: On
Switch: 07, Bit: 2
Parallel Memory Transmission
• 0: Off
• 1: On
Switch: 08, Bit: 2
Authorized Reception Type
• 0: Receiving from specified senders only
• 1: Receiving all documents except from specified senders
Switch: 10, Bit: 1
Combine Two Originals
• 0: Off
• 1: On
Switch: 10, Bit: 5
Reception file setting
• 0: Off

228
Parameter Settings

• 1: On
Switch: 10, Bit: 6
Use both e-mail notification and printed reports to confirm the transmission result
• 0: Off
• 1: On
Switch: 10, Bit: 7
Have the machine delete the document data without printing it when an error occurs
• 0: Off
• 1: On
Switch: 11, Bit: 2
Detect and report nearly blank documents when scanning
• 0: Off
• 1: On
Switch: 11, Bit: 6
Local print when forwarding 6
• 0: Off
• 1: On
Switch: 14, Bit: 0
Print documents received with Auto Power-On Reception
• 0: Immediate printing (On)
• 1: When turning on the operation switch (Off)
Switch: 14, Bit: 1
Long Document Transmission (Well Log)
• 0: Off
• 1: On
Switch: 14, Bit: 3
Reset when function changed
• 0: Off
• 1: On
Switch: 15, Bit: 2, 1, 0
Selecting the available paper feed tray
You cannot specify any values other than the following
• 001: Tray 1

229
6. Fax Features

• 010: Tray 2
• 011: Tray 3
Switch: 15, Bit: 5
Select the specified paper feed tray
• 0: Off
• 1: On
Switch: 17, Bit: 2
Whether you need to press [Add Dest] after entering a Quick Dial/Group Dial when broadcasting
• 0: Not necessary
• 1: Necessary
Switch: 17, Bit: 3
Whether or not to reset the settings when original is scanned
• 0: On
• 1: Off
6 Switch: 18, Bit: 0
Print date with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 1
Print transmitter origin with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 2
Print file number with Fax Header
• 0: Off
• 1: On
Switch: 18, Bit: 3
Print page number with Fax Header
• 0: Off
• 1: On
Switch: 19, Bit: 1
Sort Journal by transmission type
• 0: Off

230
Parameter Settings

• 1: On
Switch: 20, Bit: 0
Automatic printing of the LAN-Fax Result Report
• 0: Off
• 1: On
Switch: 20, Bit: 5, 4, 3, 2
Reprinting time of stored documents in memory that could not be printed using LAN-Fax Driver
• 0000: 0 minutes
• 0001: 1 minute
• 0010: 2 minutes
• 0011: 3 minutes
• 0100: 4 minutes
• 0101: 5 minutes
• 0110: 6 minutes
• 0111: 7 minutes 6
• 1000: 8 minutes
• 1001: 9 minutes
• 1010: 10 minutes
• 1011: 11 minutes
• 1100: 12 minutes
• 1101: 13 minutes
• 1110: 14 minutes
• 1111: 15 minutes
Switch: 21, Bit: 0
Print results of sending Reception Notice Request message
• 0: Off (print only when an error occurs)
• 1: On (print every time)
Switch: 21, Bit: 1
Respond to e-mail reception acknowledgment request
• 0: Off
• 1: On
Switch: 21, Bit: 2
Choose whether to print JPEG or PDF files attached to incoming e-mail

231
6. Fax Features

• 0: Do not print
• 1: Print
Switch: 21, Bit: 3
File format for files forwarded to folder destinations
• 0: TIFF
• 1: PDF
Switch: 21, Bit: 4
Transmit Journal by E-mail
• 0: Off
• 1: On
Switch: 21, Bit: 5
Limit printing of specified data in normal e-mail (attached TIFF files)
• 0: No
• 1: Yes
6 Switch: 21, Bit: 6
Not displaying Network Errors
• 0: Off
• 1: On
Switch: 21, Bit: 7
Transmit Error Mail Notification
• 0: On
• 1: Off
Switch: 22, Bit: 0
Detect a dial tone before sending faxes when using the telephone line
• 0: Not detect (Off)
• 1: Detect (On)
Switch: 32, Bit: 0
Select priority order for alternative destinations if there is no destination of the specified type.
• 0: Paper Output Priority
<Priority Order>
1. IP-Fax destination
2. Fax number
3. E-mail address

232
Parameter Settings

4. Folder
• 1: Off
Electronic Output Priority
<Priority Order>
1. E-mail address
2. Folder
3. IP-Fax destination
4. Fax number
Switch: 32, Bit: 1
Specify whether or not originals placed faced down on the exposure glass are scanned at 81/2 ×
14
• 0: Off
• 1: On
Switch: 34, Bit: 0
Use gatekeeper with IP-Fax 6
• 0: Off
• 1: On
Switch: 34, Bit: 1
Use SIP Server with IP-Fax
• 0: Off
• 1: On
Switch: 37, Bit: 4
Display the sender's information in the file name of documents that are forwarded to folder destinations
• 0: Off
• 1: On
Switch: 37, Bit: 5
Specify whether or not to limit the file names of documents that are forwarded to folder destinations
to plain characters only
• 0: Off
• 1: On
Switch: 38, Bit:7, 6, 5, 4, 3, 2, 1, 0
Maximum number of resends the machine attempts after failing to forward a fax from a sender
(including special senders) to a folder destination
• 00000000/00000001: 1 time(s) 1111110/11111111: 254 time(s)

233
6. Fax Features

Switch: 39, Bit:7, 6, 5, 4, 3, 2, 1, 0


Interval (in minutes) between resend attempts after failing to forward a fax from a sender (including
special senders) to a folder destination
• 00000000: 0 minute(s) 11111111: 255 minute(s)

Changing the User Parameters

This section describes how to set parameters.

• Access to some User Parameter Setting may require options, or other settings may need to be made
beforehand.
• It is recommended that you print and store the “Parameter Settings List” when you program or change
parameter settings.
• Do not change any bit switches other than those shown on the previous pages.

6 1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.

4. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.

234
Parameter Settings

5. Select the switch number you want to change using the scroll keys, and then press the [OK]
key.

6. Select the bit number you want to change.

When the bit number is pressed, the current value switches between 1 and 0.
Repeat step 6 to change another bit number for the same switch.
7. Press the [OK] key.
6

8. Repeat steps 5 through 7 to change the switch settings.


9. After all the settings are finished, press the [User Tools/Counter] key.

• For details about how to print parameter settings list, see “Printing the Parameter Settings List”.

• p.235 "Printing the Parameter Settings List"

Printing the Parameter Settings List

Print this list to see the current Parameter Settings. However, only items of importance or often-used items
are included in the list.

235
6. Fax Features

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.

6
4. Select [Parameter Settings List] using [ ] or [ ], and then press the [OK] key.

5. Press the [Start] key.

To cancel printing a list, press the [Escape] key. The display returns to that of step 4.
6. Press the [User Tools/Counter] key.

236
Home Position

Home Position
Specify the type of original immediately after the power is turned on and when [Clear Modes] key is
pressed.
Home Position
• Image Density
For details about Image Density, see “Image Density (Contrast)”.
• Resolution
For details about Resolution, see “Resolution”.
• Original Type
For details about Original Type, see “Original Type”.
• Transmission Mode
For details about Transmission Mode, see “Transmission Modes”.
• Label Insertion
For details about Label Insertion, see “Label Insertion”. 6
• Fax Header
For details about Fax Header, see “Fax Header Print”.

• p.17 "Transmission Modes"


• p.41 "Original Type"
• p.42 "Resolution"
• p.43 "Image Density (Contrast)"
• p.108 "Fax Header Print"
• p.110 "Label Insertion"

Home Position Parameter List

For details about setting parameters, see “Parameter Settings”.


Do not change switches other than those listed.
Switch: 00, Bit: 3, 2, 1
Allows one of five image density steps to be set as the home position.
• 000: Normal density
• 001: The lightest density
• 010: The darkest density

237
6. Fax Features

• 101: Lighter density


• 110: Darker density
Switch: 00, Bit: 5, 4
Allows Standard, Details, or Fine to be set as the home position.
• 00: Standard
• 01: Detail
• 10: Fine
Switch: 01, Bit: 1, 0
Allows Text or Photo to be set as the home position.
• 00: Text
• 01: Photo
Switch: 02, Bit: 1
Allows either Immediate Transmission or Memory Transmission to be set as the home position.
• 0: Memory transmission
6 • 1: Immediate transmission
Switch: 02, Bit: 2
Allows the label insertion as the home position to be set to on or off.
• 0: Off
• 1: On
Switch: 02, Bit: 6, 5
Allows the fax header as the home position to be set to on or off.
• 00: Off
• 01: On

• p.226 "Parameter Settings"

Changing the Home Position

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

238
Home Position

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Parameter Setting] using [ ] or [ ], and then press the [OK] key.

4. Select [Home Position] using [ ] or [ ], and then press the [OK] key.

6
5. Select the switch number you want to change using the scroll keys, and then press the [OK]
key.

6. Select the bit number you want to change.

7. Press the [OK] key.

239
6. Fax Features

8. Press the [User Tools/Counter] key.

240
Program Special Sender

Program Special Sender


This section describes Program Special Sender.
By programming particular senders in advance, you can set the following function for each sender:
• Authorized RX
• Forwarding
• Memory Lock
• 2 Sided Print
Use Own Name or Own Fax Number to program your senders. If the sender has a machine of the same
manufacturer, program an Own Name that has already been programmed as a sender. If the machine is
not from the same manufacturer, Own Fax Number is used.
You can apply the same settings to all programmed numbers. You can then customize the settings for
individual numbers as necessary using the Special Sender Registration function.
The following items can be programmed.
Special Senders
Up to 30 Special Senders can be registered. A maximum of 24 characters can be used for each
6
name.
Full Agreement / Partial Agreement
When you program own names and facsimile names for multiple destinations, you can program a
common sequence of characters to identify destinations.
Using a Full agreement

Destination to be programmed (Own Name) Number of programmed identifications

NEW YORK BRANCH 3


HONG KONG BRANCH
SYDNEY BRANCH

Using a Partial agreement

Destination to be programmed (Own Name) Number of programmed identifications

BRANCH 1

You can program up to 30 wild cards.


Spaces are ignored when identifications are compared.
You can use wild cards for the following functions:

241
6. Fax Features

• Authorized RX
• Forwarding
• Memory Lock
• 2 Sided Print

• You cannot program senders as Special Senders if they do not have Own Name or Own Fax Number
programmed.
• The machine cannot differentiate between SEP Code RX documents from Special Senders.
• You cannot use the following functions with Internet Fax receptions.
• Authorized RX
• Memory Lock
• You can program up to 24 characters for the sender.
• To use Forwarding or 2 Sided Print with Internet Fax reception, program the sender's e-mail address.
• You can check Own Name and Own Fax Number using the Journal. You can check programmed
6 Special Senders using the specified sender list.
• For details about checking registered special senders, see “Printing Special Sender List”.
• To specify whether or not to configure “Initial Set UP of a Special Sender”, use the “Special RX
Function” setting in “Initial Set Up”. For details, see “Programming Initial Set Up of a Special Sender”.

• p.249 "Programming Initial Set Up of a Special Sender"


• p.251 "Printing Special Sender List"

Authorized Reception

Use this function to limit incoming senders.


The machine only receives faxes from programmed Special Senders, and therefore, it helps you screen
out unwanted documents, such as junk mail, and saves wasting fax paper.

• To use this function, program the Special Senders function, and then select “On” in “Authorized
Reception” with “Reception Settings”.
• Without programming Special Senders, the Authorized RX function will not work, even if you select
“On”.
• If you select “Off” for “Authorized Reception” in “Initial Set Up”, settings are the same as the Reception
Settings.
• You can change Special Senders in the same way as you program them.

242
Program Special Sender

• By setting User Parameters (switch 8, bit 2), you can configure the machine to receive transmissions
from specified senders only or to receive transmissions from other than specified senders only. See
“Parameter Settings”.

• p.226 "Parameter Settings"

Forwarding

Print received documents, and then transfer them to those receivers programmed beforehand.
Folder destination can be registered.
It is also possible to forward faxes sent only by senders programmed as Special Senders.

• If you specify “On” in “Forwarding” and select [Same as Basic Settings], the fax document is
forwarded to the receivers programmed in “Forwarding”.
• If you do not program any Special Senders, the machine transfers all incoming documents to the other
end receivers specified in “Forwarding”. 6
• You can set the fax destination, Internet Fax destination, IP-Fax destination, and folder destination,
as a forward destination.
• Set folder destinations using the Address Book Management function under System Settings. See
“Registering Folders”, Network and System Settings Guide.
• If you have specified a folder for forwarding, you can specify the file format you want to use for
forwarding in “Parameter Setting” (switch 21, bit 3). See “Parameter Settings”.

• p.226 "Parameter Settings"

Memory Lock

Store incoming documents from programmed senders (Special Senders) in memory without printing them.
People without the Memory Lock ID cannot print the documents, and therefore this function is useful for
receiving confidential documents. If you do not program any senders, the machine receives fax document
from all senders using Memory Lock reception.

• You must register Memory Lock ID in advance. For details about how to register Memory Lock ID,
see “Administrator Tools”.
• If you program the same sender in Memory Lock and Forwarding, Forwarding is disabled.

243
6. Fax Features

• p.208 "Administrator Tools"

2 Sided Print

Print on both sides of the paper.

Programming/Changing Special Senders

This section describes how to program and change Special Senders.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

6
2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.

4. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

244
Program Special Sender

5. Select senders using [ ] or [ ], and then press the [OK] key.

6. Enter the sender name, and then press the [OK] key.

Enter a sender name using Own Name or Own Fax Number.


7. Select [Full Agreement] or [Partial Agreement] using [ ] or [ ], and then press the [OK]
key.

8. Select items using [ ] or [ ], and then press the [OK] key.

You must select only the item you want to program.


To cancel these settings, press the [Escape] key. The display returns to that of step 5.
9. Press [Exit].

10. Press the [User Tools/Counter] key.

• For details about specifying items in step 8, see “Authorized RX (Authorized Reception)”,
“Forwarding”, “Memory Lock” , or “2 Sided Print”.

245
6. Fax Features

• p.246 "Authorized RX (Authorized Reception)"


• p.246 "Forwarding"
• p.248 "Memory Lock"
• p.248 "2 Sided Print"

Authorized RX (Authorized Reception)


This section describes how to specify Authorized RX.
Specify when programming a Special Sender.

1. Select [Authorized RX] using [ ] or [ ], and then press the [OK] key.

6
2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

Forwarding
This section describes how to specify Forwarding.
Specify when programming a Special Sender.

• One forward destination can be registered for each Special Sender. To register two or more forward
destinations, use group destinations. Up to 100 destinations can be specified in a group. However,
when adding a group to another group, a maximum of 150 destinations can be specified in a group.

1. Select [Forwarding] using [ ] or [ ], and then press the [OK] key.

246
Program Special Sender

2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
Selecting [Same as Basic Settings] will result in the same setting made for [Forwarding] under
[Administrator Tools].
If you select [Off] or [Same as Basic Settings], the display returns to that of step 1.

3. Specify an end receiver using the Quick Dial keys, and then press the [OK] key.
Pressing switches the destination.

4. Press the [OK] key. 6

• In Step 3, you can search for and specify the forwarding destination by pressing the [Search
Destination] key or a User Function key. To specify a forwarding destination by pressing a User
Function key, you must first register the [Specify Dest. Reg. No.] function as a User Function key. For
details about the User Function keys, see “General Settings/Adjust”.
• Set folder destinations using [Address Book Management] under [System Settings]. For details about
registering folder destinations, see “Registering Folders”, Network and System Settings Guide.
• When a folder is specified as the forward destination, you can set a file format for forwarding. See
“Parameter Settings” (switch 21, bit 3).
• Deleting a destination specified as a forward destination from the destination list causes the settings
of the forward destination to be deleted, so they must be registered again. When a destination is
changed, a document is transmitted to the new destination. If there is no destination of the specified
type, you can set which destination to be used as an alternative destination. See “Parameter
Settings” (switch 32, bit 0).

• p.199 "General Settings/Adjust"

247
6. Fax Features

• p.226 "Parameter Settings"

Memory Lock
This section describes how to specify Memory Lock.
Specify when programming a Special Sender.

• You must register Memory Lock ID in advance. For details about how to register Memory Lock ID,
see “Administrator Tools”.

1. Select [Memory Lock] using [ ] or [ ], and then press the [OK] key.

6 2. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.
Selecting [Same as Basic Settings] will result in the same setting made for [Memory Lock] under
[Administrator Tools].

• p.208 "Administrator Tools"

2 Sided Print
This section describes how to specify 2 Sided Print.
Specify when programming a Special Sender.

1. Select [2 Sided Print] using [ ] or [ ], and then press the [OK] key.

248
Program Special Sender

2. Select [Set] or [Do not Set] using [ ] or [ ], and then press the [OK] key.

Selecting [Same as Basic Settings] will result in the same setting made for [2 Sided Print] under
[Reception Settings].

Programming Initial Set Up of a Special Sender

This section describes how to program Initial Set Up of a Special Sender.


Program the “Initial Set Up” of a Special Sender.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.

4. Select [Initial Set Up] using [ ] or [ ], and then press the [OK] key.

249
6. Fax Features

5. Select [Authorized Reception] or [Special RX Function] using [ ] or [ ], and then press the
[OK] key.

6. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

7. Press the [User Tools/Counter] key.

Deleting a Special Sender


6
This section describes how to delete a Special Sender.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.

250
Program Special Sender

4. Select [Delete Special Sender] using [ ] or [ ], and then press the [OK] key.

5. Select the sender you want to delete using [ ] or [ ], and then press the [OK] key.

6. Press [Yes].

6
To cancel deleting a special sender, press [No]. The display returns to that of step 5.
7. Press the [User Tools/Counter] key.

Printing Special Sender List

You can display programmed Special Senders.

1. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

2. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

251
6. Fax Features

3. Select [Program Special Sender] using [ ] or [ ], and then press the [OK] key.

4. Select [Print Special Sender List] using [ ] or [ ], and then press the [OK] key.

5. Press the [Start] key.


The screen returns to step 4 after completion of printing.
To cancel printing, press the [Escape] key. The screen returns to step 4.
6. Press the [User Tools/Counter] key.
6

252
7. Appendix
This section explains specifications of the facsimile function.

Optional Equipment
This section explains the functions of options.

Handset

You can make or receive calls by installing the optional handset and dialing manually.

• For details about the functions, see “On Hook Dial” and “Manual Dial”.

• p.90 "On Hook Dial"


• p.92 "Manual Dial"

253
7. Appendix

Specifications
Fax Transmission and Reception
Component Specifications

Standard G3

Resolution G3:
8 × 3.85 lines/mm, 200 × 100 dpi (Standard character),
8 × 7.7 lines/mm, 200 × 200 dpi (Detail character),
8 × 15.4 lines/mm (Fine character)

Transmission time G3: 3 seconds at 28,800 bps, Standard resolution


(JBIG transmission: 2 seconds)

Data compression method MH, MR, MMR, JBIG

Maximum original size Standard: A4 , 81/2 × 14


Custom: 216 × 1200 mm, 81/2 × 47 inches

7 Maximum scanning size 216 × 1200 mm, 81/2 × 47 inches

Print process Printing on standard paper using a laser

Transmission speed G3:


33,600 / 31,200 / 28,800 / 26,400 / 24,000 / 21,600 /
19,200 / 16,800 / 14,400 / 12,000 / 9,600 / 7,200 /
4,800 / 2,400bps
(auto shift down system)

Power Consumption
Component Specifications

Immediate Transmission approx. 110 W

Memory Transmission approx. 85 W

Memory Reception approx. 85 W

Reception approx. 400 W

254
Specifications

IP-Fax Transmission and Reception


Component Specifications

Network Ethernet (1000BASE-T, 100BASE-TX, 10BASE-T)


Wireless LAN (Based on IEEE 802.11a/b/g)

Scan line density 8 × 3.85 lines/mm, 200 × 100 dpi (Standard character),
8 × 7.7 lines/mm, 200 × 200 dpi (Detail character),
8 × 15.4 lines/mm (Fine character)

Maximum original size Standard: A4 , 81/2 × 14


Custom: 216 × 1200 mm, 81/2 × 47 inches

Maximum scanning size 216 × 1200 mm, 81/2 × 47 inches

Transmission protocol Recommendation: T.38, TCP, UDP/IP communication, SIP (RFC


3261 compliant), H.323 v2

Compatible machines IP-Fax compatible machines

IP-Fax transmission function Specify an IP address and send faxes to an IP-Fax compatible fax
through a network.
Also capable of sending faxes to a G3 fax connected to a telephone
7
line via a VoIP gateway.

IP-Fax reception function Receive faxes sent from an IP-Fax compatible fax through a
network.
Also capable of receiving faxes from a G3 fax connected to a
telephone line via a VoIP gateway.

Internet Fax Transmission and Reception


Component Specifications

Network Ethernet (1000BASE-T, 100BASE-TX, 10BASE-T)


Wireless LAN (Based on IEEE 802.11a/b/g)

Transmit function E-mail

Scan line density 200 × 100 dpi (Standard character), 200 × 200 dpi (Detail
character), 200 × 400 dpi (Fine character)*1

Original size : Scanning width A4

255
7. Appendix

Component Specifications

Communication Protocols • Transmission


SMTP, TCP/IP
• Reception
POP3, SMTP, IMAP4, TCP/IP

E-mail format Single/Multi-part, MIME Conversion


Attached file forms:
• Internet Fax Transmission/Reception
TIFF-F (MH, MR*1, MMR*1 compression)
• Mail to Print
JPEG (JFIF), PDF

Authentication method SMTP-AUTH, POP before SMTP, A-POP

Internet communication Send and receive e-mail with a computer that has an e-mail
address.

E-mail send functions Automatic conversion of sent documents to e-mail format and e-
7 mail transmission. Memory transmission only.

E-mail receive functions Automatic detection and printing of appended TIFF-F (MH) files and
ASCII text. Memory reception only.

*1 Full mode

Specifications Required for the Internet Fax Destination Machines

This section explains the specifications required for the Internet Fax destination machine.
When communicating with full mode-compatible machines, you can take advantage of higher
specifications for coding, original size, and resolution. For details about the specifications available in full
mode, see “Internet Fax Transmission and Reception” in “Specifications”.

Component Specifications

Communication protocols • Transmission


SMTP
• Reception
POP3, SMTP, IMAP4

256
Specifications

Component Specifications

E-mail format • Format


MIME, Base64
• Content-Type
Image/tiff
Multipart/mixed (text/plain, Image/tiff (attached file forms))

Data format • Profile


TIFF Profile S
• Coding
MH
• Original size
A4
• Resolution (dpi)
200 × 100/200 × 200 or 204 × 98/204 × 196

7
• p.254 "Specifications"

257
7. Appendix

Maximum Values
The following list contains the maximum value for each item.

Item Description

Memory 4 MB

Number of documents you can store in memory for Memory Transmission 200

Number of pages you can store in memory (using A4 Standard <ITU-T Approx. 320
1 Chart>)

Number of destinations you can register in the destination list 150

Number of groups you can register 10

Number of destinations you can register in a group 100

Number of destinations you can specify per file 300

Number of destinations you can specify for all files (including files in 300
memory)
7 Number of destinations you can search for at a time 100

Number of redials the machine can store 10

Number of digits that can be included in a destination 128

Number of characters you can enter in the e-mail subject line 128

Number of digits for a SEP/SUB/PWD/SID Code 20

Number of communication results you can check on this machine 100

Number of communication results printed in the Journal 50

Number of special senders you can register 30

Number of LAN-Fax Driver transmission results you can check from a 70


network computer “SmartDeviceMonitor for Admin”,
“DeskTopBinder”, or Web Image Monitor

Number of documents sent from a LAN-Fax Driver that the machine can 200
retain as files to be sent

Number of received documents you can store on the machine's hard disk 200

258
Maximum Values

Item Description

Number of destinations you can register in the Address Book of the LAN- 2,000
Fax

Number of destinations you can specify at once using LAN-Fax 300

• The maximum number of pages that can be stored or transmitted may decrease depending on the
contents of documents.

259
7. Appendix

Trademarks
Adobe, Acrobat, Acrobat Reader, and Reader are either registered trademarks or trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
Microsoft®, Windows®, Windows Server®, Windows Vista®, and Outlook® are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
7 Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
• The product names of Windows Server 2008 are as follows:

260
Trademarks

Microsoft® Windows Server® 2008 Standard


Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

261
7. Appendix

262
INDEX
Canceling a transmission while the original is being
scanned..................................................................93
1 Sided for 1st Page...........................................120 Canceling a transmission while the original is being
2 Sided from 1st Page........................................120 transmitted..............................................................94
2 Sided Print.......................................201, 244, 248 Canceling an Immediate Transmission................93
2 sided printing...................................................144 Center Mark................................................143, 201
2 Sided TX...........................................................120 Changing a fax destination..................................68
Changing default settings...................................197
A
Changing the Home Position..............................238
About This Machine.................................................7 Changing the User Parameters..........................234
Acceptable original sizes.....................................37 Check Destination key...........................................60
Accessing User Tools..........................................197 Check/Stop TX File...............................................95
Add Dest................................................................23 Checkered Mark........................................143, 201
Add User..............................................................195 Checking files stored in memory........................151
Address Book..............................................173, 185 Checking the reception result.............................161
Address Book Management.................................66 Checking the result of the communication.........158
Adjust Sound Volume..........................................199 Checking the result of the Immediate Transmission.
Administrator Tools.............................................208 ..............................................................................159
Advanced Search..................................................86 Checking the specified destination......................60
Attach a Cover Sheet..........................................181 Checking the storage result..................................97
Attach Subject......................................................104 Checking the transmission result........................155
Attaching a created cover sheet........................188 Checking transmission using LAN-Fax Driver..........
Authorized Reception.........................................201 ..............................................................................183
Authorized RX.............................................242, 246 Clear Modes key............................................14, 93
Auto e-mail reception.........................................132 Clear/Stop key...............................................93, 94
Auto fax reception power-up.............................141 Combine Two Originals.....................................146
Auto Reception....................................................129 Communicating indicator......................................94
Auto Run program...............................................173 Communication Failure Report...........................159
Auto Switch..........................................................128 Communication Page Count..............................208
Automatic Redial...................................................23 Communication Result Report............................158
Confirming by e-mail..........................................157
B Confirming by report..................................156, 162
Basic transmission...............................................176 Confirming by report and e-mail.......................158
Before use............................................................172 Confirming on display................................155, 161
Broadcasting sequence........................................23 Confirming the reservations for SEP Code Reception
Bypassing the SMTP server...................................56 ..............................................................................118
Confirming the result of a SEP Code Reception......
C ..............................................................................118
Canceling a Memory Transmission......................93 Confirming transmission results by e-mail.........183
Canceling a transmission......................................93 Copy Reference.......................................................7
Canceling a transmission before the original is Counterfeit bank bills...............................................9
scanned..................................................................93 Creating a cover sheet........................................188
Canceling a transmission before the transmission is CSI - Own Fax Number.....................................126
started.....................................................................95

263
D Fax via computer.................................................171
Fine.........................................................................42
Darker key..............................................................43
Folder TX Result Report.......................................208
Deleting a fax destination.....................................71
Forwarding................................208, 222, 243, 246
Deleting a Special Sender..................................250
Forwarding destination.......................................137
Deleting Fax Information....................................220
Forwarding Mark................................................225
Deleting fax information using a Web browser......
..............................................................................194 Forwarding received documents.......................137
Deleting programmed destinations....................187 Full mode.......................................................34, 194
Detail......................................................................42 Functions not available for internet fax reception...
................................................................................34
Detecting blank sheet............................................39
Functions not available for internet fax transmission
Display List.............................................................77 ................................................................................33
Display panel.........................................................11 Functions not available for IP-Fax transmission.......
Double-Sided Transmission................................120 ................................................................................30
Dual Access...........................................................23 G
E G3 Analog Line...................................................210
E-mail........................................................... 203, 205 Gatekeeper (VoIP gatekeeper)............................29
E-mail Options.....................................................104 Gateway (VoIP gateway).....................................29
E-mail subject.........................................................34 Gateway Settings................................................206
E-mail text............................................................134 General Settings/Adjust.....................................199
E-mail TX Result...................................................157 H
E-mail TX results...................................................183
H.323.....................................................................29
ECM (Error Correction Mode).............................24
H.323 Settings....................................................205
Edit Cover Sheet..................................................188
Handset.........................................................92, 128
EditDest............................................................49, 53
Home Position...................................................... 237
Editing Address Book..........................................185
Home Position Parameter List.............................237
Editing fax cover sheets......................................187
How to read this manual.......................................10
Editing programmed destinations......................186
Enable H.323......................................................205 I
Enable SIP............................................................205 If memory runs out while storing an original.......24
Entering a destination directly............................179 If there is no paper of the correct size...............148
Entering a pause....................................................47 Image density (contrast)........................................43
Entering a tone.......................................................47 Image Density key.................................................43
Entering an e-mail address...................................53 Immediate Reception..........................................123
Entering an IP-Fax destination..............................49 Immediate Transmission..................................17, 24
Entering numbers using the number keys.............46 Immediate TX Result Report................................159
Escape key.............................................................14 Important..................................................................9
External telephone........................................92, 128 Installing individual applications........................174
F Internet fax destination machines.......................256
Internet Fax functions............................................31
Facsimile key.......................................................... 14
Internet Fax Settings............................................203
Fax...............................................................203, 205
IP.............................................................................84
Fax Header Print.................................................108
IP-Fax functions......................................................27

264
J N
JBIG reception.....................................................141 Names of major functions.....................................10
JBIG transmission...................................................42 Network and System Settings Guide.....................7
Job Information key............95, 151, 155, 161, 163 Notes on using Internet Fax..................................32
Journal.........................................................162, 164 Notes on using IP-Fax...........................................29
Journal by e-mail.................................................167 Notice.......................................................................9
JPEG.....................................................................135 O
Just size printing................................................... 148
OK key...................................................................14
L On Hook Dial........................................................90
Label Insertion.....................................................110 On Hook Dial key.................................................90
LAN-Fax Cover Sheet Editor.....................173, 187 On Hook Release Time.......................................199
LAN-Fax Driver...........................................171, 172 Operation switch.................................................141
LAN-Fax operation messages............................191 Original size..........................................................37
LAN-Fax Result Report........................................184 Original Type.........................................................41
LDAP Search..........................................................75 P
LDAP server............................................................86
Legal prohibition......................................................9 Page separation and length reduction..............146
Lighter key..............................................................43 Paper size and scanned area..............................38
Parallel Memory Transmission.......................17, 22
M Parameter Setting................................................209
Mail to Print..........................................................135 Parameter Settings..............................................226
Making settings for option configuration..........175 Password (PWD).................................................118
Managing facsimile functions using Password (SID)....................................................114
SmartDeviceMonitor for Admin.........................189 Pause/Redial key...........................................47, 62
Manual............................................................49, 53 PDF.......................................................................135
Manual Dial...........................................................92 Photo.......................................................................41
Manual e-mail reception....................................133 Placing into the ADF..............................................36
Manual Reception............................................... 128 Placing on the exposure glass..............................36
Manuals for this machine........................................7 Placing originals....................................................36
Maximum E-mail Size.........................................203 Preventing transmission to the wrong destination....
Maximum values.................................................258 ................................................................................63
MDN....................................................................105 Preview.................................................................181
Memory File Transfer.................................210, 212 Print.......................................................................153
Memory Lock.....................................208, 243, 248 Print completion beep.........................................143
Memory Reception..............................................124 Print Fax Header.........................................108, 181
Memory Storage Report.......................................97 Print Journal.................................................163, 208
Memory Transmission.....................................17, 19 Print Memory Lock File........................................168
Memory Transmission sequence..........................23 Print Reception Time............................................201
Menu Protect.......................................................211 Print TX Standby File............................................153
Mixing scan settings for a multiple page original... Print TX Standby File List.............................151, 208
................................................................................44 Printer Reference......................................................7
Printing a file from memory.................................153

265
Printing a file received with Memory Lock........168 Receiving e-mail..................................................131
Printing a list of files in memory..........................151 Receiving Internet Fax documents.....................132
Printing and saving..............................................185 Reception File Setting.................................202, 214
Printing fax information using a Web browser........ Reception functions.............................................137
..............................................................................193 Reception modes.................................................128
Printing on both sides..........................................144 Reception Notice.................................................105
Printing Special Sender List.................................251 Reception notice message..................................105
Printing the Journal..............................................163 Reception Report e-mail.....................................216
Printing the Parameter Settings List.....................235 Reception Settings...............................................201
Program..............................................60, 62, 72, 73 Reception time.....................................................144
Program Fax Information....................................199 Redial.....................................................................62
Program Memory Lock ID..................................209 Registering a fax destination................................66
Program Special Sender............................209, 241 Registering Fax Information.......................217, 218
Programmed Name............................................110 Report.................97, 118, 151, 158, 159, 164, 184
Programming an End Receiver...........................223 Resolution...............................................................42
Programming destination information from Web Return Receipt......................................................105
browser................................................................194
Returning the machine to the standby mode.......14
Programming destinations from Check Destination
screen.....................................................................72 Routing e-mail received via SMTP.....................139
Programming destinations from Redial screen........ RTI - Own Name.................................................126
................................................................................73 RX File Status........................................................161
Programming destinations in the Address Book...... RX Mode Auto Switch Time................................201
................................................................................66
S
Programming Initial Set Up of a Special Sender.....
..............................................................................249 Saving as files......................................................182
Programming new destinations..........................185 Scan Settings..........................................................41
Programming/Changing Special Senders.......244 Scanner Reference..................................................7
Properties.............................................................175 Scroll keys..............................................................14
PWD Code..........................................................118 Search Address Book............................................75
Q Search by destination list......................................77
Search by E-mail Address....................................82
Quick Dial key.................................................58, 59
Search by fax number........................................... 80
Quitting the forwarding function........................224
Search by IP-Fax destination................................84
Quitting User Tools..............................................198
Search by LDAP server..........................................86
R Search by Name...................................................75
RDS On/Off........................................................210 Search by Registration No...................................79
Re-entering a fax number to confirm destination.... Search Destination key.........................................75
................................................................................63 Search Fax Destination...................................80, 84
Reading the display...............................................14 Search LDAP....................................................75, 86
Reading the display panel and using keys..........14 Searching for a destination in the Address Book....
Receive File indicator.................................124, 168 ................................................................................75
Received images.................................................134 Security Reference...................................................7
Receiving documents according to parameter- Select Dial/Push Phone......................................209
specified settings.................................................126 Select Line..............................................................49
Receiving documents unconditionally...............125 Select Server..........................................................86

266
Selecting type of transmission..............................18 Standard................................................................42
Selection keys........................................................14 Start Manual Reception......................................128
Send at Specified Time.........................................99 Stop TX.............................................................94, 95
Send Later..............................................................99 Stored Reception File User Setting.....................202
Send via SMTP Server..........................................56 Stored Recpt.File User Set..................................202
Sender Settings....................................................101 SUB Code TX.......................................................112
Sending at a specific time.....................................99 SUB/SEP Code..........................................112, 116
Sending at specific time......................................180 Subject.................................................................104
Sending by Internet Fax........................................53 Substitute Reception............................................124
Sending by IP-Fax.................................................49 Switch Reception Mode.....................................201
Sending fax documents from computers...........171 Switch RX Mode key..................................128, 129
Sending originals using the exposure glass.......21, Switching between Memory and Immediate
26 Transmission...........................................................17
Sending over a fax line.........................................46 Switching the reception mode............................129
Sending to an e-mail address..............................53 Symbols..................................................................10
SEP Code RX........................................................116 System Settings......................................................66
SEP Code RX Reserve Report.............................118 T
SEP Code RX Result Report.................................118
Set User Function Key.........................................199 T.37 full mode...............................................34, 194
Setting a port number............................................53 Terminology...........................................................29
Setting LAN-Fax Driver properties.....................175 Text.........................................................................41
Setting print properties........................................175 TIFF-F format..........................................................31
Setting priority trays............................................148 To add new receiver...........................................195
Setting transmission function defaults................... 98 To edit machine properties already programmed. .
..............................................................................195
SID Code.............................................................114
Tone........................................................................47
SIP...........................................................................29
Top to Bottom......................................................120
SIP server................................................................29
Top to Top............................................................120
SIP Settings..........................................................206
Trademarks..........................................................260
SMTP reception using Internet Fax....................138
Transmission....................................................19, 24
SMTP RX File Delivery.........................................203
Transmission modes...............................................17
Specifications......................................................254
Transmitting Journal by e-mail............................166
Specifying a destination........................................46
Troubleshooting.......................................................7
Specifying a destination using a destination list......
..............................................................................178 TSI - Transmitting Subscriber Identification.......147
Specifying a destination using Address Book.......... TSI Print (Transmitting Subscriber Identification Print)
..............................................................................178 ..............................................................................147
Specifying a destination using the Quick Dial keys Two-sided printing..............................................144
................................................................................58 Two-Sided Transmission.....................................120
Specifying a group of destinations using the Quick TX File Status........................................................155
Dial keys.................................................................59 TX Mode............99, 104, 105, 108, 110, 112, 116
Specifying an IP address......................................49 TX Standby File List..............................................151
Specifying automatic deletion of incoming faxes Types of reception...............................................123
when an error occurs..........................................215
Specifying options...............................................180 U
Stamp...................................................................101 User Parameter List..............................................226

267
User Tools/Counter key.......................................66
Using the machine's Address Book as the LAN-Fax
Destination List.....................................................189
Using the software...............................................172
V
Viewing fax information using a Web browser.......
..............................................................................192
Viewing received fax documents using a Web
browser................................................................192
W
Web Image Monitor...........................................192
When placing an original into the ADF...............39
When placing an original on the exposure glass...
................................................................................38
When using a gatekeeper server or SIP server.......
................................................................................51

268 EN USA D069-7101


Copyright © 2008
Operating Instructions Facsimile Reference

Type for 917F/LD117F/MP 171F/Aficio MP 171F


Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF

EN USA D069-7101
Quick Reference Scanner Guide

cPlease put this guide above your machineg

1. {Search Destination} key 6. Display Panel 8. {User Tools/Counter} key 13. {Start} key
2. {Check Destination} key 6.1 E-mail icon 9. {Clear Modes} key Press this to begin scanning or
3. {Job Information} key 6.2 E-mail/Scan to Folder/ 10. {Clear/Stop} key sending.
4. {Color Scan} key WSD Scanner/ -clears an entered numeric 14. {#} key (Enter key)
5. Function keys Network Delivery Scanner value. 15. Number keys
Press the {Scanner} key to Press to switch between -stops scanning. 16. {OK} key
activate these keys. screens. 11. Main power indicator 17. {Original} key
6.3 Destination field 12. Operation switch 18. {Escape} key
Standard available: 6.4 [Options] Press this to turn the machine 19. {Lighter} key, {Darker} key
7. Scroll keys on/off. 20. Selection keys
Copier:
21. Quick Dial keys
Scanner:

Printer:
To use the scanner functions, several
settings must be made beforehand. Facsimile:
For details about these settings,
see Scanner Reference chapter 8
on the supplied CD-ROM.

How to scan...
Available scan functions: Registering an E-mail (Network and System Settings Guide
5. Registering Addresses and Users
A Scan to E-mail destination... for Facsimile/Scanner Functions)

A Press the {User Tools/Counter} key.


B Scan to Folder (SMB/FTP/NCP)
B Select [System Settings] using the {U} or {T} key, and then
C Scan Using WSD (Web Services on Devices) press the {OK} key.
C Select [Administrator Tools] using the {U} or {T} key, and
then press the {OK} key.


D Save to Removable Memory Device
D Select [Address Book Management] using the {U} or {T}
E Scan to Delivery Server This button needs to be key, and then press the {OK} key.
selected as a first step. E Select [Program / Change] using the {U} or {T} key, and
F Scan via TWAIN Driver
then press the {OK} key.
For details about C, D, E, and F, see Scanner F Enter the registration number you want to program using
Reference on the supplied CD-ROM. the number keys or the Quick Dial keys, and then press the
{OK} key.
G Enter the name, and then press the {OK} key.

How to use Scan to E-mail/ (1. Sending Scan Files by E-mail) F Only for scan to e-mail I Only for scan to e-mail H Press [Details].

Scan to Folder... (2. Sending Scan Files to Folders) Press [Options], select [Sender’s Name], and then specify Enter the subject if necessary. I Select [E-mail Settings] using the {U} or {T} key, and then
the sender. • Press [Options]. press the {OK} key.
A Press the {Scanner} key. • Select [Attach Subject], and then press the {OK} key.
J Enter the e-mail address using the number keys and the
Depending on the security settings, the logged-on user may • Enter the subject, and then press the {OK} key.
Quick Dial keys, and then press the {OK} key.
B Press the {Clear Modes} key. be specified as [Sender’s Name]. • Press the {Escape} key.
K Select [E-mail/Internet Fax Dest.] using the {U} or {T} key,
C If delivery scanner appears: G If necessary, press [Options] to specify the resolution and J Press the {Start} key. and then press the {OK} key.
• Press (6.2) to switch to the E-mail or Scan to Folder orientation of the originals. You must press the {#} key to send scan files that are L Select [On] or [Off] to specify whether or not SMTP server
screen. scanned from the exposure glass. is to be used using the {U} or {T} key, and then press the
H Select file type if necessary. {OK} key.
D Place originals. • Press [Options]. K If you still have originals to send, place them on the M Press [End].
• If necessary, specify the original type and scanning • Select [File Type], and then press the {OK} key. machine, and then press the {Start} key.
density. • Select the file type, and then press the {OK} key. N Press the {OK} key.
• Press the {Escape} key.
E Select destination(s). L After all originals are scanned, press the {#} key. For details about registering folders, see 5. Registering
In total, up to 100 destinations can be specified. Addresses and Users for Facsimile/Scanner Functions,
Network and System Settings Guide .

Copyright © 2008 Printed in China EN USA D468-6754


Chapter references in this guide refer to the bundled OI CD; Scanner Reference and Network and System Settings Guide.

StellaC4_QuickReferenceScannerGuide_F-USA.indd 1 10/22/2008 3:40:32 PM


Operating Instructions
Scanner Reference

1 Sending Scan Files by E-mail


2 Sending Scan Files to Folders
3 Sending Scan Files Using WSD
4 Saving Scan Files on a Removable Memory Device
5 Delivering Scan Files
6 Scanning Originals with the Network TWAIN Scanner
7 Various Scan Settings

8 Scanner Features

9 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
About the Scanner Functions...........................................................................................................................10
Display Panel....................................................................................................................................................12
Reading the Display and Using Keys.........................................................................................................12
Confirmation Displays.................................................................................................................................13
1. Sending Scan Files by E-mail
Before Sending Scan Files by E-mail..............................................................................................................15
Overview of Sending Scan Files by E-mail................................................................................................15
Preparation for Sending by E-mail.............................................................................................................16
Registering E-mail Addresses in the Address Book...................................................................................18
E-mail Screen...............................................................................................................................................19
Basic Procedure for Sending Scan Files by E-mail........................................................................................21
Specifying E-mail Destinations........................................................................................................................24
Selecting a Destination Registered to a Quick Dial Key...........................................................................24
Selecting the Destination from the Machine's Address Book...................................................................24
Entering an E-mail Address Manually........................................................................................................30
Selecting Destinations by Searching an LDAP Server...............................................................................31
Registering a Directly-Entered Destination in the Address Book..............................................................34
Specifying the E-mail Sender..........................................................................................................................36
Selecting a Sender Registered to a Quick Dial Key.................................................................................36
Selecting a Sender from the List..................................................................................................................37
Using a Registration Number to Specify a Sender Name........................................................................39
Searching for a Sender by Name..............................................................................................................40
Searching for a Sender by E-mail Address...............................................................................................42
Setting the Return Receipt Function.................................................................................................................45
Entering the E-mail Subject..............................................................................................................................46

1
Security Settings to E-mails..............................................................................................................................47
Sending Encrypted E-mail...........................................................................................................................47
Sending E-mail with a Signature.................................................................................................................48
2. Sending Scan Files to Folders
Before Sending Files by Scan to Folder.........................................................................................................51
Overview of Sending Scan Files by Scan to Folder..................................................................................51
Preparation for Sending by Scan to Folder...............................................................................................53
Registering Destination Folders in the Address Book................................................................................55
Scan to Folder Screen.................................................................................................................................56
Basic Procedure When Using Scan to Folder................................................................................................58
Specifying Scan to Folder Destinations..........................................................................................................60
Selecting a Destination Registered to a Quick Dial Key...........................................................................60
Selecting the Destination from the Machine's Address Book...................................................................60
Sending Files to a Shared Folder...............................................................................................................66
Sending Files to an FTP Server....................................................................................................................71
Sending Files to NetWare Server...............................................................................................................73
Registering the Path to the Selected Destination in the Address Book.....................................................78
3. Sending Scan Files Using WSD
Before Sending Scan Files Using WSD..........................................................................................................81
Overview of Sending Scan Files Using WSD............................................................................................81
Preparation for Sending Files Using WSD.................................................................................................83
Using the WSD Scanner (Push Type).............................................................................................................87
WSD Scanner (Push Type) Screen.............................................................................................................87
Basic Procedure for Sending Scan Files Using WSD (Push Type)...........................................................87
Specifying the Destination Client Computer..............................................................................................89
Using the WSD Scanner (Pull Type)...............................................................................................................93
Basic Procedure for Sending Scan Files Using WSD (Pull Type).............................................................93
Configuring the Scan Settings on a Client Computer....................................................................................95
Changing a Scan Profile.............................................................................................................................95
Creating a New Scan Profile......................................................................................................................96
Scan Profile Items and Settings...................................................................................................................96
4. Saving Scan Files on a Removable Memory Device
Before Saving Files on a Removable Memory Device..................................................................................99

2
Overview of Saving Files on a Removable Memory Device...................................................................99
Basic Procedure for Saving Scan Files on a Removable Memory Device................................................101
5. Delivering Scan Files
Before Delivering Files...................................................................................................................................103
Overview of Scan File Delivery................................................................................................................103
Preparing to Deliver Files..........................................................................................................................104
Installing DeskTopBinder Lite from the Supplied CD-ROM...................................................................106
Network Delivery Scanner Screen..........................................................................................................107
Basic Procedure for Delivering Files.............................................................................................................109
Specifying Delivery Destinations..................................................................................................................112
Selecting a Destination Using a Quick Dial Key.....................................................................................112
Selecting a Destination Registered in the Destination List of the Delivery Server.................................112
Specifying the Sender...................................................................................................................................118
Selecting a Sender Registered to a Quick Dial Key...............................................................................118
Selecting a Sender by Searching the Delivery Server's Destination List...............................................119
Entering the Subject of the E-mail to Be Transmitted via the Delivery Server............................................125
6. Scanning Originals with the Network TWAIN Scanner
Before Using the Network TWAIN Scanner...............................................................................................127
Overview of the Network TWAIN Scanner............................................................................................127
Preparing to Use the Network TWAIN Scanner.....................................................................................128
Installing the TWAIN Driver from the Supplied CD-ROM.....................................................................130
Basic Network TWAIN Scanner Procedure................................................................................................132
Scan Settings When Using TWAIN Scanner..............................................................................................134
Setting Original Orientation on the TWAIN Scanner............................................................................134
7. Various Scan Settings
Specifying Send Options..............................................................................................................................137
Resolution...................................................................................................................................................137
Original Orientation..................................................................................................................................138
Original Setting.........................................................................................................................................140
Scan Size...................................................................................................................................................141
File Type.....................................................................................................................................................143
Notes About and Limitations of File Types..............................................................................................145
PDF Security Encryption............................................................................................................................145

3
PDF Security Permissions...........................................................................................................................148
Selecting Original Type................................................................................................................................151
Adjusting Image Density................................................................................................................................153
8. Scanner Features
Accessing User Tools.....................................................................................................................................155
Changing User Tools.................................................................................................................................155
Closing User Tools.....................................................................................................................................156
Scan Settings..................................................................................................................................................157
Destination List Settings..................................................................................................................................159
Send Settings..................................................................................................................................................160
Output Settings...............................................................................................................................................163
Administrator Tools........................................................................................................................................164
9. Appendix
Relationship between Resolution and Scan Size........................................................................................165
When Using the E-mail, Folder Sending, WSD Scanner, or Network Delivery Functions.................165
When Using as a TWAIN Scanner..........................................................................................................166
Software Supplied on CD-ROM..................................................................................................................168
Auto-Run Program.....................................................................................................................................168
TWAIN Driver............................................................................................................................................168
DeskTopBinder Lite....................................................................................................................................169
Values of Various Set Items for Transmission/Delivery Function...............................................................171
Transmission function.................................................................................................................................171
Network Delivery Function.......................................................................................................................173
About WIA Scanning....................................................................................................................................175
Specifications.................................................................................................................................................178
Trademarks.....................................................................................................................................................181
INDEX...........................................................................................................................................................183

4
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.

• Media differ according to manual.


• The printed and electronic versions of a manual have the same contents.
• Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files.
• A Web browser must be installed in order to view the html manuals.
About This Machine
Before using the machine, be sure to read the section of this manual entitled Safety Information.
This manual introduces the machine's various functions. It also explains the control panel, preparation
procedures for using the machine, how to enter text, how to install the CD-ROMs provided, and how
to replace paper, toner, staples, and other consumables.
Troubleshooting
Provides a guide for resolving common usage-related problems.
Copy Reference
Explains Copier functions and operations. Also refer to this manual for explanations on how to place
originals.
Facsimile Reference
Explains Facsimile functions and operations.
Printer Reference
Explains Printer functions and operations.
Scanner Reference
Explains Scanner functions and operations.
Network and System Settings Guide
Explains how to connect to the machine to a network, configure and operate the machine in a network
environment, and use the software provided. Also explains how to change User Tools settings and
how to register information in the Address Book.
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. For enhanced
security, we recommend that you first make the following settings:
• Install the Device Certificate.
• Enable SSL (Secure Sockets Layer) Encryption.

5
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For "UNIX Supplement", please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product name General name

DeskTopBinder Lite and DeskTopBinder


DeskTopBinder
Professional *1

ScanRouter EX Professional *1 and ScanRouter EX


the ScanRouter delivery software
Enterprise *1

*1 Optional

6
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

7
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.

[]
Indicates the names of keys that appear on the machine's display panel.

[]
Indicates the names of keys on the machine's control panel.

Note

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual.
Colors on color keys or the color circle may differ slightly from the colors of actual copies.
The color samples in this manual may differ slightly from the colors of actual copies.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

8
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.

9
About the Scanner Functions
This section describes functions you can use in the scanner mode.
You can use the scanner functions to send scan files to computers, to scan originals from a computer using
the TWAIN driver, and to save scan files on a removable memory device.
For details about each function, see respective chapters.
Sending scanned files (Network Scanner)
Scan files can be sent to or stored on a computer, and you can specify the format of a scan file
according to how the file will be used.
• Sending by e-mail
You can send scan files to specified e-mail addresses.
For details, see chapter 1 "Sending Scan Files by E-mail".
• Sending to folders
Scan files can be stored in shared network folders, or on FTP or Netware servers.
For details, see chapter 2 "Sending Scan Files to Folders".
• Sending using WSD (Push Type)
You can use Web Services on Devices (WSD) to send scan files to a client computer.
For details, see chapter 3 "Sending Scan Files Using WSD".
• Delivering
You can deliver scan files using a delivery server.
For details, see chapter 5 "Delivering Scan Files".
Scanning originals from a client computer
• WSD (Pull Type)
You can use the WSD scanner function to scan files from a networked or directly connected
computer.
For details, see chapter 3 "Sending Scan Files Using WSD".
• TWAIN scanner
You can use the TWAIN driver to scan files from a networked or directly connected computer.
For details, see chapter 6 "Scanning Originals with the Network TWAIN Scanner".
Saving files
You can save scan files on a removable memory device such as a USB memory stick or an SD card.
For details, see chapter 4 "Saving Scan Files on a Removable Memory Device".

10
• This machine’s scanner functions are only available as the network functions. They are not available
through direct (USB) connection.

• p.15 "Sending Scan Files by E-mail"


• p.51 "Sending Scan Files to Folders"
• p.81 "Sending Scan Files Using WSD"
• p.103 "Delivering Scan Files"
• p.127 "Scanning Originals with the Network TWAIN Scanner"
• p.99 "Saving Scan Files on a Removable Memory Device"

11
Display Panel
This section explains the display, the control panel keys, and the two confirmation displays: Check Dest.
and File Status.
In this manual you can find explanations about the E-mail screen, Scan to Folder screen, WSD scanner
screen, and the network delivery scanner screen.
For details about each of these screens, see "E-mail Screen", "Scan to Folder Screen", "WSD Scanner (Push
Type) Screen", and "Network Delivery Scanner Screen".

• p.19 "E-mail Screen"


• p.56 "Scan to Folder Screen"
• p.87 "WSD Scanner (Push Type) Screen"
• p.107 "Network Delivery Scanner Screen"

Reading the Display and Using Keys

This section explains how to read the display and use the selection keys.

BRB006S

1. Selection keys
Press to select an item displayed at the bottom of the screen.
Example: the standby screen
• When the instruction "press [ ] to switch to the E-mail screen" is given in this manual, press the
left selection key.
• When the instruction "press [Manual]" is given in this manual, press the center selection key.
• When the instruction "press [Options]" is given in this manual, press the right selection key.
2. [Escape] key
Press to cancel operation or return to the preceding display.

12
3. [OK] key
Press to specify a function on the display or determine a selected function.
4. Scroll key
Press to move the cursor in each direction, step by step. When the [ ], [ ], [ ], or [ ] key appears in this manual,
press the scroll key of the same direction.

Confirmation Displays

This section explains two confirmation displays: Check Dest. and File Status.

Check destination
This section explains about displayed items and how to display the Check Dest. screen.
Use the Check Dest. screen to check the details of e-mail, Scan to Folder, or delivery destinations.
Pressing the [Check Destination] key switches the screen from the initial scanner screen to the Check Dest.
screen.
Check Dest.

ARO002S

1. Destination
Displays the transmission or delivery destinations.
When multiple destinations are specified, you can change the display by pressing the [ ] or [ ] key.
2. Transmission function icon
Displays the icon of the transmission function (e-mail, Scan to Folder, or delivery function) in use.
3. [Program]
For e-mail or Scan to Folder, if you press [Program], the destination that is entered directly or specified by
browsing the server can be registered in the machine's address book.

File status
This section explains the items that appear on the screen and how to display File Status.
Use the File Status screen to check e-mail, Scan to Folder, and delivery results.

13
Press the [Job Information] key to display File Status.
File Status

BRB014S

1. Date / Time
Displays the date and time the machine sent a transmission request, or the date and time " Done", " Error",
or " Canceled" was confirmed.
2. Destination
The destination is displayed with the icon of the transmission function (e-mail, Scan to Folder, or delivery
function).
If you have selected multiple destinations, the first selected destination is displayed. Other destinations
appear as “+ X” (X indicates the number of destinations.) when sending files by e-mail or delivering them.
3. Number of scanned pages
Displays the number of scanned pages.
4. Status
One of the following transmission status is displayed: " Done", " Sending", " Waiting", " Error" or "
Canceled".
5. [Print]
Press to print transmission results.

• Depending on the security settings, some transmission results might not appear in File Status.

14
1. Sending Scan Files by E-mail
You can attach scan files to e-mails and send them via connections such as LAN and the Internet.

1
Before Sending Scan Files by E-mail
This section explains the necessary preparations and the procedure for sending scan files by e-mail.

Overview of Sending Scan Files by E-mail

This section describes the process for sending scan files by e-mail.

ZZZ801S

1. This machine
You can attach scan files to e-mail and send them to a mail server. You can also encrypt and/ or attach signature
to the scan files you send by e-mail.
2. SMTP server
You need to have an access to an e-mail server that supports SMTP (Simple Mail Transfer Protocol), to send scan
files by e-mail. However, it is not essential to have an e-mail server inside the LAN where this machine belongs.
It transfers a received e-mail to a specified destination through a LAN or the Internet.
3. Client computer
Use e-mail client software to receive e-mail messages and scan file attachments that are generated by this
machine.
4. LDAP Server
Use this server for administering e-mail accounts, searching the network, and authenticating the computers that
access the machine. Using the LDAP server, you can search for destinations from the machine.

15
1. Sending Scan Files by E-mail

Preparation for Sending by E-mail

To send scanned files by e-mail, you must first perform the following:

1 • Check the machine is properly connected to the network


• Configure the network settings in [System Settings]
• Configure the necessary settings in [Scanner Features]

Checking the machine is properly connected to the network


Check that this machine is properly connected to the network.
For details about how to connect this machine to a network, see "Connecting to the Interfaces", Network
and System Settings Guide.

Configuring the network settings in [System Settings]


Configure the network settings in [System Settings] according to your environment and how you will be
using the machine.
The following procedure explains connecting this machine to an IPv4 network using Ethernet cable.
Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use E-mail
Function", Network and System Settings Guide.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.


2. Select [Interface Settings], and then press the [OK] key.

16
Before Sending Scan Files by E-mail

3. Select [Network], and then press the [OK] key.

1
4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, press [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address] to make necessary settings, and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
7. Select [LAN Type] and [Ethernet], and then press the [OK] key.
8. Select [File Transfer], select [SMTP Server], and then press the [OK] key.

9. Select [Server Name], enter the SMTP server host name or IPv4 address, and then press the
[OK] key.

• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.

Configuring the necessary settings in [Scanner Features]


Using [Scanner Features], you can make or change various settings related to the scanner function, such
as compressing scan data or printing the scanner journal. Configure the scanner settings according to your
environment and how you will be using the machine.
This section explains how to display the Scanner Features screen. For details about the settings on this
screen, see "Scanner Features".

1. Press the [User Tools/Counter] key.

17
1. Sending Scan Files by E-mail

2. Select [Scanner Features], and then press the [OK] key.

1
The Scanner Features screen appears.
3. Select [Scan Settings], [Destination List Settings], [Send Settings], or [Administrator Tools],
and then configure the relevant settings.

• p.155 "Scanner Features"

Registering E-mail Addresses in the Address Book

You can register frequently used e-mail addresses in the address book.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.


2. Select [Administrator Tools], and then press the [OK] key.

3. Select [Address Book Management], and then press the [OK] key.

• For details about registering e-mail addresses in the address book, see "Registering Addresses and
Users for Facsimile/Scanner Functions", Network and System Settings Guide.

18
Before Sending Scan Files by E-mail

• You can also register e-mail addresses in the address book using Web Image Monitor or
SmartDeviceMonitor for Admin. For details about how to display Web Image Monitor or install
SmartDeviceMonitor for Admin, see "Monitoring and Configuring the Printer", Network and System
Settings Guide. For details about registering addresses in the address book, see Web Image
Monitor or SmartDeviceMonitor Help. 1
• Depending on the machine type, you may not be able to use the machine when it is updating the
address book using CSV files (retrieved using SmartDeviceMonitor for Admin) that contain user codes.
• Encrypted files can be sent by e-mail only to destinations for which decryption is set. For details about
sending encrypted files by e-mail, see "Security Settings to E-mails".

• p.47 "Security Settings to E-mails"

E-mail Screen

This section explains the screen layout when sending scan files by e-mail.
Main Screen

BRB007S

When a destination is entered manually

ZZZ602S

19
1. Sending Scan Files by E-mail

When a group is selected for destination

ZZZ603S

1. E-mail icon
Indicates that the E-mail screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.
3. E-mail / Scan to Folder / Network Delivery Scanner
Press to switch between screens. You can also use this key to switch between the E-mail and Scan to Folder
functions when sending the same file to both e-mail and Scan to Folder destinations at the same time.
4. [Manual]
When specifying a destination that is not registered, press [Manual], and then enter the e-mail address of
the destination using the Quick Dial keys.
5. [Options]
Press to make the scan settings and specify formats of files you want to send.
6. [Add Dest]
When selecting multiple destinations after a manual entry of an e-mail address, press [Add Dest], and then
enter the e-mail address of the destination.
7. [EditDest]
When changing an e-mail address that has been entered, press [EditDest], and then enter the new e-mail
address.
8. [View]
Press to check the addresses registered in a group.

20
Basic Procedure for Sending Scan Files by E-mail

Basic Procedure for Sending Scan Files by E-mail


This section describes the basic operation for sending scan files by e-mail.

1. Make sure that no previous settings remain. 1


If a previous setting remains, press the [Clear Modes] key.
2. If the Network Delivery Scanner or Scan to Folder screen is displayed, press [ ]
to switch to the E-mail screen.

3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select the destination.
You can specify multiple destinations.
For details, see "Specifying E-mail Destinations".

7. Press [Options] to select [Sender's Name], and then specify the e-mail sender.
For details, see "Specifying the E-mail Sender".

8. If necessary, select [Return Receipt] under [Options] to make settings for the Return Receipt
function.
For details, see "Setting the Return Receipt Function".

21
1. Sending Scan Files by E-mail

9. If necessary, select [Attach Subject] under [Options] to specify the e-mail subject.
For details, see "Entering the E-mail Subject".
10. If necessary, select [E-mail Encryption] or [E-mail Signature] under [Options] to apply
1 security settings to e-mail.
For details, see "Security Settings to E-mails".
11. If necessary, specify other settings under [Options] such as resolution and original
orientation.
For details, see "Specifying Send Options".
12. Press the [Start] key.
• When scanning from the exposure glass
If you are scanning only one original, press the [ ] key to send the scan file.
If you are scanning multiple originals, place them on the machine, and then press the [Start] key.
Repeat this step until originals are scanned, and then press the [ ] key.
• When scanning from the ADF/ARDF
Transmission starts immediately after originals are scanned.

• If you have selected two or more destinations, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For details, see "File Transfer",
Network and System Settings Guide.
• Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• To use Message Disposition Notification, log on to the machine as a user and specify the sender.
Note, however, that the [Return Receipt] notification e-mail may not be transmitted if the e-mail
software of the recipient does not support Message Disposition Notification.
• If you press the [Check Destination] key, the initial scanner screen switches to the Check Dest. screen.
You can use the Check Dest. screen to check the details of the selected destinations. For details, see
"Check destination".
• To cancel scanning, press the [Clear/Stop] key.
• When [E-mail Encryption] is selected under [Options], if you specify multiple destinations, a delivery
failure message will appear each time a scan file is sent to a destination where decryption settings
have not been configured.

• p.151 "Selecting Original Type"

22
Basic Procedure for Sending Scan Files by E-mail

• p.153 "Adjusting Image Density"


• p.24 "Specifying E-mail Destinations"
• p.36 "Specifying the E-mail Sender"
• p.45 "Setting the Return Receipt Function" 1
• p.46 "Entering the E-mail Subject"
• p.47 "Security Settings to E-mails"
• p.137 "Specifying Send Options"
• p.13 "Check destination"

23
1. Sending Scan Files by E-mail

Specifying E-mail Destinations


This section explains how to specify e-mail destinations.
1 You can specify e-mail destinations by any of the following methods:
• Select a destination registered to a Quick Dial key
• Select the destination from the machine's address book
• Enter the e-mail address manually
• Search the LDAP server for the destination and select it

• You can specify multiple destinations.

Selecting a Destination Registered to a Quick Dial Key

This section explains how to select a destination registered to a Quick Dial key.
For details about how to register an e-mail destination to a Quick Dial key, see "Registering Addresses and
Users for Facsimile/Scanner Functions", Network and System Settings Guide.

1. Press the Quick Dial key to which the destination is registered.


Repeat this step to add more destinations.

BRB005S

The illustration is an example. The actual appearance may be different.

Selecting the Destination from the Machine's Address Book

This section explains how to select the destination from the machine's address book.

24
Specifying E-mail Destinations

• To use this function, you must register the destinations in [System Settings] in advance. For details, see
"Registering Addresses and Users for Facsimile/Scanner Functions", Network and System Settings
Guide.
1
You can use the following methods to select destinations registered in the machine's address book:
• Select a destination from the list
• Enter the destination's registration number
• Search for a destination by name
• Search for a destination by e-mail address

Selecting a destination from the list


Use the following procedure to select the destination from the destination list.

1. Press the [Search Destination] key.

BRB003S

2. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.

3. Press the [ ] or [ ] key to select the destination from the list, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.

25
1. Sending Scan Files by E-mail

4. Press the [OK] key.

• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
press the [OK] key.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.

Selecting destinations by entering the registration numbers


Select the destination from the machine's address book using its registration number.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.

3. Use the number keys to enter the three-digit number assigned to the destination, and then
press the [OK] key.
Example: To enter 003

26
Specifying E-mail Destinations

Press the [3] key, and then press the [OK] key.

1
4. Press the [OK] key.

• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
press the [OK] key.

Searching for a destination by name


Use the following procedure to search by name for a destination in the machine's address book.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Select [Search by Name], and then press the [OK] key.

27
1. Sending Scan Files by E-mail

3. Enter the beginning of the destination name, and then press the [OK] key twice.

1
Destinations that match the search conditions are displayed.
4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.

• Up to 100 destinations can be displayed as search results.


• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
press the [OK] key.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.

Searching for a destination by e-mail address


Use the following procedure to search by e-mail address for a destination in the machine's address book.

28
Specifying E-mail Destinations

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to select [Search by E-mail Address], and then press the [OK] key.

3. Enter the beginning of the e-mail address, and then press the [OK] key twice.

Destinations that match the search conditions are displayed.


4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.

29
1. Sending Scan Files by E-mail

• If under [System Settings], [LDAP Search] is set to [On], a screen to select a search object appears
when you press the [Search Destination] key. On the screen, select [Search Address Book], and then
1 press the [OK] key.
• Up to 100 destinations can be displayed as search results.
• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.

Entering an E-mail Address Manually

This section explains how to enter an e-mail address manually.

1. Press [Manual].

2. Enter the e-mail address.

3. Press the [OK] key.

• Depending on the security settings, [Manual] may not be displayed. For details, consult the
administrator.
• To modify or change an entered e-mail address, press [EditDest].
• To add another destination, press [Add Dest], and then enter an e-mail address.
• You can register manually-entered e-mail addresses in the machine's address book. For details, see
"Registering a Directly-Entered Destination in the Address Book".

30
Specifying E-mail Destinations

• p.34 "Registering a Directly-Entered Destination in the Address Book"

Selecting Destinations by Searching an LDAP Server 1


This section explains now to search for an address registered in an LDAP server and specify it as an e-mail
destination.

• To use this function, an LDAP server must be connected to the network.


• It is necessary to register the LDAP server under [System Settings]. Also, set [LDAP Search] to [On]
under [System Settings]. For details, see "System Settings", Network and System Settings Guide.

1. Press [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Select [Search LDAP], and then press the [OK] key.

3. Select [Select Server], and then press the [OK] key.

31
1. Sending Scan Files by E-mail

4. Select the server, and then press the [OK] key.

1
If authentication is required to access the server, the authentication screen appears. Enter the user
name and password correctly.
The Search LDAP screen reappears.
5. Select the [Advanced Search], and then press the [OK] key.

6. Specify the search conditions.


The following example uses fuzzy search by destination name.
Select [Name], and then press the [OK] key.

7. Enter a part of the destination name.


Search can be by surname or first name, depending on the LDAP server's settings. Consult your
administrator.

8. Press the [OK] key.


9. Select a search criterion, and then press the [OK] key.

32
Specifying E-mail Destinations

appears on the left side of the specified condition.


You can also refine the search by setting multiple search conditions.
10. Press the [Escape] key.
11. Press [Search]. 1

Destinations that match the search conditions are displayed.


12. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
13. Press the [OK] key.

• Up to 100 destinations can be displayed as search results.


• If an e-mail address returned by the LDAP server is too long, it will be impossible to specify it as the
destination. For details about the number of characters that can be specified, see "Sending E-mail".
• You can register multiple e-mail addresses in individual LDAP server accounts. However, only one e-
mail address will be displayed as the search result. Usually, the address that was registered first on
the LDAP server is the address that is displayed.
• You can select criteria from the following list:
• [Include]: The names which contain an entered character or characters are targeted.
For example, to search for "ABC", enter "A", "B", or "C".
• [Exclude]: The names which do not contain an entered character or characters are targeted.
For example, to search for "ABC", enter "D".
• [First Word]: The names which start with the entered character or characters are targeted.
For example, to search for "ABC", enter "A".

33
1. Sending Scan Files by E-mail

• [Last Word]: The names which end with the entered character or characters are targeted.
For example, to search for "ABC", enter "C".
• [Exact Match]: The names which correspond to an entered character or characters are targeted.
1 For example, to search for "ABC", enter "ABC".
• [Fuzzy Search]: a vague search (The function of this vague search depends on the system
supported by the LDAP server.)

• p.171 "Sending E-mail"

Registering a Directly-Entered Destination in the Address Book

This section explains how to register a directly-entered destination in the machine's address book. You can
also register a destination selected from the LDAP server.

1. Press the [Check Destination] key.

BRB004S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to display the destination you want to register, and then press
[Program].

34
Specifying E-mail Destinations

3. Enter the name, and then press the [OK] key

1
4. Press [Details] and [Reg. No.] to specify registration information. After you have made all
settings, press the [OK] key.

For details about specifying registration information, see "Registering Addresses and Users for
Facsimile/Scanner Functions", Network and System Settings Guide.
5. Press the [Escape] key

• Depending on the security settings, [Program] may not appear. In such case, you cannot complete
the registration.
• To register in the machine's address book a destination searched for and selected from the LDAP
server, display the destination, and then press [Program].

35
1. Sending Scan Files by E-mail

Specifying the E-mail Sender


This section explains how to specify the e-mail sender.
1 To send e-mail, you must specify the name of the sender.
You can specify the e-mail sender by any of the following methods:
• Select a sender registered to a Quick Dial key
• Select the sender from the machine’s address book list
• Select the sender by entering the registration number
• Search by name for a sender in the machine's address book
• Search by e-mail address for a sender in the machine's address book

• Senders must be registered in advance under [System Settings]. For details, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For detail, see "File Transfer",
Network and System Settings Guide.
• Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• When a protection code has been set, a screen for entering the protection code appears after selecting
the sender. Enter the protection code, and then press the [OK] key. If the protection code you entered
is correct, the sender name is displayed.

Selecting a Sender Registered to a Quick Dial Key

This section explains how to select a sender registered to a Quick Dial key.
For details about how to register e-mail senders to Quick Dial keys, see "Registering Addresses and Users
for Facsimile/Scanner Functions", Network and System Settings Guide.

1. Press [Options].

36
Specifying the E-mail Sender

2. Select [Sender's Name], and then press the [OK] key.

1
3. Press the Quick Dial key to which the sender is registered.

BRB005S

The illustration is an example. The actual appearance may be different.


4. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

Selecting a Sender from the List

This section explains how to select a sender from the machine's address book list.

1. Press [Options].

37
1. Sending Scan Files by E-mail

2. Select [Sender's Name], and then press the [OK] key.

1
3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.

5. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.

The check box on the left side of the selected sender is selected.
To cancel a selected sender, press the [ ] or [ ] key to select the target sender, and then press the
[ ] key.
6. Press the [OK] key.

38
Specifying the E-mail Sender

7. Press the [OK] key.

1
"Programmed" appears, and then the Send Options screen reappears.

Using a Registration Number to Specify a Sender Name

Select the sender using the registration numbers specified by senders in the machine's address book.

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.

39
1. Sending Scan Files by E-mail

4. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.

1
5. Use the number keys to enter the three-digit number assigned to the sender, and then press
the [OK] key.
Example: To enter 001
Press the [1] key, and then press the [OK] key.

6. Press the [OK] key.

7. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

Searching for a Sender by Name

This section explains how to search by name for a sender in the machine's address book.

1. Press [Options].

40
Specifying the E-mail Sender

2. Select [Sender's Name], and then press the [OK] key.

1
3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Select [Search by Name] and then press the [OK] key.

5. Enter the beginning of the sender name, and then press the [OK] key twice.

Senders that match the search conditions are displayed.


6. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.

41
1. Sending Scan Files by E-mail

7. Press the [OK] key.

1
8. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

• Up to 100 destinations can be displayed as search results.

Searching for a Sender by E-mail Address

This section explains how to search by e-mail address for a sender in the machine's address book.

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

42
Specifying the E-mail Sender

3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Select [Search by E-mail Address], and then press the [OK] key.

5. Enter the beginning of the sender's e-mail address, and then press the [OK] key twice.

Destinations that match the search conditions are displayed.


6. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

7. Press the [OK] key.

43
1. Sending Scan Files by E-mail

8. Press the [OK] key.

1
"Programmed" appears, and then the Send Options screen reappears.

• Up to 100 destinations can be displayed as search results.

44
Setting the Return Receipt Function

Setting the Return Receipt Function


This section explains how to set the Return Receipt function.
If you set Return Receipt, the selected sender will receive e-mail notification when the e-mail recipient opens 1
his/her e-mail.

1. Press [Options].

2. Press the [ ] or [ ] key to select [Return Receipt], and then press the [OK] key.

3. Select [On], and then press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

• To use the Return Receipt function, you must specify the sender. Note, however, that the [Return
Receipt] notification e-mail may not be transmitted if the e-mail software of the recipient does not
support Message Disposition Notification.
• When the administrator's e-mail address is automatically specified as a sender, notification e-mail
will not be sent even if [Return Receipt] is selected. For details about [Admin. E-mail Address] and
[Auto Specify Sender Name], see "System Settings", Network and System Settings Guide.

45
1. Sending Scan Files by E-mail

Entering the E-mail Subject


When sending a scan file by e-mail, you can enter a subject line for the e-mail.
1 1. Press [Options].

2. Press the [ ] or [ ] key to select [Attach Subject], and then press the [OK] key.

3. Select the user text, and then press the [OK] key.

4. Enter the subject, and then press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

• If you do not specify the e-mail subject, the settings specified in [Default E-mail Subject] on the [Send
Settings] tab under [Scanner Features] will be applied. For details, see "Send Settings".

• p.160 "Send Settings"

46
Security Settings to E-mails

Security Settings to E-mails


This section explains the procedure for applying security (encryption and a signature) to e-mail.
Applying security (encryption and a signature) to e-mail helps prevent spoofing and information leakage. 1
• The S/MIME is used to set security. For details about security settings, consult your network
administrator.
• If you apply security to an e-mail, an error might occur depending on the file size attached to the e-
mail. If such an error occurs, change the resolution or other scan settings, and then send the e-mail
again. For details, see "Scan Settings".
• Applying security to e-mail can reduce transmission speed.

• p.157 "Scan Settings"

Sending Encrypted E-mail

Use the following procedure to specify a destination for which encryption is configured, and encrypt and
send an e-mail.
Destinations for which encryption can be configured for each transmission are indicated by this symbol
.

1. Press [Options].

2. Press the [ ] or [ ] key to select [E-mail Encryption], and then press the [OK] key.

47
1. Sending Scan Files by E-mail

3. Press the [ ] or [ ] key to select [Encrypt dest. with ], and then press the [OK] key.

1
appears on the left side of the specified setting.

• Encrypting e-mail will increase its size.


• If you do not want to send encrypted e-mail, select [Do not Encrypt] in step 4.
• When you specify a destination denoted by the symbol (which indicates that e-mail sent to this
destination is always encrypted) encrypted e-mail will be sent regardless of the setting specified in
[E-mail Encryption].
• If you have selected multiple destinations including destinations for which encryption has not been
configured, e-mail sent to such destinations will not be encrypted even if you specify encryption.

Sending E-mail with a Signature

Use the following procedure to apply a signature to an e-mail that has scan file attachments.

1. Press [Options].

2. Press the [ ] or [ ] key to select [E-mail Signature], and then press the [OK] key.

3. Press the [ ] or [ ] key to select [Use Signatures], and then press the [OK] key.

appears on the left side of the specified setting.

48
Security Settings to E-mails

• The certificate (device certificate) installed on this machine is used to attach signatures.
• Note that the following can result if certain signature settings are specified by the administrator:
• [E-mail Signature] does not appear. This is because you cannot apply signatures to scan files 1
that are sent by e-mail.
• You cannot change the [E-mail Signature] settings. This is because a signature is always applied
to scan files that are sent by e-mail.
• If you do not want to send signed e-mail, select [Do not Use Signatures] in step 4.

49
1. Sending Scan Files by E-mail

50
2. Sending Scan Files to Folders
Using the Scan to Folder function, you can send scan files over the network to shared folders, FTP server
folders, or NetWare folders.

Before Sending Files by Scan to Folder


2
This section describes the preparations and procedure for sending files by Scan to Folder.

Overview of Sending Scan Files by Scan to Folder

This section describes the process for sending scan files by Scan to Folder.

Sending files to shared folders

ZZZ802S

1. This machine
You can send scan files to shared network folders. To send scan files to shared network folders, use the SMB
protocol.
2. Computer with a shared folder
To use this function, it is necessary to create a shared folder in advance. You can specify a shared folder to save
scan files.
3. Client computer
You can also browse scanned files saved to a shared folder from a client computer.

51
2. Sending Scan Files to Folders

Sending files to an FTP server

ZZZ803S

1. This machine
You can send scan files to FTP server folders. To send scan files to FTP server folders, use the FTP protocol.
2. FTP server
The FTP server is a server that provides file transfer services among computers on the same network. Transferred
files are stored on this server. It is essential to have the FTP server inside the LAN/WAN where this machine
belongs. It is not possible to access an FTP server via a proxy server.
3. Client computer
You can browse scanned files saved to an FTP server from a client computer. You need to have an FTP client
program on the computer to connect to an FTP server.

Sending files to a NetWare server

ZZZ804S

1. This machine
You can send scan files to NetWare folders. To send scan files to NetWare folders, use the NCP protocol.

52
Before Sending Files by Scan to Folder

2. NetWare server
You can use this server to share files over the network via NetWare. By sending image data to the server, files
can be stored on the server.
3. Client computer
To download files, a computer must be running the NetWare client and be logged onto the server.

Preparation for Sending by Scan to Folder


2
To send scanned files by Scan to Folder, you must first perform the following:
• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Configure the necessary settings in [Scanner Features]

Checking the machine is properly connected to the network


Check that this machine is properly connected to the network.
For details about how to connect this machine to a network, see "Connecting to the Interfaces", Network
and System Settings Guide.

Configuring the network settings in [System Settings]


Configure the network settings in [System Settings] according to your environment and how you will be
using the machine.
The following procedure explains connecting this machine to an IPv4 network using Ethernet cable.
Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use Scan to Folder
Function", Network and System Settings Guide.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.

53
2. Sending Scan Files to Folders

2. Select [Interface Settings], and then press the [OK] key.

2 3. Select [Network], and then press the [OK] key.

4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
Select [Effective Protocol], select [SMB], and then select [Active]. Then press the [OK] key.
To send files to Netware folders, select [NetWare], and then select [Active].
6. Select [LAN Type] and [Ethernet], and then press the [OK] key.

• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.

Configure the necessary settings in [Scanner Features]


Using [Scanner Features], you can make or change various settings related to the scanner function, such
as compressing scan data or viewing the scanner journal. Configure the scanner settings according to your
environment and how you will be using the machine.
This section explains how to display the Scanner Features screen. For details about the settings on this
screen, see "Scanner Features".

1. Press the [User Tools/Counter] key.


2. Select [Scanner Features], and then press the [OK] key.
The Scanner Features screen appears.

54
Before Sending Files by Scan to Folder

Select [Scan Settings], [Destination List Settings], [Send Settings], or [Administrator Tools], and then
configure the relevant settings.

• p.155 "Scanner Features"

Registering Destination Folders in the Address Book 2


You can register the addresses of frequently-used destination folders in the address book. This section
explains how to register destination folders in the address book.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.


2. Select [Administrator Tools], and then press the [OK] key.

3. Select [Address Book Management], and then press the [OK] key.

• For details about registering the address of a destination folder in the address book, see "Registering
Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• You can register entries in the address book using Web Image Monitor or SmartDeviceMonitor for
Admin. For details about how to display Web Image Monitor or install SmartDeviceMonitor for
Admin, see "Monitoring and Configuring the Printer", Network and System Settings Guide. For details
about registering addresses in the address book, see Web Image Monitor or SmartDeviceMonitor
Help.
• Depending on the machine type, you may not be able to use the machine when it is updating the
address book using CSV files (retrieved using SmartDeviceMonitor for Admin) that contain user codes.

55
2. Sending Scan Files to Folders

Scan to Folder Screen

This section describes the screen layout when sending scan files by Scan to Folder.
Main screen

BRB008S

When a destination is entered manually

ZZZ605S

When a group is selected for destination

ZZZ606S

1. Scan to Folder icon


Indicates that the Scan to Folder screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.

56
Before Sending Files by Scan to Folder

3. E-mail /Scan to Folder /Network Delivery Scanner


Press to switch between screens. You can also use this key to switch between the E-mail and Scan to Folder
functions when sending a file to both e-mail and Scan to Folder destinations at the same time.
4. [Dest.:]
When specifying a destination that is not registered, press [Dest.:], and then enter the path to the destination
using the Quick Dial keys.
5. [Options] 2
Press to make the scan settings and specify formats of files you want to send.
6. [Add Dest]
Press to add a manually entered folder path as a destination.
7. [EditDest]
Press to modify or change a manually entered folder path.
8. [View]
Press to check the destinations registered in a group.

57
2. Sending Scan Files to Folders

Basic Procedure When Using Scan to Folder


This section describes the basic procedure involved in using Scan to Folder.

1. Make sure that no previous settings remain.


If a previous setting remains, press the [Clear Modes] key.
2 2. If the network delivery scanner screen or E-mail screen is displayed, press [ ] key
to switch to the Scan to Folder screen.

3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select a destination.
You can specify multiple destinations.
For details, see "Specifying Scan to Folder Destinations".

7. If necessary, press [Options] to specify the resolution and orientation of the originals.

For details, see "Specifying Send Options".


8. Press the [Start] key.
• When scanning from the exposure glass
If you are scanning only one original, press the [ ] key to send the scan file.

58
Basic Procedure When Using Scan to Folder

If you are scanning multiple originals, place them on the machine, and then press the [Start] key.
Repeat this step until originals are scanned, and then press the [ ] key.
• When scanning from the ADF/ARDF
Transmission starts immediately after originals are scanned.

• If you have selected more than one destination, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
2
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key. To cancel a destination selected from the address book, press the selected
destination again.
• To cancel scanning, press the [Clear/Stop] key.

• p.151 "Selecting Original Type"


• p.153 "Adjusting Image Density"
• p.60 "Specifying Scan to Folder Destinations"
• p.137 "Specifying Send Options"

59
2. Sending Scan Files to Folders

Specifying Scan to Folder Destinations


This section explains how to specify Scan to Folder destinations.
You can send a file by Scan to Folder by any of the following methods:
• Select a destination registered to a Quick Dial key

2 • Select a destination registered in the machine’s address book


• Send a file to a shared network folder
• Send a file to an FTP server
• Send a file to NetWare server

• You can specify multiple destinations.

Selecting a Destination Registered to a Quick Dial Key

This section explains how to select a destination registered to a Quick Dial key.
For details about how to register a Scan to Folder destination to a Quick Dial key, see "Registering
Addresses and Users for Facsimile/Scanner Functions", Network and System Settings Guide.

1. Press the Quick Dial key to which the destination is registered.


Repeat this step to add more destinations.

BRB005S

The illustration is an example. The actual appearance may be different.

Selecting the Destination from the Machine's Address Book

This section explains how to select the destination from the machine's address book.

60
Specifying Scan to Folder Destinations

• To use this function, you must register the destinations in [System Settings] in advance.
You can select a destination registered in the machine's address book by any of the following methods:
• Select the destination from the destination list
• Select the destination by entering it's registration number
• Search for a destination by name 2
• Search for a destination by folder path

• If you have specified the address protection code for accessing the address book, the screen for
entering the address protection code appears. Enter the protection code, and then press the [OK]
key. If the protection code you entered is correct, you can specify Scan to Folder destinations from
the address book.
• Depending on the security setting, some destinations may not appear in the destination list.

Selecting a destination folder from the list


Use the following procedure to select a destination from the list.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.

61
2. Sending Scan Files to Folders

3. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

2 The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.
4. Press the [OK] key.

• To cancel a selected destination, press the [ ] or [ ] key to select the target destination, and then
press the [ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.

Using a registration number to select a destination folder


Select the destination from the machine's address book using its registration number.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.

62
Specifying Scan to Folder Destinations

2. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.

3. Using the number keys, enter the three-digit registration number assigned to the destination, 2
and then press the [OK] key.
Example: To enter 002
Press the [2] key, and then press the [OK] key.

4. Press the [OK] key.

Searching for a destination by name


Use the following procedure to search by name for a destination in the machine's address book.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.

63
2. Sending Scan Files to Folders

2. Select [Search by Name], and then press the [OK] key.

2 3. Enter the beginning of the destination name, and then press the [OK] key twice.

Destinations that match the search conditions are displayed.


4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.

• Up to 100 destinations can be displayed as search results.

Search for a destination by folder path


Use the following procedure to search by folder path for a destination in the machine's address book.

64
Specifying Scan to Folder Destinations

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Select [Search by Folder Name], and then press the [OK] key.

3. Enter the beginning of the folder path, and then press the [OK] key twice.
Enter the folder path in the following format: \\computer name\folder name.

Destinations that match the search conditions are displayed.


4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.

65
2. Sending Scan Files to Folders

• Up to 100 destinations can be displayed as search results.

Sending Files to a Shared Folder

2 This section explains how to specify the destination when sending files to a shared network folder.

• The shared folder must have been created on the client computer in advance. For details about creating
shared folders, see Windows Help.
• You can create the shared folder under Windows 98/Me/2000/XP/Vista, Windows NT 4.0,
Windows Server 2003/2003 R2/2008, and Mac OS X 10.2 or later.
• Depending on the operating system of the client computer, access to the shared folder may require
authentication.
• This machine does not support DFS (Distributed File System).
You can send a file to a shared folder over the network by any of the following methods:
• Enter the path to the destination manually
• Specifying the destination folder path by browsing

Entering the path to the destination manually


You can enter the path to the destination folder manually.

1. Press [Dest.:].

2. Select [SMB], and then press the [OK] key.

66
Specifying Scan to Folder Destinations

3. Select [Manual Entry], and then press the [OK] key.

4. Enter the path to the destination folder, and then press the [OK] key. 2
The following is an example of a path where the folder name is “user” and the computer name is
“desk01”: \\desk01\user.
Instead of specifying the destination using its computer name, you can also use its IPv4 address.

5. Enter a user name used to log on to the client computer, and then press the [OK] key.

6. Enter the password used to log on to the client computer, and then press the [OK] key.

The Confirm Destination screen appears.


7. Press [Com.Test].

A connection test starts.

67
2. Sending Scan Files to Folders

8. The test result appears. Press [Exit].

2 9. Press the [OK] key.

• If authentication is required to access the folder, the login screen appears. Enter the user name and
password.
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• Computer and shared folder names containing more than 12 characters cannot be displayed.
• To modify or change an entered folder path, press [EditDest].
• To add another destination, press [Add Dest], and then enter its folder path.
• The connection test may take time.
• Even if the connection test was successful, the machine may fail to transfer the file if you do not have
write privileges for the file or there is not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".

• p.78 "Registering the Path to the Selected Destination in the Address Book"

Specifying the path by browsing the network for destinations


Use the following procedure to specify a destination folder path by browsing computers on the network.

1. Press [Dest.:].

68
Specifying Scan to Folder Destinations

2. Select [SMB], and then press the [OK] key.

3. Press [Browse Network], and then press the [OK] key. 2

A list of domains or work groups on the network appears.


4. Select the domain or workgroup that includes the destination folder you want to specify,
and then press the [OK] key.

5. Select the destination computer.

If you cannot find the destination computer, press the [ ] or [ ] key. Select the computer, and then
press the [OK] key. The computer folder opens. Press [Up] or the [Escape] key to go up one level.
6. A login screen appears if authentication is required. Enter a user name and password used
to log on to the client computer, and then press the [OK] key.

7. Select the destination folder, and then press [Apply].


If you cannot find the destination folder, press the [ ] or [ ] key. Select the folder, and then press the
[OK] key. The folder opens. Press [Up] or the [Escape] key to go up one level.

69
2. Sending Scan Files to Folders

8. Press the [OK] key.

9. Press [Com.Test].

10. The test result appears. Press [Exit].

11. Press the [OK] key.

• If authentication is required to access the folder, the login screen appears. Enter the user name and
password.
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• If you press [Cancel] while browsing the network, the Path Entry Method screen reappears.
• Computer and shared folder names containing more than 12 characters cannot be displayed.
• Up to 100 computers and shared folders can be displayed on the "Browse Ntwrk" screen.
• The machine may fail to transfer the file if you do not have the write privileges for the shared folder
or there is not enough free hard disk space.

70
Specifying Scan to Folder Destinations

• You can register the path to the destination in the machine' address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".

• p.78 "Registering the Path to the Selected Destination in the Address Book"

Sending Files to an FTP Server 2


This section explains how to specify destinations when sending files to an FTP server.

Entering the path to an FTP server manually


You can enter the path to an FTP server manually.

1. Press [Dest.:].

2. Select [FTP], and then press the [OK] key.

3. Enter the FTP server name, and then press the [OK] key.
Instead of specifying the destination using its server name, you can also use its IPv4 address.

4. If you change the port number specified under [System Settings], enter a new number using
the number keys, and then press the [OK] key.

71
2. Sending Scan Files to Folders

5. Enter the user name, and then press the [OK] key.

2 6. Enter the password, and then press the [OK] key.

7. Enter the path to the destination folder, and then press the [OK] key.
The following is an example of a path where the sub folder name is “lib” and the folder name is “user”:
user\lib.

A destination confirmation screen appears.


8. Press [Com.Test].

A connection test starts.


9. The test result appears. Press [Exit].

72
Specifying Scan to Folder Destinations

10. Press the [OK] key.

2
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• The connection test may take time.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".

• p.78 "Registering the Path to the Selected Destination in the Address Book"

Sending Files to NetWare Server

This section explains how to specify destinations when sending files to a NetWare server.
The NetWare folder of the destination can be specified in an NDS tree or on a NetWare Bindery server,
depending on the NetWare environment. Consult your administrator.
You can send a file to NetWare server by any of the following methods:
• Enter the destination path of the Netware server directly
• Specify the path by browsing to the destination on the Netware server

Entering the path of the Netware server directly


You can enter the path of the NetWare server.

1. Press [Dest.:].

73
2. Sending Scan Files to Folders

2. Select [NCP], and then press the [OK] key.

2 3. Select the connection type, and then press the [OK] key.
Select [NDS] to specify a folder in the NDS tree. Select [Bindery] to specify a folder on the NetWare
Bindery server.

4. Select [Manual Entry], and then press the [OK] key.

5. Enter the destination folder path, and then press the [OK] key.
If you set the connection type to [NDS], the NDS tree name is “tree”, the name of the context including
the volume is “context”, the volume name is “volume”, and the folder name is “folder”, the path will
be \\tree\volume.context\folder”. If you set the connection type to [Bindery], the NetWare server
name is “server”, the volume name is “volume”, and the folder name is “folder”, the path will be “\
\server\volume\folder”.

6. Enter a user name to log on to the NDS tree or Netware Bindery server, and then press the
[OK] key.

74
Specifying Scan to Folder Destinations

If you select [NDS] for connection type, enter the user name, and then enter the name of the context
containing the user object. If the user name is “user” and the name of the Context is “context”, the
user name will be “user.context”.
7. If a password is specified for the log on user, enter it, and then press the [OK] key.

The Confirm Destination screen appears.


8. Press [Com.Test].

A connection test starts.


9. Check the test result, and then press [Exit].

10. Press the [OK] key.

• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• You can connect only to folders that you have the read privileges for.
• The connection test may take time.
• Even if the connection test was successful, the machine may fail to transfer the file if you do not have
write privileges for the file or there is not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".

75
2. Sending Scan Files to Folders

• p.78 "Registering the Path to the Selected Destination in the Address Book"

Specify the path by browsing to the destination on the Netware server


Specify the path by browsing to the destination folder in an NDS tree or on a NetWare Bindery server.
2 1. Press [Dest.:].

2. Select [NCP], and then press the [OK] key.

3. Select the connection type, and then press the [OK] key.
Select [NDS] to specify a folder in the NDS tree. Select [Bindery] to specify a folder on the NetWare
Bindery server.

4. Press [Browse Network], and then press the [OK] key.

A list of NetWare Bindery servers or NDS trees on the network appears.

76
Specifying Scan to Folder Destinations

5. Select the NDS tree or NetWare Bindery server that contains the required destination folder,
and then press the [OK] key.

2
A list of NDS contexts or NetWare Bindery server volumes appears.
6. A login screen appears if authentication is required. Enter a user name and password, and
then press the [OK] key.

7. Select a context or volume that contains the required destination folder, and then press the
[OK] key.

A list of destination folders appears.


8. Select the destination folder, and then press [Apply].

9. The path to the selected folder is displayed. Check the path is correct, and then press the
[OK] key.

77
2. Sending Scan Files to Folders

10. The destination is displayed. Check the destination is correct, and then press the [OK] key.

2
• If you change the protocol after entering the path name, user name, or password, a confirmation
message appears.
• Only folders that you have the read privileges for are displayed.
• If the language used for the NDS tree or by the NetWare Bindery server differs from that used by the
machine, file names in the NDS tree or on the NetWare Bindery server might appear garbled.
• If the selected NDS tree or NetWare Bindery server requires authentication, a login screen appears.
Enter a user name and password for logging on to the NDS tree or NetWare Bindery server. If you
log on to the NDS tree, enter a user name, and then enter the name of the context containing the user
object. If the user name is "user" and the name of the Context is "context", the user name will be
"user.context".
• The machine may fail to transfer the file if you do not have write privileges for the folder or there is
not enough free hard disk space.
• You can register the path to the destination in the machine's address book. For details, see "Registering
the Path to the Selected Destination in the Address Book".

• p.78 "Registering the Path to the Selected Destination in the Address Book"

Registering the Path to the Selected Destination in the Address Book

This section explains how to register folder paths you have entered manually or specified by browsing the
network to the machine's address book.

78
Specifying Scan to Folder Destinations

1. Press the [Check Destination] key.

BRB004S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to display the destination you want to register, and the press
[Program].

3. Enter the name, and then press the [OK] key.

4. Press [Details] and [Reg. No.] to specify registration information. After you have made all
settings, press the [OK] key.

• Depending on the security settings, [Program] may not appear. In such case, you cannot complete
registration. For details, consult your administrator.

79
2. Sending Scan Files to Folders

80
3. Sending Scan Files Using WSD
If your computer has a WSD-compliant operating system such as Windows Vista, you can send scan files
to the computer or send scanning requests to this machine from the computer simply by connecting the
computer to the network.

Before Sending Scan Files Using WSD


This section explains the preparations and procedures for using WSD.
This machine provides the following two forms of WSD scanning:
3
• WSD (Push Type)
This allows you to send scan files to a client computer through the network.
To begin a scan job, press the [Start] key on the machine. Note that you cannot scan originals from
client computers.
• WSD (Pull Type)
This allows you to send scanning requests to this machine from a client computer through the network.
To begin a scan job, send a scanning request from a client computer.

• This function is available only if your computer has a WSD-compliant operating system such as
Windows Vista. Check your computer's settings before using the WSD scanner.
• The example explanations shown in this manual are based on Windows Vista Ultimate.
• When you configure the personal authentication function or user code authentication, the WSD
scanner function will be automatically disabled. To perform WSD scanning again, you must enable
the WSD scanner function. For details about enabling this function, see "Enabling WSD using Web
Image Monitor".

• p.84 "Enabling WSD using Web Image Monitor"

Overview of Sending Scan Files Using WSD

This section describes the process of sending scan files using WSD.

81
3. Sending Scan Files Using WSD

Sending files using WSD (Push Type)

3
ZZZ805S

1. This machine
From this machine you can specify destinations, and then send scan files to WSD-compliant client computers.
2. Client computers (WSD-compliant)
WSD-compliant computers receive the sent scan files via the network.

Sending files using WSD (Pull Type)

ZZZ805S

1. This machine
Scans originals after receiving a scanning request from a client computer, and then sends the scan files over the
network to the client computer.
2. Client computers (WSD-compliant)
You can specify scan settings and send scanning requests from client computers using Windows Fax and Scan
or a similar application. Client computers can receive files scanned by this machine.

82
Before Sending Scan Files Using WSD

Preparation for Sending Files Using WSD

To send scanned files using WSD, you must first perform the following:
• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Enable WSD using Web Image Monitor
• Register the machine to a client computer

Checking the machine is properly connected to the network


3
Check that this machine is properly connected to the network.
For details about how to connect this machine to a network, see "Connecting to the Interfaces", Network
and System Settings Guide.

Configuring the network settings in [System Settings]


Configure the network settings in [System Settings] according to your environment and how you will be
using the machine.
The following procedure explains connecting this machine to an IPv4 network using Ethernet cable.
Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use WSD
Scanner", Network and System Settings Guide.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.


2. Select the [Interface Settings], and then press the [OK] key.

83
3. Sending Scan Files Using WSD

3. Select [Network], and then press the [OK] key.

4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and then press the
[OK] key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
3 to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address] to make necessary settings, and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.

• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet] and then configure the network settings.

Enabling WSD using Web Image Monitor


To use this machine as a WSD scanner, you must first configure the following settings using Web Image
Monitor on a client computer:
• Settings for WSD (Push Type) and WSD (Pull Type)
• WSD protocol (default setting: [Active])
Click [Configuration], click [IPv4] or [IPv6] under [Network], and then enable [WSD (Scanner)].
• Settings to enable WSD (Push Type)
• [Display WSD Destination List] (default setting: [Do not Display])
Click [Configuration], click [Administrator Tools] under [Scanner], and then set [Display WSD
Destination List] to [Display].
• Settings to enable WSD (Pull Type)
• [Prohibit WSD Scan Command] (default setting: [Prohibit])
Click [Configuration], click [Administrator Tools] under [Scanner], and then set [Prohibit WSD
Scan Command] to [Do not Prohibit].
Use the following procedure to enable both WSD (Push Type) and WSD (Pull Type).

1. On the [Start] menu, click [Network].

84
Before Sending Scan Files Using WSD

2. Double-click the icon for this machine.


The Web Image Monitor login page appears.
3. Click [Login].
4. Enter your login user name and password in the [Login User Name] and [Login Password]
boxes respectively, and then click [Login].
Consult your administrator if you require a login user name and password.
5. On the menu in the left frame, click [Configuration].
6. Under [Scanner], click [Administrator Tools].
The [Administrator Tools] page appears.
3
7. Set [Display WSD Destination List] to [Display].
8. Set [Prohibit WSD Scan Command] to [Do not Prohibit].
9. Click [OK].

• For details about displaying Web Image Monitor, see "Monitoring and Configuring the Printer",
Network and System Settings Guide. For details about using Web Image Monitor, see Web Image
Monitor Help.

Registering the machine to a client computer


Use the following procedure to register this machine to a client computer.

• You must log on as an Administrators group member to register the machine.


• The client computer cannot detect the machine if they are on different network segments or if the
Windows Vista Network Search setting is disabled. For details, see Windows Help.

1. On the [Start] menu, click [Network].


The [Network] window appears and the device search starts automatically.
2. Right-click the icon for this machine, and then click [Install].
The [User Account Control] dialog box appears.
3. Click [Continue].

• If the [Found New Hardware] dialog box appears, install the printer driver using the procedure shown
under "Installing the Printer Driver".
• When registration is complete, the scan profile is created automatically. To change the scan profile,
see "Changing a Scan Profile".

85
3. Sending Scan Files Using WSD

• p.95 "Changing a Scan Profile"

86
Using the WSD Scanner (Push Type)

Using the WSD Scanner (Push Type)


This section explains the WSD Scanner (Push Type) functions.

WSD Scanner (Push Type) Screen

This section explains the layout of the screen that allows you to send scan files using WSD (Push Type).
Main Screen
3

BRB009S

1. WSD icon
Indicates that the WSD screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.
3. E-mail / Scan to Folder / Network Delivery Scanner / WSD Scanner
Press to switch between screens.
4. [WSD Dest]
The list of available destinations is displayed here.
If all of the destinations cannot be displayed, press the [ ] or [ ] key to move through the list.
5. [Options]
Press to make scan settings.

Basic Procedure for Sending Scan Files Using WSD (Push Type)

This section explains the basic procedure for sending scan files using WSD (Push Type).

87
3. Sending Scan Files Using WSD

• If the message "Updating destination list has failed. Try again?" appears, press [Retry]. The destination
list will then be updated.

1. Make sure that no previous settings remain.


If any previous settings remain, press the [Clear Modes] key.
2. If the E-mail, Network Delivery Scanner or Scan to Folder screen is displayed, press
[ ] to switch to the WSD scanner screen.

3. Place originals.
4. If necessary, press [Options] to configure the original orientation.
For details, see "Original Orientation".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Specify the destination.
For details, see "Specifying the Destination Client Computer".
7. Press the [Start] key.
When scanning batches, place subsequent originals after each scan file, or batch of scan files been
sent.

• If you are using this machine as a WSD scanner, you can specify only one destination per scan job.
• To cancel a specified destination, press the destination again, or press the [Clear/Stop] key.
• To cancel scanning, press the [Clear/Stop] key.
• You cannot scan originals while other originals are being scanned.
• Two-sided originals are scanned for sideways opening (top-to-top orientation).
• If scanning takes too long, the client computer might time out, causing the message "Automatic
Scanning could not be completed" to appear. If this happens, the scan files are sent again. Depending
on the settings of the client computer, you might have to perform a procedure on the client computer
directly. To check the files have been sent successfully, use the machine's Scanned Files Status screen
or the client computer. For details, see "Files status".
• If scanning does not begin after you press the [Start] key, the machine might not be registered to the
computer or the profile might be incorrectly configured. For details, see "Registering the machine to
the client computer" or "Creating a New Scan Profile".

88
Using the WSD Scanner (Push Type)

• p.138 "Original Orientation"


• p.153 "Adjusting Image Density"
• p.89 "Specifying the Destination Client Computer"
• p.13 "File status"
• p.85 "Registering the machine to a client computer"
• p.96 "Creating a New Scan Profile"

3
Specifying the Destination Client Computer

This section explains how to specify a destination client computer for the scan files you are sending by
WSD.
You can specify the destination computer using either of the following methods:
• Selecting a destination computer from the destination list
• Searching for a destination computer and then selecting it

• If you are using this machine as a WSD scanner, you can specify only one destination per scan job.

Selecting a destination client computer from the destination list


Use the following procedure to select a destination client computer from the destination list.
Destinations appear in the destination list after you log on to your computer.

• If the destination computer does not appear but the machine is already registered to the destination
computer, press [Update]. This will update the destination list with the latest information.

1. Press [WSD Dest].

89
3. Sending Scan Files Using WSD

2. Press the [ ] or [ ] key to select the destination from the list, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.

3 3. Press the [OK] key.

• In the destination list, each destination client computer is displayed using up to 20 characters.
• We recommend you register easily recognizable computer names.
• If a WSD-compatible computer is connected to the network, the following five destinations appear
on the display panel automatically. For details about the saving location of files in each destination,
see the relevant computer's settings.
• Scan to "Computer Name"
• Scan for Print to "Computer Name"
• Scan for E-mail to "Computer Name"
• Scan for Fax to "Computer Name"
• Scan for OCR to "Computer Name" (Scan for OCR to "Computer Name" might not be available
depending on the destination client computer.)
• If the target destination does not appear, take one of the following steps:
• Display the destination by selecting the initial letter of its title
• Display the destination by pressing the [ ] or [ ] key
• You can also search for the destination by pressing the [Search Destination] key. For details, see
"Searching for a destination client computer".
• The destination list can display up to 250 client computer destinations.
• You cannot use the Quick Dial keys while you are using the WSD scanner function.

• p.90 "Searching for a destination client computer"

Searching for a destination client computer


Use the following procedure to search for a destination client computer and select it.

90
Using the WSD Scanner (Push Type)

1. Press the [Search Destination] key.

3
BRB003S

The illustration is an example. The actual appearance may be different.


2. Press [Srch Cond. :Name 1], and then press the [OK] key.

3. Enter a part of the destination name.

4. Press the [OK] key.


5. Select a search criterion, and then press the [OK] key.

appears on the left side of the specified setting.


You can also refine the search by setting multiple search conditions.
6. Press [Search].

91
3. Sending Scan Files Using WSD

Destinations that match the search conditions are displayed.


7. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.

3 8. Press the [OK] key.

• You can select criteria from the following list:


• [Include]: The names which contain an entered character or characters are targeted.
For example, to search for "ABC", enter "A", "B", or "C".
• [Exclude]: The names which do not contain an entered character or characters are targeted.
For example, to search for "ABC", enter "D".
• [First Word]: The names which start with the entered character or characters are targeted.
For example, to search for "ABC", enter "A".
• [Last Word]: The names which end with the entered character or characters are targeted.
For example, to search for "ABC", enter "C".
• [Exact Match]: The names which correspond to an entered character or characters are targeted.
For example, to search for "ABC", enter "ABC".

92
Using the WSD Scanner (Pull Type)

Using the WSD Scanner (Pull Type)


This section explains the WSD Scanner (Pull Type) functions.

Basic Procedure for Sending Scan Files Using WSD (Pull Type)

This section explains the basic procedure for sending scan files using WSD (Pull Type).

1. On the client computer, click the [Start] menu, point to [All Programs], and then click
[Windows Fax and Scan].
3
2. Place an original on this machine.
3. In the [Windows Fax and Scan] window, click the [File] menu, point to [New], and then
click [Scan...].
4. If a dialog box for selecting the device you want to use appears, select the name of the
device in the list, and then click [OK].
The [New Scan] dialog box appears.
5. Make settings for the type of original, type of scanning, and orientation of the original, etc.
For details, see "Scan Profile Items and Settings".
6. In the [New Scan] dialog box, click [Scan].
The original is scanned.
Send the scan data by e-mail as an attachment or save it as a file.

• If the [Administrator Tools] are not enabled in Web Image Monitor, you cannot use the WSD scanner
function. To use this function, you must set the external scan setting to [Do not Prohibit]. For details see
"Enabling WSD using Web Image Monitor".
• Only one original can be scanned per scanning request. If you select [Feeder (Scan one side)], only
one side of the original will be scanned. If you select [Feeder (Scan both sides)], both sides of the
original will be scanned.
• If you select [TIFF] for [File Type] in the scan profile, scanned pages of two-sided originals are
combined and sent as a single file.
• When scanning from the ADF, you must click [Scan] in the [New Scan] dialog box each time you
scan an original.
• You cannot scan originals while other originals are being scanned.
• Two-sided originals are scanned for sideways opening (top-to-top orientation).
• Transmission results of WSD scanning (Pull Type) jobs do not appear in File Status.

93
3. Sending Scan Files Using WSD

• If scanning takes too long, the computer might time out and the error message "Automatic Scanning
could not be completed" will appear on the computer screen. If this happens, change the scan settings
or scan the originals one side at a time.
• The Blank Page Detect function is not available when you are using the WSD scanner (Pull Type).
• To scan an original correctly, place it as shown in the following table:
Placing an original

Scanning method
Original orientation
(Exposure glass/ADF)
3
top corner touching top left corner of exposure
glass
Exposure glass

top edge leading


Auto Document Feeder (ADF)

• p.96 "Scan Profile Items and Settings"


• p.84 "Enabling WSD using Web Image Monitor"

94
Configuring the Scan Settings on a Client Computer

Configuring the Scan Settings on a Client


Computer
This section explains how to configure a scan profile. A scan profile contains scan settings specified on a
client computer.

Changing a Scan Profile

Use the following procedure to change a scan profile.


3
Whenever the machine is first registered to a computer, a profile is created automatically. Using the
following procedure, you can change this profile on the computer.

1. On the [Start] menu, click [Control Panel].


Control Panel opens.
2. Click [Hardware and Sound], and then click [Scanner and Cameras].
The [Scanner and Cameras] dialog box appears.
3. Select this machine, and then click [Scan Profiles].
The [Scan Profiles] window appears.
4. Select a profile, and then click [Edit].
The changed profile dialog box appears.
5. Configure the necessary settings.
For details, see "Scan Profile Items and Settings".
6. Click [Save Profile].
The changed scan settings are saved as a profile.

• If a profile does not appear in the [Scanner and Cameras] dialog box, the associated machine might
be turned off, or the required WSD scanner settings might not have been specified. For details about
WSD scanner settings, see "Preparation for Sending Files Using WSD".
• If a profile does not appear in the [Scan Profile] dialog box, recreate it as a new profile. For details,
see "Creating a New Scan Profile".
• You can create multiple profiles.

• p.96 "Scan Profile Items and Settings"


• p.83 "Preparation for Sending Files Using WSD"
• p.96 "Creating a New Scan Profile"

95
3. Sending Scan Files Using WSD

Creating a New Scan Profile

Use the following procedure to create a new profile.

1. On the [Start] menu, click [Control Panel].


Control Panel opens.
2. Click [Hardware and Sound], and then click [Scanner and Cameras].
The [Scanner and Cameras] dialog box appears.

3 3. Select this machine, and then click [Scan Profiles].


The [Scan Profiles] dialog box appears.
4. Click [Add].
The [Add New Profile] dialog box appears.
5. Configure the necessary settings for the profile.
For details, see "Scan Profile Items and Settings".
6. Click [Save Profile].
The scan settings are saved as a new profile.

• You can register multiple profiles. If multiple profiles are registered, the profile specified as default in
the [Scan Profiles] dialog box is applied.
• To specify a scan profile as the default profile, perform one of the following procedures:
• In the [Scan Profiles] dialog box, click the scan profile, and then click [Set as Default].
• After you create a new scan profile, in the [Add New Profile] dialog box, select the [Set this
profile as default] check box.

• p.96 "Scan Profile Items and Settings"

Scan Profile Items and Settings

The following table tells you the scan profile settings that you can configure.

Item Scan settings

Scanner: Select this machine.

Profile name: Enter the profile name.

Source: Select one of the following:

96
Configuring the Scan Settings on a Client Computer

Item Scan settings


Flatbed
Feeder (Scan one side)
Feeder (Scan both sides)

If you select [Feeder (Scan one side)] or [Feeder


Paper size: (Scan both sides)] in [Source], you must specify the
paper size.

Select one of the following: 3


Color
Color format:
Grayscale
Black and white

Select one of the following:


BMP (Bitmap Image)
File type: JPG (JPEG Image)
PNG (PNG Image)
TIF (TIFF Image)

Resolution (DPI): Specify the resolution.

The setting you specify here will not be applied for


Brightness:
scanning.

The setting you specify here will not be applied for


Contrast:
scanning.

97
3. Sending Scan Files Using WSD

98
4. Saving Scan Files on a Removable
Memory Device
Using the scanner function, you can save scan files on a removable memory device.

Before Saving Files on a Removable Memory


Device
This section explains saving scan files on a removable memory device and provides related cautions.

Overview of Saving Files on a Removable Memory Device


4
The following diagram explains saving scan files on a removable memory device.

• This machine supports FAT16 format USB memory sticks and SD cards. Other forms of removable
memory device are not compatible.
• Make sure that the format of the removable memory device is FAT16.
• Saving might fail if the USB memory stick features password protection or other security features.
• Certain types of USB memory sticks cannot be used.
• To save files on a removable memory device, you must attach the optional media slot to the machine.
• Do not connect the optional media slot to other machines.
• Connect only USB memory sticks to the optional media slot, not any other form of USB device.
• Do not turn the machine's main power switch to off while data is being written. Doing so can result in
corrupted data.
• If the machine's main power is accidentally switched off while data is being written, you must check
the data on your media for corruption when you switch the machine back on.
• USB memory sticks and SD cards must not be wider than 35mm (1.4inch).

99
4. Saving Scan Files on a Removable Memory Device

ZZZ807S

4 1. This Machine
If the optional media slot is installed, the machine can save scan files on a removable memory device.
2. Removable Memory Device
Scan files are saved on a removable memory device.
3. Client Computer
Using applications on a client computer, scan files saved on a removable memory device can be printed and
viewed.

• Files saved on a removable memory device cannot be printed or sent using the functions of this
machine. To perform operations on files saved on a removable memory device, you must use an
application on a client computer.

100
Basic Procedure for Saving Scan Files on a Removable Memory Device

Basic Procedure for Saving Scan Files on a


Removable Memory Device
Use the following procedure to save scan files on a removable memory device.

1. Insert a removable memory device in the media slot.


You can connect only one removable memory device at a time.
2. Close the media slot cover.
If you leave the cover open, static electricity conducted through an inserted SD card could cause the
machine to malfunction.
3. Make sure that no previous settings remain. 4
If a previous setting remains, press the [Clear Modes] key.
4. Place originals.
5. Press [Options], to select [Output Method], and then press the [OK] key.

6. Select [Store to Memory Device], and then press the [OK] key.

7. Press the [Escape] key.

8. Press [Options], to select [Send Options], and then press the [OK] key.
For details, see "Specifying Send Options".
9. If necessary, select the original type.
For details, see "Selecting Original Type".
10. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".

101
4. Saving Scan Files on a Removable Memory Device

11. Press the [Start] key.


When writing is complete, a confirmation message appears.
12. Press [Exit].
13. Remove the memory device from the media slot.
Do not remove the memory device while writing is in process. Doing so can corrupt the data that is
stored on it.

• You cannot specify where the data is saved. Files are saved in the root directory of the removable
memory device.
• Up to 2 GB of data can be saved. However, depending on the number of files already stored on the
4 removable memory device, new files might not be saved, even if there appears to be sufficient free
space.
• If the removable memory device is partitioned, files are saved on the first partition.
• To cancel writing, press the [Clear/Stop] key. If files are being written when writing is cancelled, any
partially written files are deleted. Only complete files are stored on the removable memory device.
• The LED lamp on the media slot flashes when an inserted SD card is being accessed and remains lit
when a USB memory stick is attached.

• p.137 "Specifying Send Options"


• p.151 "Selecting Original Type"
• p.153 "Adjusting Image Density"

102
5. Delivering Scan Files
Using the ScanRouter delivery software, you can deliver by various methods scan files produced by the
machine.

Before Delivering Files


This section describes the necessary preparations and the procedure for using the network delivery scanner.

• To use the network delivery scanner function, your network must have a delivery server on which the
ScanRouter delivery software (optional) is installed. You must also register destination and sender
information on the delivery server. For details about the ScanRouter delivery software, see the manuals
that are supplied with it.

5
Overview of Scan File Delivery

This section describes the process for delivering files using the network delivery scanner.

ZZZ808S

1. This machine
You can send scan files to the delivery server.
2. Delivery server
Install the ScanRouter delivery software on this computer to use it as the delivery server.
After receiving a scan file, the delivery server delivers the file according to the setting specified for the destination.
The delivery settings are as follows:
• Storing the file in an in-tray
• Delivering the file by e-mail
• Storing the file in a selected folder
For details about the ScanRouter delivery software, see the manuals supplied with ScanRouter delivery software.

103
5. Delivering Scan Files

3. Client Computer
How to check a file from the client computer depends on the delivery method.
For example, you can check a file by one of the following methods:
• Use DeskTopBinder to view a file delivered to the in-tray.
• Use e-mail software to receive e-mail with an attached file.
• Browse a folder for a stored file.

Preparing to Deliver Files

To deliver scanned files, you must first perform the following:


• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Configure the necessary settings in [Scanner Features]
5 • Configure the settings in ScanRouter delivery software

Checking the machine is properly connected to the network


Check that this machine is properly connected to the network.
For details about how to connect this machine to a network, see "Connecting to the Interfaces", Network
and System Settings Guide.

Configuring the network settings in [System Settings]


Configure the network settings in [System Settings] according to your environment and how you will be
using the machine.
The following procedure explains connecting this machine to an IPv4 network using Ethernet cable.
Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use the Network
Delivery Scanner", Network and System Settings Guide.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.

104
Before Delivering Files

2. Select [Interface Settings], and then press the [OK] key.

3. Select [Network], and then press the [OK] key.

4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and press the [OK]
key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key 5
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.
7. Select [LAN Type] and [Ethernet], and then press the [OK] key.
8. Select [File Transfer], and then press the [OK] key.
9. Select [Delivery Option], and then select [On].

• If an extended wireless LAN board (optional) is installed, press [LAN Type] on the [Interface Settings],
then press [Ethernet], and then configure the network settings.

Configure the necessary settings in [Scanner Features]


Using [Scanner Features], you can make or change various settings related to the scanner function, such
as compressing scan data or viewing the scanner journal. Configure the scanner settings according to your
environment and how you will be using the machine.
This section explains how to display the Scanner Features screen. For details about the settings on this
screen, see "Scanner Features".

1. Press the [User Tools/Counter] key.


2. Select [Scanner Features], and then press the [OK] key.
The Scanner Features screen appears.

105
5. Delivering Scan Files

Select [Scan Settings], [Destination List Settings], [Send Settings], [Administrator Tools], and then
configure the relevant settings.

• p.155 "Scanner Features"

Configure the settings in ScanRouter delivery software


Using SR Manager (a tool for the ScanRouter delivery software), register this machine as an I/O device.
In addition, register destinations and specify such settings as the delivery type and sender.
For details about settings, see the manuals supplied with the ScanRouter delivery software.

• To view files delivered to an in-tray, DeskTopBinder Lite must be installed on the client computer. For
details about installing DeskTopBinder Lite, see "Installing DeskTopBinder Lite from the Supplied CD-
5 ROM".
• The settings you must configure in [System Settings] vary depending on your network environment.
For details about network settings, see "Connecting the Machine", Network and System Settings
Guide.

• p.106 "Installing DeskTopBinder Lite from the Supplied CD-ROM"

Installing DeskTopBinder Lite from the Supplied CD-ROM

This section explains how to install DeskTopBinder Lite on a client computer from the supplied CD-ROM.
To view or receive files delivered to the in-trays, you must install DeskTopBinder Lite on the client computer.

1. Make sure Windows is running on the client computer, and then insert the CD-ROM into the
CD-ROM drive.
The installer starts.
2. Click [DeskTopBinder Lite].
The [DeskTopBinder Lite Setup] dialog box appears.
For the subsequent installation steps, see the Setup Guide displayed from the [DeskTopBinder Lite
Setup] dialog box.

• Before you start the installation, check the system requirements for DeskTopBinder Lite. For details,
see "DeskTopBinder Lite".
• You can install the software using the auto-run program. For details about the auto-run program, see
"Auto-Run Program".

106
Before Delivering Files

• p.169 "DeskTopBinder Lite"


• p.168 "Auto-Run Program"

Network Delivery Scanner Screen

This section describes the screen layout when using the network delivery scanner.
Main screen

BRB010S

When a destination is entered manually

ZZZ608S

1. Network Delivery Scanner icon


Indicates that the Network Delivery Scanner screen is displayed.
2. Destination field
Displays a selected destination. If multiple destinations are selected, press the [ ] or [ ] key to display the
destinations in the order they were selected. To check the selected destination, press the [Check Destination]
key.
3. E-mail /Scan to Folder /Network Delivery Scanner
Press to switch between screens.

107
5. Delivering Scan Files

4. [Manual]
To send a file by e-mail via the delivery server to a destination not registered in the delivery server’s
Destination List, press [Manual], and then enter the e-mail address of the destination using the Quick Dial
keys. For details about how to send a file by e-mail via the delivery server, see the ScanRouter delivery
software manuals.
5. [Options]
Press to make the scan settings.
6. [Add Dest]
When selecting multiple destinations after a manual entry of an e-mail address, press [Add Dest], and then
enter the e-mail address of the destination.
7. [EditDest]
When changing an e-mail address that has been entered, press [EditDest], and then enter the new e-mail
address.

108
Basic Procedure for Delivering Files

Basic Procedure for Delivering Files


This section explains the basic procedure for delivering scan files using the network delivery scanner.

• You must register destinations and senders in advance using the ScanRouter delivery software installed
on the delivery server.

1. Make sure that no previous settings remain.


If a previous setting remains, press the [Clear Modes] key.
2. If the E-mail or Scan to Folder screen is displayed, press [ ] to switch to the
Network Delivery Scanner screen.

5
3. Place originals.
4. If necessary, select the original type.
For details, see "Selecting Original Type".
5. If necessary, specify the scanning density.
For details, see "Adjusting Image Density".
6. Select the destination.

You can specify multiple destinations.


For details, see "Specifying Delivery Destinations".
7. If necessary, press [Options] to specify the resolution and the orientation of the originals.
For details, see "Specifying Send Options".

109
5. Delivering Scan Files

8. If necessary, select [Sender's Name] under [Options], and then specify the sender.
The sender you specify appears in the subject line of e-mail that is sent via the delivery server. Select
the sender from the destinations registered on the delivery server. For details, see "Specifying the
Sender".

9. If necessary, select [Attach Subject] under [Options], and then specify the subject.
The subject entered here is set for e-mail that is sent via the delivery server.
For details, see "Entering the Subject of the E-mail to Be Transmitted via the Delivery Server".
10. Press the [Start] key.

5 • When scanning from the exposure glass


If you are scanning only one original, press the [ ] key to send the scan file.
If you are scanning multiple originals, place them on the machine, and then press the [Start] key.
Repeat this step until originals are scanned, and then press the [ ] key.
• When scanning from the ADF/ARDF
Transmission starts immediately after originals are scanned.

• To send e-mail via delivery server, press [Manual] on the delivery screen, and then enter a destination
e-mail address. For details about the procedure for manually entering e-mail addresses, see "Entering
an E-mail Address Manually".
• If you have selected two or more destinations, the destinations can be made to appear one by one
by pressing the [ ] or [ ] key.
• To cancel a selected destination, display the destination in the destination field, and then press the
[Clear/Stop] key.
• You can use the Return Receipt function when sending e-mail via delivery server. An e-mail is sent to
the sender selected in step 8, notifying him/her that the recipient has read his/her e-mail. For details
about the procedure for setting the Return Receipt function, see "Setting the Return Receipt Function".
• To enable the Return Receipt function, it is necessary to make the settings to send e-mail by SMTP with
ScanRouter delivery software. For details about how to specify this setting, see the manuals supplied
with the ScanRouter delivery software. Note, however, that if the receiving party's e-mail application
does not support Message Disposition Notification (MDN), notification e-mail might not be returned.
• Register the sender’s e-mail address using the ScanRouter delivery software in advance.

110
Basic Procedure for Delivering Files

• If you press the [Check Destination] key, the initial scanner screen switches to the Check Dest. screen.
You can use the Check Dest. screen to check the details of the selected destinations. For details, see
"Check destination".
• To cancel scanning, press the [Clear/Stop] key.

• p.151 "Selecting Original Type"


• p.153 "Adjusting Image Density"
• p.112 "Specifying Delivery Destinations"
• p.137 "Specifying Send Options"
• p.118 "Specifying the Sender"
• p.125 "Entering the Subject of the E-mail to Be Transmitted via the Delivery Server"
• p.30 "Entering an E-mail Address Manually"
• p.45 "Setting the Return Receipt Function" 5
• p.13 "Check destination"

111
5. Delivering Scan Files

Specifying Delivery Destinations


This section explains how to specify delivery destinations.
You can select delivery destinations registered in the "Destination List" of the delivery server by any of the
following methods:
• Select a destination using the Quick Dial keys
• Select the destination from the delivery destination list

• You can specify multiple destinations.

Selecting a Destination Using a Quick Dial Key

5 This section explains how to select a destination using a Quick Dial key.
For details about how to register a delivery destination to a Quick Dial key, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.

1. Press a Quick Dial key of the same number as the [Short ID] of the destination registered in
the delivery server.
Repeat this step to add more destinations.

BRB005S

The illustration is an example. The actual appearance may be different.

• For details about how to set Short IDs, see the manuals supplied with the ScanRouter delivery software.

Selecting a Destination Registered in the Destination List of the Delivery Server

This section explains how to select destinations registered in the delivery server's Destination List.
There are four methods of selecting a destination that is registered in the delivery server's Destination List:

112
Specifying Delivery Destinations

• Select a destination from the list


• Enter the destination's registration number
• Search for a destination by name
• Search for a destination by comment

Selecting a destination from the list


Use the following procedure to select a destination from the list.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.

3. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
Repeat this step to add more destinations.

113
5. Delivering Scan Files

4. Press the [OK] key.

• To cancel a selected destination, press the key to select the target destination, and then press the
[ ] key.
• Depending on the security settings, some destinations may not appear in the destination list.

Using a registration number to select a destination

5 Select a destination by entering its Short ID number (registered using the ScanRouter delivery software).
For details about how to set Short IDs, see the manuals supplied with the ScanRouter delivery software.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.

3. Using the number keys, enter the three-digit registration number assigned to the destination,
and then press the [OK] key.
Example: To enter 003
Press the [3] key, and then press the [OK] key.

114
Specifying Delivery Destinations

4. Press the [OK] key.

Searching for a destination by name


Use the following procedure to search by name for a destination in the delivery server's Destination List.
5
1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Select [Search by Name], and then press the [OK] key.

3. Enter the beginning of the destination name, and then press the [OK] key twice.

115
5. Delivering Scan Files

4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.

5 Searching for a destination by comment


Use the following procedure to search by comment for a destination in the delivery server's Destination List.
The Search by Comment function searches for a destination using the comment (one of the registration
items required by the ScanRouter delivery software) as a keyword.

1. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


2. Select [Search by Comment], and then press the [OK] key.

116
Specifying Delivery Destinations

3. Enter the beginning of the comment, and then press the [OK] key twice.

4. Press the [ ] or [ ] key to select the destination, and then press the [ ] key.

The check box on the left side of the selected destination is selected.
5. Press the [OK] key.
5

117
5. Delivering Scan Files

Specifying the Sender


This section explains how to specify the e-mail sender when sending a file by e-mail via the delivery server.
You can specify the sender by any of the following methods:
• Select a sender registered to a Quick Dial key
• Select the sender by searching the delivery server's Destination List

• Senders must be registered in advance under [System Settings]. For details, see "Registering Addresses
and Users for Facsimile/Scanner Functions", Network and System Settings Guide.
• In [System Settings], you can specify the administrator's e-mail address as the default sender name.
This lets you send e-mail without entering anything for [Sender’s Name]. For detail, see "File Transfer",
Network and System Settings Guide.

5 • Depending on the security setting, the logged-on user may be specified as [Sender’s Name].
• When a protection code has been set, a screen for entering the protection code appears after selecting
the sender. Enter the protection code, and then press the [OK] key. If the protection code you entered
is correct, the sender name is displayed.

Selecting a Sender Registered to a Quick Dial Key

This section explains how to select a sender registered to a Quick Dial key.
For details about how to register e-mail senders to Quick Dial keys, see "Registering Addresses and Users
for Facsimile/Scanner Functions", Network and System Settings Guide.

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

118
Specifying the Sender

3. Press the Quick Dial key to which the sender is registered.

BRB005S

The illustration is an example. The actual appearance may be different.


4. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

Selecting a Sender by Searching the Delivery Server's Destination List

This section explains how to select a sender by searching the delivery server's Destination List.
There are four methods of selecting a sender that is registered in the delivery server's Destination List:
• Select the sender from the sender list
• Select the sender by entering the registration number
• Select the sender by name

Selecting a Sender from the List


This section explains how to select a sender from the sender list.
The sender list displays destinations that are registered on the delivery server.

119
5. Delivering Scan Files

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Press the [ ] or [ ] key to select [Display List], and then press the [OK] key.

5. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.

The check box on the left side of the selected sender is selected.
To cancel a selected sender, press the [ ] or [ ] key to select the target sender, and then press the
[ ] key.

120
Specifying the Sender

6. Press the [OK] key.

7. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

Using a Registration Number to Specify a Sender Name


5
Select the sender using the registration numbers specified by senders in the machine's address book.

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

121
5. Delivering Scan Files

3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Press the [ ] or [ ] key to select [Search by Registration No.], and then press the [OK] key.

5. Use the number keys to enter the three-digit number assigned to the sender, and then press
the [OK] key.
Example: To enter 001
Press the [1] key, and then press the [OK] key.

6. Press the [OK] key.

7. Press the [OK] key.

122
Specifying the Sender

"Programmed" appears, and then the Send Options screen reappears.

Searching for a Sender by Name


This section explains how to search by name for a sender in the machine's address book.

1. Press [Options].

2. Select [Sender's Name], and then press the [OK] key.

3. Press the [Search Destination] key.

BRB003S

The illustration is an example. The actual appearance may be different.


4. Select [Search by Name] and then press the [OK] key.

123
5. Delivering Scan Files

5. Enter the beginning of the sender name, and then press the [OK] key twice.

Senders that match the search conditions are displayed.


6. Press the [ ] or [ ] key to select the sender, and then press the [ ] key.

7. Press the [OK] key.


5

8. Press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

124
Entering the Subject of the E-mail to Be Transmitted via the Delivery Server

Entering the Subject of the E-mail to Be


Transmitted via the Delivery Server
This section explains how to enter the e-mail subject when sending a file by e-mail via the delivery server.

1. Press [Options].

2. Press the [ ] or [ ] key to select [Attach Subject], and then press the [OK] key.

3. Enter the subject, and then press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.

• If you specify a default subject line in [Default E-mail Subject] under [Scanner Features], you will not
have to enter a subject line for each e-mail you send. For details, see "Send Settings".

• p.160 "Send Settings"

125
5. Delivering Scan Files

126
6. Scanning Originals with the Network
TWAIN Scanner
The TWAIN driver allows you to scan originals on the machine from a client computer via the network.

Before Using the Network TWAIN Scanner


This section describes the preparations and procedure for using the network TWAIN scanner.
The TWAIN driver allows you to scan originals on the machine from a client computer via the network.

• To use the network TWAIN scanner, you must install the TWAIN driver, which is on the supplied CD-
ROM. For details about installing the TWAIN driver, see "Installing the TWAIN Driver from the
Supplied CD-ROM".
• To use the network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder, must
be installed on the client computer. DeskTopBinder Lite is on the supplied CD-ROM. For details about
installing DeskTopBinder Lite, see "Installing DeskTopBinder Lite from the Supplied CD-ROM". 6
• p.130 "Installing the TWAIN Driver from the Supplied CD-ROM"
• p.106 "Installing DeskTopBinder Lite from the Supplied CD-ROM"

Overview of the Network TWAIN Scanner

This section describes the network TWAIN scanner function.


In the TWAIN scanner mode, you can share this machine among multiple computers. Therefore, you don't
have to prepare a special computer for scanner or reconnect the scanner and each computer every time
you need to use it.

ZZZ805S

127
6. Scanning Originals with the Network TWAIN Scanner

1. This Machine
Scans an original after receiving a scan instruction from a client computer, and then sends the scan file over the
network to the client computer.
2. Client Computer
Specifies the scanner settings and controls the scanner using an application, such as DeskTopBinder Lite, that
supports the network TWAIN scanner. Receives the files scanned by the machine and displays them using an
application that supports the network TWAIN scanner.

• When using the machine as a network TWAIN scanner, you do not need to press the [Scanner] key
on the machine's control panel. The screen switches automatically when you scan an original from a
client computer using the TWAIN driver. To use functions other than the network TWAIN scanner,
press [Exit].

6
Preparing to Use the Network TWAIN Scanner

To use this machine as a network TWAIN scanner, you must first perform the following:
• Check the machine is properly connected to the network
• Configure the network settings in [System Settings]
• Install the TWAIN driver on a client computer
• Install a TWAIN-compliant application on the same client computer

Checking the machine is properly connected to the network


Check that this machine is properly connected to the network.
For details about how to connect this machine to a network, see "Connecting to the Interfaces", Network
and System Settings Guide.

Configuring the network settings in [System Settings]


Configure the network settings in [System Settings] according to your environment and how you will be
using the machine.
The following procedure explains connecting this machine to an IPv4 network using Ethernet cable.

128
Before Using the Network TWAIN Scanner

Note that the settings you must configure will vary depending on your operating environment. For details
about network settings and configuration procedures, see "Network Settings Required to Use Network
TWAIN Scanner", Network and System Settings Guide.

1. Press the [User Tools/Counter] key, select [System Settings], and then press the [OK] key.

The System Settings screen appears.


2. Select [Interface Settings], and then press the [OK] key.

3. Select [Network], and then press the [OK] key. 6

4. Select [Machine IPv4 Address] to specify the machine's IPv4 address, and press the [OK]
key.
To specify a static IPv4 address for this machine, select [Specify], and then press the left selection key
to select [IP Add.]. Enter the IP address by using the number keys, and then press the [OK] key.
To obtain an IPv4 address from a DHCP server automatically for this machine, select [Auto-Obtain
(DHCP)], and then press the [OK] key.
5. Select [IPv4 Gateway Address], and then press the [OK] key.
6. Select [Effective Protocol], select [IPv4], and then select [Active]. Then press the [OK] key.

• If an extended wireless LAN board (optional) is installed, press [LAN Type] on [Interface Settings],
then press [Ethernet], and then configure the network settings.

Installing the TWAIN driver on a client computer


Install the TWAIN driver on your computer.

129
6. Scanning Originals with the Network TWAIN Scanner

For details about installing the TWAIN driver, see "Installing the TWAIN Driver from the Supplied CD-
ROM".

• p.130 "Installing the TWAIN Driver from the Supplied CD-ROM"

Installing a TWAIN-compliant application on the same client computer


To use this machine as a network TWAIN scanner, a TWAIN-compliant application, such as
DeskTopBinder, must be installed on the client computer. DeskTopBinder Lite is included on the supplied
CD-ROM.
For details about installing DeskTopBinder Lite, see "Installing DeskTopBinder Lite from the Supplied CD-
ROM".

• p.106 "Installing DeskTopBinder Lite from the Supplied CD-ROM"

6 Installing the TWAIN Driver from the Supplied CD-ROM

This section explains how to install the TWAIN driver on a client computer from the supplied CD-ROM.
To use the network TWAIN scanner, you must install the TWAIN driver on a client computer.

1. Start Windows, and then insert the CD-ROM labeled into the CD-ROM drive of the client
computer.
The installer starts.
2. Click [TWAIN Driver].
3. The installer of the TWAIN driver starts. Follow the instructions.

• Before you start the installation, check the system requirements for the TWAIN driver. For details about
the system requirements, see "Software Supplied on CD-ROM".
• You can install the software using the auto-run program. For details about the auto-run program, see
"Auto-Run Program".
• If the installer does not start automatically, see "Auto-Run Program".
• When the installation is complete, a message about restarting the client computer may appear. In this
case, restart the client computer.
• After the installation is complete, a folder with the name of the machine in use is added in [Programs]
or [All Programs] on the [Start] menu. Help can be displayed from here.
• Notes on using the network TWAIN scanner are provided in "Readme.txt". Be sure to read them before
use.

130
Before Using the Network TWAIN Scanner

• p.168 "Software Supplied on CD-ROM"


• p.168 "Auto-Run Program"

131
6. Scanning Originals with the Network TWAIN Scanner

Basic Network TWAIN Scanner Procedure


This section explains the basic procedure for scanning with the network TWAIN scanner.

• To use the network TWAIN scanner, a TWAIN-compliant application, such as DeskTopBinder and
the TWAIN driver must be installed on the client computer.
• Under the Windows XP SP2/Vista or Windows Server 2003/2003 R2/2008 operating system,
when the Windows firewall or an antivirus program is enabled, "Cannot find the scanner." or "No
response from the scanner." may appear and scanning with the TWAIN scanner may fail. In this case,
check the settings of the Windows firewall or antivirus program. For details, see Windows Help.
The following procedure uses Windows XP and DeskTopBinder Lite by way of example.

1. On the [Start] menu, point to [All Programs], point to [DeskTopBinder], and then click
[DeskTopBinder].
2. On the [Tools] menu, click [Scanner Settings...].
3. Click [Select Scanner Driver...].
6 4. Select the name of the machine you want to use in the list, and then click [Select].
5. Click [OK].
6. Place originals.
7. On the [File] menu, point to [Add Document], and then click [Scan...] to display the Scanner
Control dialog box.
The Scanner Control dialog box and DeskTopBinder viewer will appear.
A dialog box that is used to control a scanner using the TWAIN driver is referred to as the Scanner
Control dialog box.
8. Make settings for the type of original, type of scanning, and orientation of the original, etc.
For details, see the TWAIN driver Help.
9. In the Scanner Control dialog box, click [Scan].
Depending on the security setting, if you press [Scan], a dialog box for entering the user name and
password may appear.
If there are more originals to be scanned, place the next original, and then click [Continue].
If there are no more originals to be scanned, click [Complete].
10. On the [File] menu of the DeskTopBinder viewer, click [Exit].
11. Enter the file name, and then click [OK].
The DeskTopBinder viewer closes and the image is stored in DeskTopBinder Lite.

132
Basic Network TWAIN Scanner Procedure

• If you have already selected a scanner, you do not need to select the scanner unless you want to
change it.
• Using DeskTopBinder, you can edit and print scan files. For more information about
DeskTopBinder, see DeskTopBinder manuals.
• The model name of the connected scanner appears in the title bar of the Scanner Control dialog box.
If there is more than one scanner of the same model on the network, make sure you have selected the
correct scanner. If you have not, click [Select Scanner Driver...], and then select the scanner again. If
the correct scanner does not appear in the list, check that the scanner is correctly connected to the
network and that its IPv4 address has been specified. If the correct scanner still does not appear: in
the Network Connection Tool that is installed with the TWAIN driver, select the [Use a specific
scanner.] check box, and then specify the IP address or host name of the scanner you want to use.
For details, see the Help for the Network Connection Tool.
• If you are scanning originals from DeskTopBinder using the network TWAIN scanner, you cannot
cancel scanning without first saving the documents. If you are no longer using the documents, save
them first, and then delete them using DeskTopBinder.
• The Blank Page Detect function is not available when you are using the TWAIN scanner.
6

133
6. Scanning Originals with the Network TWAIN Scanner

Scan Settings When Using TWAIN Scanner


This section explains how to specify original orientation and scan setting for a bundle of mixed size originals
when using the TWAIN scanner.

Setting Original Orientation on the TWAIN Scanner

This section explains how to correctly display the top/bottom orientation of scanned originals on a client
computer screen.
To correctly display the top/bottom orientation of the scanned original on a client computer, the placement
of the original and the settings made in the Scanner Control dialog box must match.

1. Open the Scanner Control dialog box.


For details about how to open the Scanner Control dialog box, see "Basic Network TWAIN Scanner
Procedure".
2. In the [Original Scan Method:] list, select the place where the original is placed.
6 3. If you placed an original on exposure glass, in the [Orig.Orientn.:] list, select [ ]
or [ ].
4. In the [Orientation:] list, select [ / ], [ / ],
[ / ], or [ / ].
5. If you placed originals on ARDF, select [1 Sided], [2 Sided(Top to Top)], or [2 Sided(Top to
Bottom)] in the [Scan Settings:] list.

• p.132 "Basic Network TWAIN Scanner Procedure"

Placing originals
The following table shows the relationship between the original orientation and the Scanner Control dialog
box settings:
Exposure Glass

Original Orientation TWAIN Scanner Control Dialog Box Key

top edge touches top left of exposure glass

134
Scan Settings When Using TWAIN Scanner

Original Orientation TWAIN Scanner Control Dialog Box Key


This orientation is the TWAIN driver's
standard setting. Place originals in this
orientation normally.

top edge touches rear of exposure glass

bottom edge touches left side of exposure


glass

bottom edge touches top of exposure glass

ADF

Original Orientation TWAIN Scanner Control Dialog Box Key

top edge of original placed first

top edge touches rear of ADF

bottom edge touches left side of ADF

bottom edge touches top of ADF

135
6. Scanning Originals with the Network TWAIN Scanner

• Originals are normally rectangular ( ) or horizontally long ( ). However, the table above uses
squares to make original orientation easier to understand. Even if the actual shape of the original is
different, the combination of original orientation and the orientation specified on the scanner driver
does not change.
• For details about the Scanner Control dialog box, see the TWAIN driver Help.
• Depending on the settings, originals of different sizes are scanned differently.

136
7. Various Scan Settings
This chapter describes various scan settings.

Specifying Send Options


This section describes procedure for specifying send options.

• For details about setting Sender's Name, Attach Subject, Return Receipt, E-mail Encryption, and E-
mail Signature, see chapter 1 "Sending Scan Files by E-mail".

• p.15 "Sending Scan Files by E-mail"


• p.36 "Specifying the E-mail Sender"
• p.46 "Entering the E-mail Subject"
• p.45 "Setting the Return Receipt Function"
• p.47 "Security Settings to E-mails"

Resolution 7
Select resolution for scanning originals.
Select [100 dpi], [200 dpi], [300 dpi], [400 dpi], or [600 dpi] as the scanning resolution.

1. Press [Options].

2. Press the [ ] or [ ] key to select [Resolution], and then press the [OK] key.

137
7. Various Scan Settings

3. Select a resolution, and then press the [OK] key.

"Programmed" appears, and then the Send Options screen reappears.


4. Press the [Escape] key.

• Image compression level can limit Maximum image size.

Original Orientation

This section explains how to correctly display the top/bottom orientation of scanned originals on a client
computer screen.

1. Press [Options].

2. Press the [ ] or [ ] key to select [Original Orientation], and then press the [OK] key.

3. Select [ ] or [ ] for the same orientation as the original, and then press the [OK]
key.

"Programmed" appears, and then the Send Options screen reappears.


4. Press the [Escape] key.

138
Specifying Send Options

Placing originals
To correctly display the top/bottom orientation of the scanned original on a client computer, the placement
of the original and the settings made on the control panel must match.
Place originals correctly by referring to the following table:
Exposure Glass
Turn the original over, and then place it face down on the exposure glass.

Original orientation and control panel key selection


Original orientation Control panel key

top edge touches top left corner of exposure glass

BPS005S

top edge touches rear of exposure glass

7
BPS006S

ARDF
Hold the original so that its text is in the natural readable orientation, and then place it face up in the
ARDF.

Original orientation and control panel key selection


Original orientation Control panel key

top edge placed first

BRB012S

top edge touches rear of ARDF

139
7. Various Scan Settings

Original orientation Control panel key

BRB011S

Original Setting

This section explains the settings for scanning one-sided or two-sided originals.
This function is not available unless ARDF is installed.

1. Press [Options].

2. Press the [ ] or [ ] key to select [Original Setting], and then press the [OK] key.

3. Select [1 Sided Original] to scan one-sided originals, and then press the [OK] key. Select [2
Sided Orig.(T to T ) ] or [2 Sided Orig.(T to B ) ] to scan two-sided originals, and then
press the [OK] key.

The following table explains the relationship between the page opening orientation and control panel
selection key.

Page opening orientation


Page opening orientation Control panel key

2 Sided Orig.(T to T )

140
Specifying Send Options

Page opening orientation Control panel key

2 Sided Orig.(T to B )

"Programmed" appears, and then the Send Options screen reappears.


4. Press the [Escape] key.

Scan Size

Select the size of the original to be scanned.


The following items and sizes can be selected:
Template size
A4 , A5 , A5 , B5 JIS , 81/2×14 , 81/2×13 , 81/2×11 , 51/2×81/2 , 51/2×81/2
[Custom Size]
Scans in a specified size.
• Horizontal width: 139 - 356 mm (5.5 - 14.0 inches) 7
• Vertical length: 139 - 216 mm (5.5 – 8.5 inches)

1. Press [Options].

2. Press the [ ] or [ ] key to select [Scan Size], and then press the [OK] key.

3. Press the scroll keys to select the scan size in the list, and then press the [OK] key.

141
7. Various Scan Settings

"Programmed" appears, and then the Send Options screen reappears.


4. Press the [Escape] key.

• If Custom Size is selected, the dimensions of the scan area (width and length) can be specified.

Specifying custom size


This section explains how to specify a custom size.
To scan a custom size original, measure its width and length, and enter these figures as the Horiz. and Vert.
settings.
The following figure shows the Horiz. and Vert. of an original.
Placing an original in the ARDF

7
ALO031S

1. Vertical
2. Horizontal
Placing an original on the exposure glass

ALO032S

1. Vertical
2. Horizontal

142
Specifying Send Options

1. Press [Options].

2. Press the [ ] or [ ] key to select [Scan Size], and then press the [OK] key.

3. Press the scroll keys to select [Custom Size], and then press the [OK] key.

4. Using the number keys, enter the horizontal width, and then press the [OK] key or [ ] key.
7

5. Using the number keys, enter the vertical length, and then press the [OK] or [ ] key.

"Programmed" appears, and then the Send Options screen reappears.


6. Press the [Escape] key.

File Type

This section explains the procedure for selecting a file type.

143
7. Various Scan Settings

• To deliver files, set the file type using the delivery server computer. For details, see the manuals supplied
with the ScanRouter delivery software.
File types can be specified when sending files by e-mail or Scan to Folder, sending stored files by e-mail
or Scan to Folder, and saving files on a removable memory device.
You can select one of the following file types:
• [Single Page:TIFF/JPEG], [Single Page:PDF]
If you select a single-page file type when scanning multiple originals, one file is created for single
page and the number of files sent is the same as the number of pages scanned.
• [Multi-page:TIFF], [Multi-page:PDF]
If you select a multi-page file type when scanning multiple originals, scanned pages are combined
and sent as a single file.
Selectable file types differ depending on the scan settings and other conditions. For details about file
types, see "Notes About and Limitations of File Types".

1. Press [Options].

7
2. Press the [ ] or [ ] key to select [File Type], and then press the [OK] key.

3. Press the [ ] or [ ] key to select the file type, and then press the [OK] key.

"Programmed" appears, and then the Send Options screen appears.


4. Press the [Escape] key.

• p.145 "Notes About and Limitations of File Types"

144
Specifying Send Options

Notes About and Limitations of File Types

Depending on the file format you select, the following limitations will apply:
[Single Page:TIFF/JPEG]
• Originals scanned in black and white are sent as TIFF files.
• According to the settings specified for [Compress. (Gray/Full Clr)] under [Scanner Features],
originals scanned in full color or gray scale are sent in one of the following file types:
[On] ... JPEG
[Off] ... TIFF
[Multi-page:TIFF]
• When full color or gray scale is specified for [Original Type] and [Compress. (Gray/Full Clr)]
is set to [On] under [Scanner Features], you cannot select [Multi-page:TIFF].

PDF Security Encryption

This section explains security settings for PDF files.


Use security settings to prevent unauthorized access to PDF files.
7
• Security settings can be made for PDF files only.

Encrypting PDF file


Set a password to protect a PDF file. Only users who have the password can open the PDF file.

• Encryption is possible only for scan files sent by e-mail or Scan to Folder and saved on a removable
device.
• You cannot open an encrypted file without a password. Make sure you do not forget a file's password.

1. Press [Options].

145
7. Various Scan Settings

2. Press the [ ] or [ ] key to select [PDF Security Encryption], and then press the [OK] key.

3. Select [Encrypt Document], and then press the [OK] key.

4. Select [On], and then press the [OK] key.

5. Enter a password, and then press the [OK] key.


7

The password entered here will be required to open the PDF file.
6. Enter the password again, and then press the [OK] key.

"Programmed" appears, and then the PDF Security Encryption screen reappears.
7. Press the [Escape] key twice.

• The Encryption Password must be different from the Master Password (which is used for changing PDF
Security Permissions).
• You can enter up to 32 alphanumeric characters for a document password.

146
Specifying Send Options

Selecting an encryption level for a PDF file


This section explains how to select an encryption level for a PDF file.

1. Press [Options].

2. Press the [ ] or [ ] key to select [PDF Security Encryption], and then press the [OK] key.

3. Select [Encryption level], and then press the [OK] key.

7
4. Select [40 bit] or [128 bit], and then press the [OK] key.

"Programmed" appears, and then the PDF Security Encryption screen reappears.
5. Press the [Escape] key twice.

• PDF file created under the [128 bit] Encryption Level cannot be viewed using Adobe Acrobat Reader
3.0 and 4.0.
• If [Permit Low Resolution Only] is specified as the print permission in [PDF Security Permissions], you
cannot select [40 bit].

147
7. Various Scan Settings

PDF Security Permissions

Set a Master Password to restrict unauthorized printing, changing, copying, or extracting of a PDF file's
content.
Only users who have the Master Password can reset or change these restrictions.

• Encryption is possible only for scan files sent by e-mail or Scan to Folder.
• You cannot reset or change a file's restriction setting without the Master Password. Make sure you do
not forget the Master Password.

1. Press [Options].

2. Press the [ ] or [ ] key to select [PDF Security Permissions], and then press the [OK] key.

3. Select [Master Password], and then press the [OK] key.

4. Select [On], and then press the [OK] key.

The password entry screen appears.

148
Specifying Send Options

5. Enter a password, and then press the [OK] key.

The password entered here will be required to change the security settings of the PDF file.
6. Enter the password again, and then press the [OK] key.

"Programmed" appears, and then the PDF Security Permissions screen reappears.
7. Select [Permissions], and then press the [OK] key.

7
8. Change the PDF security settings.
You can specify the following security settings:
• Print permission: [Prohibit], [Permit All] and [Permit Low Resolution Only].
• Changing permission: [Prohibit] or [Permit].
• Copying or extracting content permission: [Prohibit] or [Permit].
The following is a procedure to prohibit printing of scanned PDF files.
9. Select [Print], and then press the [OK] key.

10. Select [Prohibit], and then press the [OK] key.

149
7. Various Scan Settings

"Programmed" appears, and then the Permissions screen reappears.


You can apply multiple security settings to a PDF file.
11. Press the [Escape] key three times.

• The Master Password must be different from the Encryption Password.


• You can enter up to 32 alphanumeric characters for a Master Password.
• If [40 bit] is selected as the PDF encryption level, you cannot select [Permit Low Resolution Only] as
the print permission.

150
Selecting Original Type

Selecting Original Type


This section explains how to select an original type.
Select an original type using the [Color Scan] key in combination with the [Original] key.
Specify the details of the selected original type using [Original Type Setting] under [Scanner Features]. For
details about [Original Type Setting], see "Scanner Features".
The following table explains the [Color Scan] and [Original] keys combinations and their relationship with
[Original Type Setting].
Default settings are shown in bold type.

How to select an original type


[Color Scan] key [Original] key [Original Type Setting]

Type 1(Colour: Text)


On Text • Full Colour: Text / Photo
• Full Colour: Glossy Photo

Type 2(Colour: Photo)


On Photo • Full Colour: Text / Photo
• Full Colour: Glossy Photo 7
Type 3(B&W: Text)
• Text/Line Art
• Text
Off Text
• Text/Photo
• Photo
• Gray Scale

Type 4(B&W: Photo)


• Text/Line Art
• Text
Off Photo
• Text/Photo
• Photo
• Gray Scale

1. Press the [Color Scan] key to switch between on and off.


The [Color Scan] key is on when the indicator is lit, and off when the indicator is unlit.

151
7. Various Scan Settings

2. Press the [Original] key to select text or photo.

BRB002S

The indicator of the selected original type lights up.

• To scan originals in gray scale, you must first select [Scanner Features], [Original Type], and then
[Type 3(B&W: Text)] or [Type 4(B&W: Photo)], select [Gray Scale]. Then, to scan your originals in
gray scale, select the original type that you set to [Gray Scale]. For details about [Original Type], see
"Scanner Features".
• If images scanned in gray scale are not clear enough, you can rescan them by selecting [Type 1
7 (Colour: Text)] or [Type 2(Colour: Photo)].

• p.155 "Scanner Features"

152
Adjusting Image Density

Adjusting Image Density


This section explains how to specify the density.
There are five levels of scanning density.

1. Press the [Lighter] or [Darker] key to adjust the density.

BRB013S

The density indicator " " moves one place per button push.
The image density changes in five increments as follows:
7

ABU042S

153
7. Various Scan Settings

154
8. Scanner Features
This chapter describes the user tools in the Scanner Features menu.

Accessing User Tools


This section describes how to change the settings of [Scanner Features].

• Procedures for configuring system settings differ from procedures for configuring other settings. You
must return to the initial screen when you finish configuring the system settings. For details about
returning to the initial screen, see "Closing User Tools".
• Any changes you make in [Scanner Features] remain in effect even if the main power switch or
operation switch is turned off, or the [Clear Modes] key is pressed.
• Depending on the sending method, some settings cannot be applied.

• p.156 "Closing User Tools"

Changing User Tools

This section describes how to change the settings of User Tools.


8
• If Administrator Authentication Management is specified, contact your administrator.

1. Press the [User Tools/Counter] key.

BRB001S

155
8. Scanner Features

2. Select [Scanner Features], and then press the [OK] key.

3. Select the item using the [ ] or [ ] key, and then press the [OK] key.
4. Change settings by following instructions on the display, and then press the [OK] key.

• Press the [Escape] key to return to the previous display.


• To cancel changes made to the settings and return to the initial display, press the [User Tools/Counter]
key.

Closing User Tools

This section describes how to end User Tools.

1. Press the [User Tools/Counter] key.

BRB001S

156
Scan Settings

Scan Settings
This section describes the user tools in the Scan Settings menu under Scanner Features.
Default settings are shown in bold type.
Default Scan Settings
Various basic settings (resolution and scan size) can be set. You can register the scan settings in the
same way as specifying them. For details, see "Specifying Send Options".
• Resolution
• 100 dpi
• 200 dpi
• 300 dpi
• 400 dpi
• 600 dpi
• Scan Size
• Paper size for setting
A4 , A5 , A5 , B5 JIS , 81/2×14 , 81/2×13 , 81/2×11 , 51/2×81/2 ,
51/2×81/2 , [Custom Size]
Custom size paper setting will be as follows: Vertical: 139.0 to 216.0 mm
(5.5 to 8.5inch), Horizontal: 139.0 to 356.0 mm (5.5 to 14.0 inch)
Original Setting 8
This setting is available only when you have installed the optional ARDF.
Set the default for whether originals are one-sided or two-sided and if two-sided, the relationship
between those sides. When the originals are always the same, set this for the default to make operation
easier.
• 1 Sided Original
• 2 Sided Orig. (Top to Top )
• 2 Sided Orig. (Top to Bottom )
Orig. Orientation Priority
Select the default for Original Orientation. When originals are always placed in the same way, select
that orientation as the default to make operation easier.
Original Type Setting
Make these settings according to the paper type of the original.
Settings made here are assigned to the [Full Colour/B&W] and [Original Type] keys of the scanner
function.
• Type 1 (Colour: Text)

157
8. Scanner Features

• Full Colour: Text / Photo


• Full Colour: Glossy Photo
• Type 2 (Colour: Photo)
• Full Colour: Text/Photo
• Full Colour: Glossy Photo
• Type 3 (B&W: Text)
• Text/Line Art
• Text
• Text/Photo
• Photo
• Gray Scale
• Type 4 (B&W: Photo)
• Text/Line Art
• Text
• Text/Photo
• Photo
• Gray Scale
A.C.S Sensitivity

8 Specify whether to scan originals in Full Color or Black & White mode.
• Full Colour Priority
• Black & White Priority
Blank Page Detect
Use the Blank Page Detect function to prevent blank pages being scanned.
If the first page of the originals is blank, the machine beeps to warn you that you might have placed
blank originals.
• On
• Off
When the Blank Page Detect function is set to [On], the outermost 1mm of an original’s edge border
cannot be scanned.
Blank pages of custom size originals may not be detected.
This function is available only for scanning from the ADF.
The machine cannot perform blank page detection on the second or subsequent pages of an original.

• p.137 "Specifying Send Options"

158
Destination List Settings

Destination List Settings


This section describes the user tools in the Destination List Settings menu under Scanner Features.
Select the defaults for the display priority and the titles for the destination list of e-mail and delivery server.
Default settings are shown in bold type.
Dest. List Priority 1
Select a destination list to be displayed when the machine is in the initial state.
• E-mail / Folder
• Delivery Server
• WSD
Update Server Dest. List
Normally, the delivery server destination list is automatically updated. This function allows manual
updating at any time.
To update the delivery server destination list, select [Update Server Dest. List], and then press the [OK]
key.
Dest. List Priority 2
In the machine's address book, select which address book appears by default.
This function is enabled when [E-mail/Folder] is selected in [Dest. List Priority 1].
• E-mail Address
• Folder 8

159
8. Scanner Features

Send Settings
This section describes the user tools in the Send Settings menu under Scanner Features.
This section explains how to set the defaults for settings such as the compression level for the scan file and
switching to and from the network TWAIN scanner function.
Default settings are shown in bold type.
Details of items of Send Settings are as follows:
PC Scan Command Stdby Time
If the machine receives a TWAIN or WSD (Pull Type) scanning request while it is writing data to
memory or performing e-mail, Scan to Folder, network delivery, or WSD scanning jobs, it switches
to the network TWAIN or WSD (Pull Type) scanner function either immediately or after a specified
standby time elapses following the last key operation.
Use this setting to specify whether the machine switches to TWAIN or WSD (Pull Type) immediately
or waits until the standby time elapses when it receives a TWAIN or WSD (Pull Type) scanning request.
The default setting is On, 10 second(s).
If you select [Off], the machine will switch to the network TWAIN or WSD (Pull Type) scanner function
immediately.
If you select [On], use the number keys to enter a standby time (3-30 seconds). The machine will
switch to the network TWAIN or WSD (Pull Type) scanner function when the time specified here
elapses following the last key operation.
8 File Type Priority
Select whether to send the scanned originals as single-page files or a multiple page file.
For single-page files, select either TIFF/JPEG or PDF. For multi-page files, select either TIFF or PDF.
• Single Page:TIFF/JPEG
• Single Page:PDF
• Multi-page:TIFF
• Multi-Page:PDF
Compression (B&W)
Select whether or not to compress black and white scan files.
• On
• Off
Compression reduces the time required for transferring the scan file.
The actual time required for file transfer varies depending on the file size and network load.
Compress. (Gray/Full Clr)
Specify whether or not to compress multi-level (Gray Scale/Full Color) scan files.

160
Send Settings

• On
• Off
If you select [On], you can specify the compression level from one to five.
The image quality is better for lower compression, but the time required for file transfer increases
accordingly.
The actual time required for file transfer varies depending on the file size and network load.
Print&Del. Scanner Journal
Up to 100 transmission/delivery results can be checked on this machine. If the stored transmission/
delivery results reach 100, select whether to print the delivery journal.
Depending on security settings, the journal might not be printed.
• Print and Delete All
The transmission/delivery journal is printed automatically. The printed journal is deleted.
• Do not Print:Delete Oldest
Transmission/delivery results are deleted one by one as new results are stored.
• Do not Print: Disable Send
Transmission/delivery cannot be performed when the journal is full.
Print Scanner Journal
The scanner journal is printed and deleted.
Delete Scanner Journal
The scanner journal is deleted without being printed. 8
Max. E-mail Size
Select whether or not to limit the size of an e-mail to which an image is attached.
• On: 2048 KB
• Off
When [On] is selected, enter the size limit (128-45,389 KB) with the number keys.
When the SMTP limits the size, match that setting.
Divide & Send E-mail
Select whether or not an image exceeding the size specified in Max. E-mail Size should be divided
and sent using more than one e-mail. This function is enabled only when [On] is selected for [Max.
E-mail Size].
• On (per page)
• On (per max. size): 5 (Maximum Number of Divisions)
• Off

161
8. Scanner Features

When [On (per max. size)] is selected, enter the Max. number of divisions (2-355) with the number
keys.
When [Multi-page:TIFF] or [Multi-page:PDF] is selected for [File Type Priority], the image will not be
divided even if [On (per page)] is selected. When [On (per max. size)] is selected, some received
files may not be able to be restored, depending on the type of e-mail software.
When [Off] is selected, the e-mail is not sent if its size exceeds the limit, and an error message appears.
The scan file is discarded.
Set the maximum e-mail size within the capacity of the SMTP server.
Insert Addit. E-mail Info
Select the language in which e-mail information such as title, date, administrator mail address is sent.
• On (British English)
• Off
Select one of the following 22 languages:
British English, American English, German, French, Italian, Spanish, Dutch, Portuguese, Polish, Czech,
Swedish, Finnish, Hungarian, Norwegian, Danish, Japanese, Simplified Chinese, Traditional
Chinese, Russian Hangul, Catalan, and Turkish.
The e-mail text which is a template cannot be changed.
Default E-mail Subject
If an e-mail subject is not entered when sending e-mail, the default e-mail subject is applied when
scan files are sent by e-mail.
8 Select whether to use the host name or a specified text as the default e-mail subject.
The default setting is Host Name.
E-mail Encryption Priority
Select whether or not to encrypt e-mail.
• Encrypt Dest. with
• Do not Encrypt
[E-mail Encryption Priority] is available only when the S/MIME function is enabled.
E-mail Signature Priority
Select whether or not to sign e-mail.
• Use Signatures
• Do not Use Signatures
[E-mail Signature Priority] is available only when the S/MIME function is s enabled.

162
Output Settings

Output Settings
This section explains the output settings that are available in [Output Settings] under [Scanner Features].
Default settings are shown in bold type.
Output Method Priority
Specify whether to send scan files or save them on a removable memory device.
• Send
• Store to Memory Device
If [Output Method Priority] is displayed, the Removable Memory Device function is available.

163
8. Scanner Features

Administrator Tools
This section explains the user tools that are available in [Administrator Tools] under [Scanner Features].
Menu Protect
You can specify user access levels for functions whose settings can be changed by users other than
the administrator. Using Menu Protect, you can prevent unauthenticated users from changing the user
tools.
Menu Protect is a Scanner Features setting item. You can also specify user access levels for the default
setting for each function.
For details, consult your administrator.

164
9. Appendix

Relationship between Resolution and Scan Size


This section explains the relationship between resolution and scan size.
Resolution and scan size are inversely related. The higher the resolution (dpi) is set, the smaller the area
that can be scanned. Similarly, the larger the scan area, the lower the resolution that can be set.
The relationship between the scanning resolution and scan size is shown below. If the combination is
unreadable, "Exceeded max. data capacity". "Check resolution and Start." appears on the machine's
control panel display. Change the condition until scanning is enabled.

• Image compression level can limit Maximum image size.

When Using the E-mail, Folder Sending, WSD Scanner, or Network Delivery
Functions

This section explains the relationship between resolution and scan size when using the e-mail, Scan to
Folder, WSD Scanner, or network delivery functions.
If [Type 3(B&W: Text)] or [Type 4(B&W: Photo)] is selected as the original type
All combinations up to A4 and Legal (81/2×14) and 600 dpi can be scanned.
If [Gray Scale] is selected as the original type
Refer to the table below for the maximum resolution available for each scan size.
9
Scan size and maximum resolution
Scan size Maximum resolution (dpi)

A4, Legal (81/2×14), 81/2×13, Letter


400
(81/2×11)

B5, A5, B6, A6, A7, 51/2×81/2 600

If [Type 1(Colour: Text)] or [Type 2(Colour: Photo)] is selected as the original type
Refer to the table below for the maximum resolution available for each scan size.

Scan size and maximum resolution


Scan size Maximum resolution (dpi)

A4, B5, Legal (81/2×14), 81/2×13, Letter


300
(81/2×11)

165
9. Appendix

Scan size Maximum resolution (dpi)

A5, B6, 51/2×81/2 400

A6, A7, 600

• Enter B6, A6, and A7 sizes directly.


• B6 (128 mm/5.0 inches × 182 mm/7.1 inches)
• A6 (105 mm/4.1 inches × 148 mm/5.8 inches)
• A7 (74 mm/2.9 inches × 105 mm/4.1 inches)

When Using as a TWAIN Scanner

This section explains the relationship between resolution and scan size when using the machine as a TWAIN
scanner.
To specify the scan area or resolution on the machine you are using as a network TWAIN scanner directly,
see the TWAIN driver Help.

• Certain original types and resolution settings can reduce scanning quality.
If [Binary(Text)], [Binary(Photo)], or [8 Colors] is selected in [Col./Grad.:]
The scan size determines the maximum possible resolution.

9 Refer to the table below for the maximum resolution available for each scan size.

Scan size and maximum resolution


Scan size Maximum resolution (dpi)

A4, B5, A5, B6, A6, A3, 11×17, B4, Legal


(81/2×14), 81/2×13, Letter (81/2×11), 600
51/2×81/2

If [Gray Scale] is selected in [Col./Grad.:]

Scan size and maximum resolution


Scan size Maximum resolution (dpi)

Letter (81/2×14) 520

81/2×13 540

166
Relationship between Resolution and Scan Size

Scan size Maximum resolution (dpi)

A4 578

Letter (81/2×11) 587

B5, A5, B6, A6, 51/2×81/2 600

If [16770K colors] is selected in [Col./Grad.:]

Scan size and maximum resolution


Scan size Maximum resolution (dpi)

Legal (81/2×14) 300

81/2×13 312

A4 333

Letter (81/2×11) 339

B5 385

A5 472

51/2×81/2 479

B6 546

A6 600
9

167
9. Appendix

Software Supplied on CD-ROM


This section explains the applications on the supplied CD-ROM.

Auto-Run Program

This section explains the auto-run program.


When the CD-ROM is inserted into a client computer running Windows 2000/XP/Vista or Windows
Server 2003/2003 R2/2008, the installer starts up automatically (auto run) to install various software.

• For installation, log on as an Administrators group member.


• Auto-run program may not automatically work with certain operating system settings. If this happens,
start "Setup.exe" on the CD-ROM root directory.
• To disable auto-run, set CD-ROM while pressing the Shift key. Keep the Shift key pressed until the
computer finishes reading from the CD-ROM.
• If [Cancel] is pressed during installation, the installation of all the software thereafter will be stopped.
If cancelled, reinstall the remaining software after restarting the client computer.

TWAIN Driver

This section tells you the file path to the TWAIN driver and the TWAIN driver's system requirements.
You must install this driver if you want to scan originals or use the machine as a network TWAIN scanner.
9 File path
The TWAIN driver is stored in the following folder on the CD-ROM:
\DRIVERS\TWAIN
System requirements
• Computer hardware
PC/AT-compatible machines that support the operating system properly
• Operating system
Microsoft Windows 2000/XP/Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2008
• Display resolution
800 × 600 pixels, 256 colors or higher

168
Software Supplied on CD-ROM

DeskTopBinder Lite

This section tells you the file path to DeskTopBinder Lite, the DeskTopBinder Lite system requirements, and
the applications that are installed with DeskTopBinder Lite.
DeskTopBinder is installed on the client computers to integrate and manage various kinds of files such as
scan files, files created with applications, and existing scan files. This software allows you to use various
functions for stored scan files such as viewing stored files. Also, with ScanRouter delivery software, you
can view the files stored in in-trays of the delivery server or use other functions for stored files. For details
about DeskTopBinder Lite, see DeskTopBinder Lite manuals or DeskTopBinder Lite Help.
File path
DeskTopBinder Lite is stored in the following folder on the CD-ROM provided with this machine:
\UTILITY\DESKV2
System requirements
• Computer hardware
PC/AT-compatible machines that support the following operating system properly
• Operating system
Microsoft Windows 2000 Professional SP1 or later
Microsoft Windows 2000 Server SP1 or later
Microsoft Windows 2000 Advanced Server SP1 or later
Microsoft Windows XP Professional/Home Edition
Microsoft Windows Vista Ultimate/Enterprise/Business/Home Premium/Home Basic
Microsoft Windows Server 2003 Standard Edition/Enterprise Edition
Microsoft Windows Server 2003 R2 Standard Edition/Enterprise Edition 9
Microsoft Windows Server 2008 Standard/Enterprise
• Display resolution
800 × 600 pixels, 64K colors or higher
Software installed with DeskTopBinder Lite
• Auto Document Link
Auto Document Link on the client computer monitors in-trays of the delivery server periodically,
retrieves files delivered to in-trays, and notifies the user of delivery.
• Function Palette
Function Palette allows you to use DeskTopBinder functions such as Scan using TWAIN scanner
or Print without starting DeskTopBinder. To use these functions from Function Palette, you must
first configure those using DeskTopBinder Extended Features. For details about Function
Palette, see DeskTopBinder manuals.
• SmartDeviceMonitor for Client

169
9. Appendix

SmartDeviceMonitor for Client provides functions for continuous device status monitoring on the
network via TCP/IP or IPX/SPX.

170
Values of Various Set Items for Transmission/Delivery Function

Values of Various Set Items for Transmission/


Delivery Function
This section explains the values of various transmission/delivery function settings.

• Depending on the type or settings of the file or original, you may not be able to specify the destination
or enter the maximum number of characters stated below.

Transmission function

This section explains the values of transmission function settings.

Sending E-mail
The following table tells you the maximum values of the e-mail sending function settings.
Values of Set Items for Sending by E-mail

Item Maximum value Comments

Number of subject line


128 alphanumeric characters -
characters

E-mail addresses found via LDAP


Number of e-mail address server search cannot be selected
characters
128 alphanumeric characters
if they contain more than 128 9
characters.

You can specify 50 destinations


by direct entry, including LDAP
Number of addresses you can
100 addresses search. Select the remaining 50
specify at the same time
destinations from registered
addresses.

Sendable file size 31,875 MB per file -

Sendable number of pages 250 pages per file -

Folder Transmission
The following table tells you the maximum values of the Scan to Folder function settings.

171
9. Appendix

Values of Set Items for Scan to Folder

Item Maximum value Comments

Number of path name 256 alphanumeric characters


-
characters on SMB

Number of user name 128 alphanumeric characters


-
characters on SMB

Number of password 128 alphanumeric characters


-
characters on SMB

Number of server name 64 alphanumeric characters


-
characters on FTP

Number of path name 256 alphanumeric characters


-
characters on FTP

Number of user name 64 alphanumeric characters


-
characters on FTP

Number of password 64 alphanumeric characters


-
characters on FTP

Number of path name 256 alphanumeric characters


-
characters on NCP

Number of user name 128 alphanumeric characters


-
9 characters on NCP

Number of password 64 alphanumeric characters


-
characters on NCP

Number of addresses that can 50 addresses You can specify a maximum of


be specified simultaneously 32 directly entered destinations.

Sendable file size 31,875 MB per file -

Simultaneous transmission
The following table tells you the maximum values of settings for using the E-mail and Scan to Folder functions
simultaneously.

172
Values of Various Set Items for Transmission/Delivery Function

Values of Set Items for Simultaneous transmission

Item Maximum value Comments

Number of destinations you 132 addresses


can select for E-mail and Scan -
to Folder

Number of destinations you 100 addresses You can specify a maximum of


can select for sending by e- 50 directly entered destinations,
mail including LDAP search-retrieved
destinations.

Number of destinations you 32 addresses


can set for sending by Scan to -
Folder

WSD scanner transmission


The following table tells you the maximum values available for the WSD scanner function settings.
Values of Set Items for WSD Scanner Transmission

Item Maximum value Comments

Number of destinations you 1 destination


-
can specify at the same time

Sendable file size 31,875 MB per file -


9
Sendable number of pages 250 pages per file -

Network Delivery Function

The following table tells you the values of setting items for the network delivery scanner function.
Values of Set Items for Network Delivery

Item Maximum value Comments

Number of subject line 128 alphanumeric characters


characters

Number of e-mail address 128 alphanumeric characters


-
characters

173
9. Appendix

Item Maximum value Comments

Number of addresses you can 100 addresses You can specify 50 destinations
specify at the same time by direct entry, including LDAP
search. Select the remaining 50
destinations from registered
addresses.
The maximum number of
destinations you can specify
differs depending on which
ScanRouter delivery software
you are using. For details, see the
manuals supplied with the
ScanRouter delivery software.

Sendable file size 31,875 MB per file -

174
About WIA Scanning

About WIA Scanning


If your computer is running Windows Vista, you can use the WIA driver to scan originals on the machine
from the computer via the network.

• To use this machine as a WIA scanner, you must download the WIA driver from the supplier's Web
site and install it on your computer.
The network TWAIN scanner function also allows you to scan originals from your computer; however,
functions you can use differ between the TWAIN and WIA scanners.
The following table tells you the functions available or not available with the TWAIN and WIA scanners.
For details about the TWAIN scanner, see "Scanning Originals with the Network TWAIN Scanner".

• p.127 "Scanning Originals with the Network TWAIN Scanner"

Functions of the TWAIN and WIA scanners


Functions TWAIN WIA

1. Scan

Scan from the exposure glass Yes Yes

Continuous scan from the ADF Yes Yes

Specify the number of files for scanning from the ADF Yes *1 Yes *1

Preview Yes Yes*2


9
Auto detect

• When scanning from the exposure glass Yes No

Scan using an application that do not provide the user


Yes Yes
interface

2. Setting

Driver selection Yes Yes

Initial Settings

• Unit of Measure: (mm, inch, pixel) Yes No

• Compression Yes No

Deskew Yes No

175
9. Appendix

Functions TWAIN WIA

Scan wait mode Yes No

Save/Delete Mode Yes No

Specify original size

• When scanning from the exposure glass Yes Yes *2

• When scanning from the ADF Yes Yes

Orig.Orientn.: Yes Yes *2

Orientation: Yes Yes *2

Scan Settings:

• 1 Sided Yes Yes

• 2 Sided Yes Yes

• 2 Sided (Top to Top, Top to Bottom) Yes No

Resolution Yes Yes

Brightness: Yes Yes

Contrast: Yes Yes

Threshold: Yes Yes *2


9 Col./Grad.:

• Binary Yes Yes

• Gray Scale Yes Yes

• 8 Colors Yes No

• Full colour Yes Yes

Gam-Curve: Yes No

Eras.Bgrnd: Yes No

Advanced

• Filter (Filter, Dropout Col.) Yes No

• Color Matching (ICM:, Inversion) Yes No

176
About WIA Scanning

Functions TWAIN WIA

Save/Delete Scanning Area Yes No

Specify original size (Manual entry of values to specify


Yes No
the scan area)

Comb./Series Yes No

Endorser Yes No

3. Properties

General

• Diagnostics (Scan test) No Yes

Authenticate

• User code authentication Yes Yes

• General User Authentication (Basic authentication) Yes Yes

Network Connection

• Settings for using a specific scanner Yes Yes

• SNMP V3 Auth.information Yes Yes

Version information display Yes Yes

*1 You might not be able to specify settings for this function from some applications. 9
*2 The preview does not reflect changes made for settings while it is displayed. To display the preview

image with the changed settings applied, first close the preview, and then open it again.

177
9. Appendix

Specifications
The following table tells you the specifications of the scanner.

Specifications
Component Specifications

Type Full-color scanner

Scan method Flatbed scanning

Image sensor type CCD Image Sensor

Scan type Sheet, book, three-dimensional object

• Length
139 216 mm (5.5 8.5 inches)
Original sizes that can be scanned
• Width
139 356 mm (5.5 14 inches)

When using the E-mail/ Scan to Folder/ WSD


(Push Type)/ Scan to Removable device/ network
delivery scanner function (Original size: A4 ,
Resolution: 200 dpi, 1-side scanning):
Black and white: 22 page/min
(Original Type Setting: Text/Line Art, Compression

9 Scan speed
(B&W): MH, ITU-T No1 Chart)
Full color: 10 page/min
(Original Type Setting: Full Colour: Text / Photo,
Compresss. (Gray/Full Clr): Default, Original
Chart)
Scanning speed differs depending on the
following; operating environment of the machine
and computer, scan settings, and the content of
originals (denser images require more time).

Black and white: 2 tones


Tone
Full color / Gray scale: 256 tones

Basic scanning resolution 600 dpi

178
Specifications

Component Specifications

Image compression type for black and white (two-


TIFF (MH, MR, MMR)
value)

Image compression type for gray scale/full color JPEG

• Basic
10BASE-T, 100BASE-TX
Interface • Optional
1000BASE-T, IEEE 802.11a/g (Wireless
LAN)

Network protocol TCP/IP

Selectable scanning resolutions when using the E-


100 dpi, 200 dpi, 300 dpi, 400 dpi, 600 dpi
mail function (main scanning × sub scanning)

Protocol for sending e-mail SMTP

Sendable file formats when using the E-mail


TIFF, JPEG, PDF
function

Selectable scanning resolutions when using the


Scan to Folder function (main scanning × sub 100 dpi, 200 dpi, 300 dpi, 400 dpi, 600 dpi
scanning)

Protocol for Scan to Folder SMB, FTP, NCP

Sendable file formats when using the Scan to Folder 9


TIFF, JPEG, PDF
function

Protocol for sending using WSD Web Services on Devices for scanning

Selectable scanning resolutions when using the


Network delivery scanner function (main scanning 100 dpi, 200 dpi, 300 dpi, 400 dpi, 600 dpi
× sub scanning)

Selectable scanning resolution when using TWAIN


100 dpi to 600 dpi
scanner (main scanning × sub scanning)

Protocol for TWAIN scanner TCP/IP

Windows 2000/XP/Vista, Windows Server


Operating System for TWAIN scanner
2003/2003 R2/2008

179
9. Appendix

Component Specifications

Selectable scanning resolutions when using WIA


100 dpi to 600 dpi
scanner (main scanning × sub scanning)

Protocol for WIA scanner TCP/IP

Windows Vista (SP1 or later), Windows


Operating system for WIA scanner
Server2008

• Specifications are subject to change without notice.

180
Trademarks

Trademarks
Adobe®, Acrobat®, PostScript®, and Reader® are either registered trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
Pentium® is a registered trademark of Intel Corporation.
NetWare® is a registered trademark of Novell, Inc.
Microsoft®, Windows®, Windows NT®, Windows Server®, and Windows Vista® are either registered
trademarks or trademarks of Microsoft Corporation in the U.S. and/or other countries.
Mac OS is a trademark of Apple Inc., registered in the U.S. and other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
• The product name of Windows 98 is Microsoft® Windows® 98.
• The product name of Windows Me is Microsoft® Windows® Millennium Edition (Windows Me).
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Professional
• The product names of Windows Vista are as follows: 9
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Enterprise
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
• The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
• The product names of Windows Server 2008 are as follows:

181
9. Appendix

Microsoft® Windows Server® 2008 Standard


Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter
• The product names of Windows NT 4.0 are as follows:
Microsoft® Windows NT® Workstation 4.0
Microsoft® Windows NT® Server 4.0

182
INDEX
A DeskTopBinder Lite............................106, 130, 169
Dest. List Priority 1...............................................159
A.C.S Sensitivity...................................................158
Dest. List Priority 2...............................................159
Accessing User Tools..........................................155
Destination (delivery)
Address book search by comment.........................................................116
registering destination folders...........................................55
search by name...............................................................115
registering e-mail addresses.............................................18 selecting by entering the registration numbers.............114
ADF.......................................................................135 selecting from a Quick Dial key.....................................112
Adjusting Image Density.....................................153 selecting from the delivery server's address book........112
Administrator Tools.............................................164 selecting from the list.......................................................113
Advanced search..................................................32 Destination (e-mail)
ARDF....................................................................139 entering manually..............................................................30
registering a directly-entered destination in the address
Auto-run program...............................................168
book....................................................................................34
B searching an LDAP server.................................................31
searching by e-mail address.............................................28
Basic operation
searching by name............................................................27
delivering scan files.........................................................109
selecting by entering the registration numbers................26
network TWAIN scanner................................................ 132
selecting from a Quick Dial key........................................24
saving on a memory device...........................................101
selecting from the machines address book......................24
sending scan files by e-mail..............................................21
sending scan files by Scan to Folder................................58 Destination (folder)
entering the path of the NetWare server directly...........73
WSD scanner (Pull Type)..................................................93
entering the path to a shared network folder manually.......
WSD scanner (Push Type)................................................87
.............................................................................................66
Blank Page Detect...............................................158 entering the path to an FTP server manually....................71
C registering the path to the selected destination in the address
book....................................................................................78
CD-ROM..............................................................168 searching by folder path...................................................64
Certificate...............................................................49 searching by name............................................................63
Compress. (Gray/Full Clr).................................160 selecting by entering the registration numbers................62
Compression (B&W)...........................................160 selecting from a Quick Dial key........................................60
selecting from the list..........................................................61
Configuring scan settings on a client computer.......
................................................................................95 selecting from the machine's address book.....................60
specifying the path by browsing the NetWare server.........
Confirmation displays...........................................13
.............................................................................................76
Check destination..............................................................13
specifying the path by browsing the shared network folder
File status............................................................................13
.............................................................................................68
Connecting to the network..... 16, 53, 83, 104, 128 Destination (WSD scanner)
Custom Size.........................................................141 searching the destination...................................................90
selecting the destination....................................................89
D
Destination list.........................................25, 61, 113
Default E-mail Subject.........................................162
Destination List Settings.......................................159
Default Scan Settings..........................................157
Display
Delete Scanner Journal....................................... 161 confirmation displays......................................................... 13
Delivering scan files....................................103, 109 Display and using keys.........................................12
Delivery................................................................103 Display panel.........................................................12
Delivery destination.............................................112 Divide & Send E-mail..........................................161
Delivery server.....................................................103

183
E O
E-mail destination..................................................24 Options................................................................137
E-mail Encryption Priority....................................162 Orig. Orientation Priority....................................157
E-mail screen..........................................................19 Original orientation
E-mail Sender........................................................36 TWAIN scanner..............................................................134
E-mail Signature Priority.....................................162 Original Orientation...........................................138
Enabling WSD.......................................................84 Original Setting..........................................140, 157
Encrypting PDF file..............................................145 Original type.......................................................151
Encryption Original Type Setting..........................................157
e-mail..................................................................................47 Outline
Exposure glass............................................134, 139 delivering scan files.........................................................103
network TWAIN scanner................................................ 127
F saving on a memory device..............................................99
File Type...............................................................143 sending scan files by e-mail..............................................15
sending scan files by Scan to Folder................................51
File Type Priority..................................................160
WSD scanner.....................................................................81
FTP....................................................................52, 71
Output Settings....................................................163
FTP server...............................................................52
Functions................................................................10 P
I PC Scan Command Stdby Time.........................160
PDF Security Encryption......................................145
Insert Addit. E-mail Info.......................................162
PDF Security Permissions....................................148
Install
DeskTopBinder Lite.........................................................106 Placing originals..................................................139
TWAIN driver..................................................................130 Preparation
network TWAIN scanner................................................ 128
L sending scan files by e-mail..............................................16
Laws and regulations...............................................9 sending scan files by Scan to Folder................................53
WSD scanner.....................................................................83
LDAP server.....................................................15, 31
Prg. Dest...........................................................34, 78
M Print Scanner Journal..........................................161
Manual...................................................................20 Print&Del. Scanner Journal.................................161
Max. E-mail Size.................................................161 R
Memory device.............................................99, 101
Menu Protect.......................................................164 Registering of WSD scanner.................................85
Registration number................26, 39, 62, 114, 121
N Resolution.............................................................137
NCP.................................................................52, 73 Resolution and scan size....................................165
NetWare server..............................................53, 73 e-mail...............................................................................165
Network delivery function..................................173 network delivery..............................................................165
Scan to Folder.................................................................165
Network delivery scanner screen......................107
TWAIN scanner..............................................................166
Network TWAIN scanner...................................127
WSD scanner..................................................................165
Notes about file types.........................................145
Return Receipt........................................................21
Notice.......................................................................7

184
S WSD scanner (Pull Type)..................................................82
WSD scanner (Push Type)................................................82
S/MIME.................................................................47 Sending scan files by e-mail..........................15, 21
Saving on a memory device........................99, 101 Sending scan files by Scan to Folder...................58
Scan profile Sending scan files to folders.................................51
changing............................................................................. 95
Sending scan files using WSD scanner (Pull Type).
creating...............................................................................96
................................................................................93
items and settings...............................................................96
Sending scan files using WSD scanner (Push Type)
Scan Settings.......................................................157 ................................................................................87
Scan Size.............................................................141 Sending scan files with WSD................................81
Scan to e-mail........................................................15 Sending scan files with WSD (Pull Type).............93
Scan to Folder........................................................51 Sending scan files with WSD (Push Type)...........87
Scan to Folder destination....................................60 Setting the Return Receipt function.......................45
Scan to Folder screen...........................................56 Signature................................................................48
Scanner Features....................................17, 54, 105 SmartDeviceMonitor.............................................19
accessing.........................................................................155 SMB.................................................................51, 66
changing..........................................................................155
SMTP server...........................................................15
quitting.............................................................................156
Specifications......................................................178
ScanRouter delivery software....................103, 106
Specifying custom size........................................142
Screen layout
Subject...........................................................46, 125
delivering scan files.........................................................107
sending scan files by e-mail..............................................19 Symbol......................................................................8
sending scan files by Scan to Folder................................56 System Settings........................16, 53, 83, 104, 128
WSD scanner.....................................................................87 T
Search Dest.....................................................31, 90
Template size.......................................................141
Security
e-mail..................................................................................47 Trademarks..........................................................181
encryption (e-mail)............................................................47 Transmission function..........................................171
signature (e-mail)...............................................................48 TWAIN driver............................129, 130, 132, 168
Selecting an encryption level for a PDF file......147 TWAIN scanner.......................................... 127, 132
Send options........................................................137 scan settings.....................................................................134

Send Settings.......................................................160 U
Sender (delivery).................................................118
search by name...............................................................123
Update Server Dest. List......................................159
searching the delivery server's destination list..............119 User Tools
selecting by entering a registration number..................121 accessing.........................................................................155
selecting from a Quick Dial key.....................................118 changing..........................................................................155
selecting from the list.......................................................119 quitting.............................................................................156

Sender (e-mail)......................................................36 V
searching by e-mail address.............................................42
searching by name............................................................40 Values of set items...............................................171
e-mail...............................................................................171
selecting by entering a registration number....................39
network delivery..............................................................173
selecting from a Quick Dial key........................................36
Scan to Folder.................................................................171
selecting from the list..........................................................37
simultaneous transmission...............................................172
Sender Name................................37, 39, 119, 121
WSD scanner..................................................................173
Sending files

185
W
Web Image Monitor.............................................19
WIA Scanning.....................................................175
WSD scanner.........................................................81
WSD scanner destination.....................................89
WSD scanner screen.............................................87

186
MEMO

187
MEMO

188 GB GB EN USA AE AE D468


Copyright © 2008
Operating Instructions Scanner Reference

USA D468-6751
EN
Operating Instructions
Network and System Settings Guide

1 System Settings
2 Connecting the Machine
3 Using a Printer Server
4 Monitoring and Configuring the Printer
5 Registering Addresses and Users for Facsimile / Scanner Functions
6 Special Operations under Windows
7 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine...............................................................................................................................10
Notice................................................................................................................................................................12
Important......................................................................................................................................................12
How to Read This Manual...............................................................................................................................13
Symbols........................................................................................................................................................13
Names of Major Items.................................................................................................................................13
Note..............................................................................................................................................................13
About IP Address.........................................................................................................................................14
Laws and Regulations......................................................................................................................................15
Legal Prohibition..........................................................................................................................................15
Display Panel....................................................................................................................................................16
Reading the Display and Using Keys.........................................................................................................16
Accessing User Tools.......................................................................................................................................18
Changing Default Settings...........................................................................................................................18
Exiting User Tools.........................................................................................................................................19
1. System Settings
General Features..............................................................................................................................................21
Tray Paper Settings..........................................................................................................................................24
Timer Settings....................................................................................................................................................26
Interface Settings..............................................................................................................................................28
Network........................................................................................................................................................28
Parallel Interface..........................................................................................................................................32
Wireless LAN...............................................................................................................................................33
Print I/F Settings List.....................................................................................................................................34
File Transfer.......................................................................................................................................................36
Administrator Tools...........................................................................................................................................40
Programming the LDAP server.........................................................................................................................46
Programming the LDAP server....................................................................................................................46
Changing the LDAP server..........................................................................................................................53
Deleting the LDAP server.............................................................................................................................54
Programming the Realm...................................................................................................................................56
Programming the Realm..............................................................................................................................56
Changing the Realm....................................................................................................................................58

1
Deleting the Realm.......................................................................................................................................58
2. Connecting the Machine
Connecting to the Interfaces............................................................................................................................61
Connecting to the Ethernet Interface..........................................................................................................62
Connecting to the Gigabit Ethernet Interface............................................................................................63
Connecting to the USB Interface................................................................................................................65
Connecting to the IEEE 1284 Interface.....................................................................................................66
Connecting to the Wireless LAN Interface.................................................................................................66
Network Settings Required to Use the Printer/LAN-Fax...............................................................................69
Ethernet.........................................................................................................................................................69
Wireless LAN...............................................................................................................................................70
Network Settings Required to Use Internet Fax.............................................................................................72
Ethernet.........................................................................................................................................................72
Wireless LAN...............................................................................................................................................74
Network Settings Required to Use E-mail Function.......................................................................................76
Ethernet.........................................................................................................................................................76
Wireless LAN...............................................................................................................................................77
Network Settings Required to Use Scan to Folder Function.........................................................................80
Ethernet.........................................................................................................................................................80
Wireless LAN...............................................................................................................................................81
Network Settings Required to Use the Network Delivery Scanner..............................................................83
Ethernet.........................................................................................................................................................83
Wireless LAN...............................................................................................................................................84
Network Settings Required to Use WSD Scanner.........................................................................................86
Ethernet.........................................................................................................................................................86
Wireless LAN...............................................................................................................................................87
Network Settings Required to Use Network TWAIN Scanner.....................................................................89
Ethernet.........................................................................................................................................................89
Wireless LAN...............................................................................................................................................90
Using Utilities to Make Network Settings.......................................................................................................92
Interface Settings..........................................................................................................................................92
File Transfer..................................................................................................................................................98
Connecting the Machine to a Telephone Line and Telephone..................................................................101

2
Connecting the Telephone Line................................................................................................................101
Selecting the Line Type..............................................................................................................................101
Connecting the Optional Handset or an External Telephone................................................................101
3. Using a Printer Server
Preparing Printer Server................................................................................................................................105
Using NetWare..............................................................................................................................................106
Setting Up as a Print Server (NetWare 3.x)............................................................................................107
Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5).................................................................108
Using Pure IP in the NetWare 5/5.1 or 6/6.5 Environment................................................................109
Setting Up as a Remote Printer (NetWare 3.x).......................................................................................111
Setting Up as a Remote Printer (NetWare 4.x, 5/5.1, 6/6.5)............................................................113
4. Monitoring and Configuring the Printer
Using Web Image Monitor...........................................................................................................................117
Displaying Top Page.................................................................................................................................118
When User Authentication is Set..............................................................................................................120
About Menu and Mode............................................................................................................................120
Access in the Administrator Mode...........................................................................................................122
List of Setting Items.....................................................................................................................................123
Displaying Web Image Monitor Help.....................................................................................................129
Using SmartDeviceMonitor for Admin.........................................................................................................131
Installing SmartDeviceMonitor for Admin...............................................................................................132
Changing the Network Interface Board Configuration..........................................................................133
Locking the Menus on the Machine's Control Panel..............................................................................134
Changing the Paper Type.........................................................................................................................135
Managing User Information.....................................................................................................................135
Configuring Energy Save Mode..............................................................................................................141
Setting a Password....................................................................................................................................141
Checking the Machine Status...................................................................................................................142
Changing Name and Comment...............................................................................................................143
Load Fax Journal.......................................................................................................................................144
Viewing and Deleting Spool Print Jobs....................................................................................................145
Managing Address Information...............................................................................................................145
Using SmartDeviceMonitor for Client..........................................................................................................147

3
Monitoring Printers....................................................................................................................................147
Checking the Machine Status...................................................................................................................148
When Using IPP with SmartDeviceMonitor for Client............................................................................148
Printer Status Notification by E-Mail............................................................................................................150
Setting the Account for E-mail Notification.............................................................................................151
Mail Authentication...................................................................................................................................152
Auto E-mail Notification............................................................................................................................153
On-demand E-mail Notification...............................................................................................................154
Format of On-demand E-mail Messages................................................................................................154
Remote Maintenance by telnet.....................................................................................................................156
Using telnet................................................................................................................................................156
8021x........................................................................................................................................................157
access.........................................................................................................................................................158
appletalk....................................................................................................................................................159
authfree......................................................................................................................................................160
autonet........................................................................................................................................................160
bonjour.......................................................................................................................................................161
devicename...............................................................................................................................................163
dhcp............................................................................................................................................................163
dhcp6.........................................................................................................................................................164
diprint.........................................................................................................................................................165
dns..............................................................................................................................................................165
domainname..............................................................................................................................................167
etherauth....................................................................................................................................................168
etherconfig.................................................................................................................................................168
help.............................................................................................................................................................168
hostname....................................................................................................................................................169
ifconfig........................................................................................................................................................169
info..............................................................................................................................................................170
ipp...............................................................................................................................................................171
ipsec...........................................................................................................................................................171
ipv6.............................................................................................................................................................172
logout.........................................................................................................................................................172

4
lpr................................................................................................................................................................172
netware......................................................................................................................................................173
pathmtu.......................................................................................................................................................174
prnlog.........................................................................................................................................................175
rhpp............................................................................................................................................................175
route............................................................................................................................................................175
set................................................................................................................................................................177
show...........................................................................................................................................................180
slp...............................................................................................................................................................180
smb.............................................................................................................................................................180
snmp...........................................................................................................................................................181
sntp.............................................................................................................................................................184
spoolsw......................................................................................................................................................185
ssdp............................................................................................................................................................186
ssh...............................................................................................................................................................186
status...........................................................................................................................................................187
syslog..........................................................................................................................................................187
upnp...........................................................................................................................................................187
web.............................................................................................................................................................188
wiconfig......................................................................................................................................................189
wins.............................................................................................................................................................192
wsmfp.........................................................................................................................................................193
SNMP.............................................................................................................................................................195
Getting Printer Information over the Network.............................................................................................196
Current Printer Status.................................................................................................................................196
Printer configuration..................................................................................................................................202
Understanding the Displayed Information...................................................................................................204
Print Job Information..................................................................................................................................204
Print Log Information.................................................................................................................................204
Configuring the Network Interface Board...............................................................................................205
Message List...................................................................................................................................................216
System Log Information.............................................................................................................................216

5
5. Registering Addresses and Users for Facsimile/Scanner Functions
Address Book.................................................................................................................................................225
Managing Names in the Address Book..................................................................................................227
Sending fax by Quick Dial.......................................................................................................................227
Sending e-mail by Quick Dial..................................................................................................................228
Sending received fax documents or scanned files to a shared folder directly.....................................228
Preventing unauthorized user access to shared folders from the machine...........................................228
Managing users and machine usage......................................................................................................228
Registering Names.........................................................................................................................................230
Registering Names....................................................................................................................................230
Changing a Registered Name.................................................................................................................231
Deleting a Registered Name....................................................................................................................233
Authentication Information............................................................................................................................235
Registering a User Code...........................................................................................................................235
Changing a User Code.............................................................................................................................238
Deleting a User Code...............................................................................................................................241
Displaying the Counter for Each User......................................................................................................244
Printing the Counter for Each User...........................................................................................................245
Printing the Counter for All Users.............................................................................................................247
Clearing the Number of Prints..................................................................................................................248
Fax Destination..............................................................................................................................................251
Registering a Fax Destination...................................................................................................................252
Changing a Fax Destination.....................................................................................................................254
Deleting a Fax Destination........................................................................................................................261
Registering an IP-Fax Destination.............................................................................................................264
Changing a Registered IP-Fax Destination..............................................................................................266
Deleting a Registered IP-Fax Destination................................................................................................271
E-mail Destination..........................................................................................................................................274
Registering an E-mail Destination.............................................................................................................274
Changing an E-mail Destination..............................................................................................................277
Deleting an E-mail Destination.................................................................................................................279
Registering Folders........................................................................................................................................282
Registering an SMB Folder.......................................................................................................................282

6
Changing an SMB Folder.........................................................................................................................289
Deleting an SMB Folder...........................................................................................................................293
Registering an FTP Folder.........................................................................................................................295
Changing an FTP Folder...........................................................................................................................300
Deleting an FTP Folder..............................................................................................................................304
Registering an NCP Folder.......................................................................................................................306
Changing an NCP Folder.........................................................................................................................312
Deleting an NCP Folder............................................................................................................................316
Registering Names to a Group.....................................................................................................................319
Registering a Group..................................................................................................................................319
Registering Names to a Group................................................................................................................320
Adding a Group to Another Group.........................................................................................................322
Displaying Names Registered in a Group..............................................................................................324
Removing a Name from a Group............................................................................................................326
Deleting a Group within Another Group.................................................................................................328
Changing a Group Name........................................................................................................................330
Deleting a Group......................................................................................................................................332
Registering a Protection Code......................................................................................................................334
Registering a Protection Code to a Single User......................................................................................334
Registering a Protection Code to a Group User.....................................................................................337
Registering SMTP and LDAP Authentication................................................................................................341
SMTP Authentication.................................................................................................................................341
LDAP Authentication..................................................................................................................................344
Searching.......................................................................................................................................................348
Searching by Name..................................................................................................................................348
Searching from the Display List................................................................................................................349
Searching by Registration Number..........................................................................................................350
Searching by User Code..........................................................................................................................351
Searching by Fax Number.......................................................................................................................351
Searching by E-mail Address...................................................................................................................352
Searching by Destination Folder Name..................................................................................................353
6. Special Operations under Windows
Printing Files Directly from Windows............................................................................................................355

7
Setup...........................................................................................................................................................355
Using a Host Name Instead of an IPv4 Address....................................................................................355
Printing Commands...................................................................................................................................356
7. Appendix
When Using Windows Terminal Service/Citrix Presentation Server/Citrix XenApp..............................361
Operating Environment.............................................................................................................................361
Supported Printer Drivers..........................................................................................................................361
Limitations...................................................................................................................................................361
Using DHCP...................................................................................................................................................363
Using AutoNet...........................................................................................................................................363
Configuring the WINS Server......................................................................................................................364
Using Web Image Monitor......................................................................................................................364
Using telnet................................................................................................................................................364
Using the Dynamic DNS Function................................................................................................................366
Updating....................................................................................................................................................366
DNS Servers Targeted for Operation......................................................................................................367
DHCP Servers Targeted for Operation....................................................................................................367
Setting the Dynamic DNS Function..........................................................................................................367
Precautions.....................................................................................................................................................369
Connecting a Dial-Up Router to a Network............................................................................................369
NetWare Printing......................................................................................................................................370
When the IEEE 802.11 Interface Unit is Installed.......................................................................................372
Configuring IEEE 802.1X..............................................................................................................................373
Installing a Site Certificate........................................................................................................................373
Installing Device Certificate......................................................................................................................374
Setting Items of IEEE 802.1X for Ethernet................................................................................................375
Setting Items of IEEE 802.1X for Wireless LAN......................................................................................376
Specifications.................................................................................................................................................378
Copyrights......................................................................................................................................................380
expat...........................................................................................................................................................380
NetBSD......................................................................................................................................................380
Sablotron....................................................................................................................................................382
JPEG LIBRARY............................................................................................................................................383

8
SASL...........................................................................................................................................................383
MD4...........................................................................................................................................................384
MD5...........................................................................................................................................................384
Samba(Ver 3.0.4).....................................................................................................................................384
RSA BSAFE®..............................................................................................................................................385
Open SSL...................................................................................................................................................385
Open SSH..................................................................................................................................................387
Open LDAP................................................................................................................................................391
Heimdal......................................................................................................................................................392
IPSTM print language emulations.............................................................................................................392
Trademarks.....................................................................................................................................................393
INDEX...........................................................................................................................................................395

9
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Printer Guide
• Quick Reference Fax Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For "UNIX Supplement", please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product Name General name

DeskTopBinder Lite and DeskTopBinder Professional*1 DeskTopBinder

ScanRouter EX Professional*1 and ScanRouter EX Enterprise*1 the ScanRouter delivery software

*1 Optional

11
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

12
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates important safety notes.


Ignoring these notes could result in moderate or minor injury, or damage to the machine or to property. Be
sure to read these notes. They can be found in the "Safety Information" section of About This machine.

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.

[]
Indicates the names of keys that appear on the machine's display panel.

[]
Indicates the names of keys on the machine's control panel.

Names of Major Items

Major options of this machine are referred to as follows in this manual:


• Auto Document Feeder ADF

Note

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.

13
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.
This machine comes in two models which vary in copy/print speed. To ascertain which model you have,
see “Machine Types”, About This Machine.

About IP Address

In this manual, “IP address” covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.

14
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.

15
Display Panel
The display panel shows machine status, error messages, and function menus.

• A force or impact of more than 30 N (about 3 kgf) will damage the display panel.
If you press the [User Tools/Counter] key, the User Tools menu screen appears.
Using the System Settings menu screen as an example, this section explains how to use the machine's
display panel.

BKR002S

1. The settings menu appears. Press the [ ] or [ ] key to scroll to the setting you want to specify or
change, and then press the [OK] key to display the screen for specifying that setting.
2. The number of pages in the displayed settings menu appears. If you cannot see the entire menu, press
the [ ] or [ ] key to scroll the screen.

Reading the Display and Using Keys

This section explains how to read the display and use the Selection keys.
If you press the [Copy] key, the initial copy screen appears.
Using the initial copy screen menu as an example, this sections how to use the machine's control panel.

BKR003S

1. Scroll keys

16
Press to move the cursor in each direction, step by step.
When the [ ], [ ], [ ], or [ ] key appears in this manual, press the scroll key of the same direction.
2. Selection keys
Correspond to items at the bottom line on the display.
Example: The Printer display
• When the instruction “press [JobReset]” appears in this manual, press the left selection key.
• When the instruction “press [Prt.Jobs]” appears in this manual, press the center selection key.
• When the instruction “press [Menu]” appears in this manual, press the right selection key.
3. [Escape] key
Press to cancel an operation or return to the previous display.
4. [OK] key
Press to set a selected item or an entered numeric value.

17
Accessing User Tools
This section describes how to access User Tools menu.
User Tools allow you to change or set defaults.

• Operations for system settings differ from normal operations. Always quit User Tools when you have
finished.
• Any changes you make with User Tools remain in effect even if the main power switch or operation
switch is turned off, or the [Clear Modes] key is pressed.

Changing Default Settings

This section describes how to change the settings of User Tools.

• If Administrator Authentication Management is specified, contact your administrator.

1. Press the [User Tools/Counter] key.

BKR020S

2. Select [System Settings] using the [ ] or [ ], and then press the [OK] key.
3. Change settings by following instructions on the display, and then press the [OK] key.

• Press the [Escape] key to return to the previous display.


• To cancel changes made to settings and return to the initial display, press the [User Tools/Counter]
key.
• For details about specifying System Settings, see "System Settings".

• p.21 "System Settings"

18
Exiting User Tools

This section describes how to end User Tools.

1. Press the [User Tools/Counter] key.

BKR020S

19
20
1. System Settings
This chapter describes user tools in the System Settings menu. For details on how to access System Settings,
see "Accessing User Tools".

1
General Features
This section describes the User Tools in the General Features menu under System Settings.
Prog/Change/Del User Text
You can register text phrases you often use when specifying settings, such as ".com" and "Regards".
You can register up to 40 entries.
• Program/Change
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [General Features] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Change/Del User Text] using [ ] or [ ], and then press the [OK] key.
5. Select [Program/Change] to program/Change text phrases using [ ] or [ ], and then
press the [OK] key.
6. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
To change programmed text phrases, select the text phrases you want to change.
7. Enter the text phrases you want to program, and then press the [OK] key.
Enter the user text using up to 80 characters.
8. Press the [User Tools/Counter] key.
• Delete
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [General Features] using [ ] or [ ], and then press the [OK] key.
4. Select [Prog/Change/Del User Text] using [ ] or [ ], and then press the [OK] key.
5. Select [Delete] using [ ] or [ ], and then press the [OK] key.
6. Select the text phrases you want to delete using [ ] or [ ], and then press the [OK] key.
7. Press [Yes].
To cancel deleting a text phrase, press [No].
8. Press the [Escape] key.
9. Press the [User Tools/Counter] key.

21
1. System Settings

Panel Key Sound


The beeper (key tone) sounds when a key is pressed.
The default setting is [On].
1 Warm-up Beeper (copier)
You can have the beeper sound when the machine becomes ready to copy after leaving Energy Saver
mode, or when the power is turned on.
The default setting is [On].
If the Panel Tone setting is [Off], the beeper does not sound, whatever the Warm Up Notice setting.
Copy Count Display (copier)
The copy counter can be set to show the number of copies made (count up) or the number of copies
yet to be made (count down).
The default setting is [Up].
Function Priority
Specify the mode to be displayed immediately after the operation switch is turned on, or when System
Reset mode is turned on.
The default setting is [Copier].
Print Priority
Gives print priority to the mode displayed.
The default setting is [Display mode].
When [Interleave] is selected, the current print job will be interrupted after a maximum of five sheets.
Function Reset Timer
You can set the length of time the machine waits before changing modes when using the multi-access
function.
This is useful if you are making many copies and have to change settings for each copy. If you set a
longer reset period, you can prevent interruption from other functions.
The Function Reset Timer setting is ignored if [Interleave] is set for Print Priority.
The default setting is [Set Time].
When you select [Set Time], enter the time (3-30 seconds, in 1 second increments) using the number
keys.
The default setting for Set Time is 3 seconds.
Display Contrast
You can adjust the brightness of the display.
The default brightness setting is “4” (the halfway/medium setting).

22
General Features

Key Repeat
Set whether or not to repeat the functions of the [ ], [ ], [Lighter], and [Darker] keys when those keys
are pressed and held down.
The default setting is [Normal]. 1
Measurement Unit
You can switch the measurement between [mm] and [inch].
The default setting is [inch].

• p.18 "Accessing User Tools"

23
1. System Settings

Tray Paper Settings


This section describes the User Tools in the Tray Paper Settings menu under System Settings.
1
• If the specified paper size differs from the actual size of the paper loaded in the paper tray, a misfeed
might occur because the correct paper size was not detected.
Tray Paper Size: Tray 1 - 3
Select the size of the paper loaded in the paper tray.
The paper sizes you can set for tray 1 are as follows:
• 81/2×11 , 51/2×81/2 , A4 , A5 , B5 JIS , 16K
The paper sizes you can set for tray 2, 3 are as follows:
• 81/2×14 , 81/2×13 , 81/2×11 , 81/4×14 , 81/4×13 , A4
The default setting is A4 / 81/2×11 .
Printer Bypass Paper Size
Specify the size of the paper in the bypass tray when printing data from the computer.
The paper sizes you can set for bypass tray are as follows:
• 81/2×14 , 81/2×13 , 81/2×11 , 81/4×13 , 8×13 , 71/4×101/2 , 51/2×81/2 ,
51/2×81/2 , 41/8×91/2 , 37/8×71/2 , A4 , A5 , A5 , B5 JIS , C5 Env ,
C6 Env , DL Env , 16K , [Custom Size]
The default setting is A4 / 81/2×11 .
You can specify a custom size of between 90.0 - 216.0 mm (3.55 - 8.50 in) vertically, and between
139.0 - 600.0 mm (5.48 - 23.62 in) horizontally.
Paper Type: Bypass Tray
Sets the display so you can see what type of paper is loaded in the bypass tray.
The paper types you can set for the bypass tray are as follows:
• [No Display (Plain Paper)], [Recycled Paper], [Color Paper], [Letterhead], [Label Paper],
[Preprinted Paper], [Bond Paper], [Cardstock], [Prepunched Paper], [OHP (Transparency)],
[Thick Paper], [Special Paper]
The default setting is [No Display (Plain Paper)].
Paper types you can set in the bypass tray for machines with the copy function only are plain paper,
thick paper and OHP.
For details about the relations between possible paper sizes and thickness, see "Recommended Paper
Sizes and Types", About This Machine.
For details about the recommended conditions for using thick paper, see "Thick Paper", About This
Machine.

24
Tray Paper Settings

Paper Type: Tray 1 - 3


Sets the display so you can see what type of paper is loaded in the paper tray 1 - 3.
The print function uses this information to automatically select the paper tray.
The paper types you can set for the paper tray 1 - 3 are as follows: 1
• [No Display (Plain Paper)], [Recycled Paper], [Color Paper], [Letterhead], [Preprinted Paper],
[Bond Paper], [Cardstock], [Prepunched Paper], [Special Paper]
The default setting is [No Display (Plain Paper)].
The default setting for [APS] (Auto Paper Select) is “On”.
The default setting for [Duplex] is “On”.
[APS] (Auto Paper Select) can only be selected for the copier function if [No Display (Plain Paper)]
and [Recycled Paper] are selected. If [Off] is selected, Auto Paper Select is not valid.
For details about the relations between possible paper sizes and thickness, see "Recommended Paper
Sizes and Types", About This Machine.
Ppr Tray Priority: Copier (copier)
Specify the tray to supply paper for output.
The default setting is [Tray 1].
Ppr Tray Priority: Fax (facsimile)
Specify the tray to supply paper for output.
The default setting is [Tray 1].
Ppr Tray Priority: Printer (printer)
Specify the tray to supply paper for output.
The default setting is [Tray 1].

• p.18 "Accessing User Tools"

25
1. System Settings

Timer Settings
This section describes the user tools in the Timer Settings menu under System Settings.
1 Auto Off Timer
After a specified period has passed, following job completion, the machine automatically turns off,
in order to conserve energy. This function is called "Auto Off".
The machine status after the Auto Off operation is referred to as "Off mode", or "Sleep mode".
For the Auto Off Timer, specify the time to elapse before Auto Off.
The time can be set from 1 to 240 minutes, using the number keys.
The default setting is “1” min.
Auto Off may not work when error messages appear.
Energy Saver Timer
The machine automatically enters Low Power mode automatically after a job is finished, and the
selected time elapsed.
The time can be set from 1 to 240 minutes, using the number keys.
The default setting is “15” min.
Energy Saver may not work when error messages appear.
The machine automatically prints any fax or printer data received while in Energy Saver mode.
System Auto Reset Timer
The System Reset setting automatically switches the screen to that of the function set in Function Priority
when no operations are in progress, or when an interrupted job is cleared. This setting determines the
system reset interval.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec.
Copier Auto Reset Timer (copier)
Specifies the time to elapse before copier modes reset.
If [Off] is selected, the machine does not automatically switch to the user code entry screen.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec.
Facsimile Auto Reset Timer (facsimile)
Specify the time to elapse before the facsimile mode resets.
The time can be set from 30 to 999 seconds, using the number keys.
The default setting is “30” sec.

26
Timer Settings

Printer Auto Reset Timer (printer)


Specify the time to elapse before the printer function resets.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec. 1
Scanner Auto Reset Timer (scanner)
Specify the time to elapse before the scanner function resets.
If [Off] is selected, the machine will not automatically switch to the user code entry screen.
The time can be set from 10 to 999 seconds, using the number keys.
The default setting is [On], “60” sec.
Set Date
Set the date for the copier's internal clock using the number keys.
To change between year, month, and day, press [ ] and [ ] key.
Set Time
Set the time for the copier's internal clock using the number keys.
Enter the time using the 12-hour format (in 1 second increments).
To change between hours, minutes and seconds, press [ ] and [ ] key.
Auto Logout Timer
Specify whether or not to automatically log out a user when the user does not operate the machine
for a specified period of time after logging in.
The time can be set from 60 to 999 seconds, in one second increments, using the number keys.
The default setting is [On], “180” sec.

• p.18 "Accessing User Tools"

27
1. System Settings

Interface Settings
This section describes the user tools in the Interface Settings menu under System Settings.
1
Network

This section describes the user tools in the Network menu under Interface Settings.
Machine IPv4 Address
Specify the machine's IPv4 network address.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the IPv4 address and subnet mask as "xxx.xxx.xxx.xxx" ("x" indicates
a number).
When you select [Specify], make sure that IPv4 address is different from that of other machines on
the network.
To set the "IPv4 address", press [IP Add.].
To set the "subnet mask", press [Subnet M].
When the physical address (MAC address) appears, press [Mac Add.].
IPv4 Gateway Address
A gateway is a connection or interchange point between two networks.
Specify the gateway address for the router or host computer used as a gateway.
The default setting is “0.0.0.0”.
Machine IPv6 Address
Displays the machine's IPv6 network address.
• [Link-local Address]
The machine's specified link-local address appears.
• [Manual Config. Address]
The machine's manually configured address appears.
• [Stateless Address:] 1-5
The specified stateless address appears.
IPv6 Gateway Address
Displays the machine's IPv6 gateway address.
IPv6 Stateless Setting
Specify IPv6 Stateless Address Auto configuration.
The default setting is [Inactive].

28
Interface Settings

DNS Configuration
Make settings for the DNS server.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the DNS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a 1
number).
The default setting of DNS server 1-3 are "0.0.0.0".
DDNS Configuration
Specify the DDNS settings.
The default setting is [Active].
IPsec
Specify whether to activate or inactivate the machine's IPsec function.
The default setting is [Inactive].
Domain Name
Specify the domain name.
The default setting is [Auto-Obtain (DHCP)].
When you select [Specify], enter the domain name using up to 63 characters.
WINS Configuration
Specify the WINS server settings.
The default setting is [On].
If [On] is selected, enter the WINS Server IPv4 address as "xxx.xxx.xxx.xxx" ("x" indicates a number).
The default settings of WINS server 1-2 are "0.0.0.0".
If DHCP is in use, press [Scope ID] and then specify the scope ID.
Enter a scope ID using up to 31 characters.
Effective Protocol
Select the Protocol to use in the network.
The default setting for “IPv4” is [Active].
The default setting for "IPv6" is [Inactive].
The default setting for "NetWare" is [Inactive].
The default setting for "SMB" is [Active].
The default setting for "AppleTalk" is [Inactive].
"AppleTalk" appears when the optional PostScript 3 module is installed.
NCP Delivery Protocol
Select the protocol NCP delivery.

29
1. System Settings

The default setting is [TCP/IP Priority].


If you select [IPX Only] or [TCP/IP Only], you cannot switch the protocol even if you cannot connect
with it. If "NetWare" in “Effective Protocol” is set to [Inactive], you can only use TCP/IP.

1 NW Frame Type
Select the frame type when you use NetWare.
The default setting is [Auto Select].
SMB Computer Name
Specify the SMB computer name.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Do not set a computer name starting with RNP and rnp.
Use uppercase letters for alphabets.
SMB Work Group
Specify the SMB work group.
Enter the computer name using up to 15 characters.
"*+,/:;<>=?[\]|. and spaces cannot be entered.
Use uppercase letters for alphabet.
Ethernet Speed
Set the access speed for networks.
The default setting is [Auto Select].
Select a speed that matches your network environment. [Auto Select] should usually be selected.

10Mbps Half 10Mbps Full 100Mbps 100Mbps Full


Auto Select
Duplex Duplex Half Duplex Duplex

10Mbps Half
Duplex

10Mbps Full
Duplex

100Mbps
Half Duplex

100Mbps Full
Duplex

Auto Select

30
Interface Settings

IEEE802.1X Auth.(Ethernet)
Set the IEEE 802.1X authentication for Ethernet.
The default setting is [Inactive].
For details about IEEE 802.1X Authentication, see “Configuring IEEE 802.1X”. 1
Restr.IEEE802.1X Auth. Def.
You can return the IEEE 802.1X Authentication settings to their defaults.
LAN Type
When you have installed the wireless LAN interface board, select the method of connection.
The default setting is [Ethernet].
[LAN Type] is displayed when wireless LAN board is installed. If Ethernet and wireless LAN are both
connected, the selected interface has priority.
Ping Command
Check the network connection with ping command using given IPv4 address.
If you fail to connect to the network, check the following, and then retry the ping command.
• Make sure that "IPv4" in [Effective Protocol] is set to [Active].
• Check that the machine with assigned IPv4 address is connected to the network.
• There is a possibility that the same IPv4 address is used for the specified equipment.
Permit SNMPv3 Communictn.
Set the encrypted communication of SNMPv3.
The default setting is [Encryption/Cleartext].
If you select to [Encryption Only], you need to set an encryption password for the machine.
Permit SSL/TLS Comm.
Set the encrypted communication of SSL/TLS.
The default setting is [Ciphertext Priority].
If you set to [Ciphertext Only], you need to install the SSL certificate for the machine.
Host Name
Specify the host name.
Enter the host name using up to 63 characters.
Machine Name
Specify the machine name.
Enter the machine name using up to 31 characters.

• p.18 "Accessing User Tools"

31
1. System Settings

• p.373 "Configuring IEEE 802.1X"

Parallel Interface
1
This section describes the user tools in the Parallel Interface menu under Interface Settings.
[Parallel Interface] is displayed when this machine is installed with the IEEE 1284 interface board.
Parallel Timing
Set the timing for the control signal of the parallel interface.
Normally, you do not need to change this setting.
The default setting is [ACK outside].
Parallel Comm. Speed
Set the communication speed for the parallel interface. If the speed is too high, data may not be
transferred smoothly. If this happens, change the setting to [Standard].
The default setting is [High Speed].
Selection Signal Status
Set the level for the select signal of the parallel interface.
The default setting is [High].
Input Prime
Set whether to validate or invalidate the input prime signal upon reception.
Normally, you do not need to change this setting.
The default setting is [Inactive].
Bidirectional Comm.
Set the printer's response mode to a status acquisition request when using a parallel interface. If you
experience problems using another manufacturer's machine, set this to [Off].
The default setting is [On].
When set to [Off], the bidirectional communication function will be disabled, and the printer driver
will not be installed under Windows Auto Detect function.
Signal Control
Specify how error during printing or sending facsimile from the computer is to be dealt with.
Normally, you do not need to change this setting.
The default setting is [Job Acceptance Priority].

• p.18 "Accessing User Tools"

32
Interface Settings

Wireless LAN

This section describes the user tools in the Wireless LAN menu under Interface Settings.
[Wireless LAN] is displayed when this machine is installed with the wireless LAN interface board. 1
Be sure to make all settings simultaneously.
Communication Mode
Specify the communication mode of the wireless LAN.
The default setting is [Infrastructure Mode].
SSID Setting
Specify SSID to distinguish the access point in [Infrastructure Mode] or [802.11 Ad-hoc Mode].
The characters that can be used are ASCII 0x20-0x7e (32 bytes).
If blank is specified in [802.11 Ad-hoc Mode], "ASSID" appears.
Ad-hoc Channel
Specify the channel to use when [802.11 Ad-hoc Mode] has been selected. Set the channel that
matches the type of wireless LAN being used.
The following channels are available:
• IEEE 802.11b/g(2.4GHz)
[1]-[13] channels
• IEEE 802.11a(5GHz)
[36], [40], [44], and [48] channels
The default setting is [11].
The channel in use might differ depending on the country.
Security Method
Specify the encryption of the Wireless LAN.
The default setting is [Off].
If you select [WEP], always enter WEP key. If you select [WPA], specify the encryption and
authentication methods.
Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].
• WEP
If you select [WEP], enter WEP key.
When using 64 bit WEP, up to 10 characters can be used for hexadecimal and up to five
characters for ASCII. When using 128 bit WEP, up to 26 characters can be used for hexadecimal
and up to 13 characters for ASCII.
The number of characters that can be entered is limited to 10 or 26 for hexadecimal and 5 or
13 for ASCII.

33
1. System Settings

• WPA
• Encryption Method
Select either [TKIP] or [CCMP (AES)].
1 • Authentication Method
Select either [WPA-PSK], [WPA], [WPA2-PSK], or [WPA2].
If you selected [WPA-PSK] or [WPA2-PSK], enter the pre-shared key (PSK) of 8- 63
characters in ASCII code.
When [WPA] or [WPA2] are selected, authentication settings and certificate installation
settings are required. For details about setting methods, see "Configuring IEEE 802.1X".
Wireless LAN Signal
When using in infrastructure mode, you can check the machine's radio wave status using the control
panel.
Radio wave status is displayed when you press [Wireless LAN Signal].
Restore Defaults
You can return the wireless LAN settings to their defaults.

• p.18 "Accessing User Tools"


• p.373 "Configuring IEEE 802.1X"

Print I/F Settings List

This section describes how to print the configuration page.


You can check items related to the network environment.
The configuration page shows the current network settings and network information.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

34
Interface Settings

3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.

1
4. Select [Print I/F Settings List] using [ ] or [ ], and then press the [OK] key.

5. Press the [Start] key.


The configuration page is printed.
6. Press the [User Tools/Counter] key.

• p.18 "Accessing User Tools"

35
1. System Settings

File Transfer
This section describes the user tools in the File Transfer menu under System Settings.
1 Delivery Option
Enable or disable sending stored or scanned documents to the ScanRouter delivery server.
The default setting is [Off].
Specify this option when selecting whether or not to use the ScanRouter delivery software. If you do,
you will have to preregister I/O devices in the ScanRouter delivery software.
SMTP Server
Specify the SMTP server name.
If DNS is in use, enter the host name.
If DNS is not in use, enter the SMTP server IPv4 address.
The default setting for "Port No." is “25”.
Enter the server name using up to 127 characters. Spaces cannot be entered.
Enter port number between 1 and 65535 using the number keys, and then press the [ ] key.
The SMTP server shares the same port number with the Direct SMTP server.
SMTP Authentication
Specify SMTP authentication (PLAIN, LOGIN, CRAMMD5, DIGEST-MD5). When sending e-mail to
an SMTP server, you can enhance the SMTP server security level using authentication that requires
entering the user name and password.
If the SMTP server requires authentication, set [SMTP Authentication] to [On], and then specify the
user name, password and encryption.
Enter the user name and password to be set for the Administrator's e-mail address when using Internet
Fax.
The default setting is [Off].
• Enter the user name using up to 191 characters.
Spaces cannot be entered. Depending on the SMTP server type, "realm" must be specified. Add
"@" after the user name, as in "user name@realm".
• Enter the E-mail address using up to 128 characters.
• Enter the password using up to 128 characters.
Spaces cannot be entered.
• Select Encryption as follows:
"Encrypt"-[Auto]
Use if the authentication method is PLAIN, LOGIN, CRAM-MD5, or DIGEST-MD5.
"Encrypt"-[On]

36
File Transfer

Use if the authentication method is CRAMMD5 or DIGEST-MD5.


"Encrypt"-[Off]
Use if the authentication method is PLAIN, or LOGIN.
POP before SMTP 1
Specify POP authentication (POP before SMTP).
When sending e-mail to an SMTP server, you can enhance the SMTP server security level by
connecting to the POP server for authentication.
The default setting is [Off].
If you set POP before SMTP to [On], specify the waiting time after authentication, user name, e-mail
address, and password.
• Wait Time after Auth.: “300” msec.
Specify [Wait Time after Auth.] from zero to 10,000 milliseconds, in increments of one
millisecond.
• User Name
Enter the user name using up to 191 characters. Spaces cannot be entered.
• E-mail Address
Enter the E-mail Address using up to 128 characters. Spaces cannot be entered.
• Password
Enter the password using up to 128 characters. Spaces cannot be entered.
To enable POP server authentication before sending e-mail via the SMTP server, set [POP before
SMTP] to [On]. E-mail is sent to the SMTP server after the time specified for [Wait Time after Auth.]
has elapsed.
If you select [On], enter server name in POP3/IMAP4 Settings. Also, check POP3 port number in E-
mail Communication Port.
Reception Protocol
Specify the Reception Protocol for receiving Internet Fax.
The default setting is [POP3].
POP3/IMAP4 Settings
Specify the POP3/IMAP4 server name for receiving Internet faxes.
The specified POP3/IMAP4 server name is used for [POP before SMTP].
The default setting is [Auto].
• Server Name
If DNS is in use, enter the host name.
If DNS is not in use, enter the POP3/IMAP4 or server IPv4 address.
Enter POP3/IMAP4 server name using up to 127 characters. Spaces cannot be entered.

37
1. System Settings

• Select Encryption as follows:


“Encrypt”-[Auto]
Password encryption is automatically set according to the POP/IMAP server settings.
1 “Encrypt”-[On]
Encrypt password.
“Encrypt”-[Off]
Do not encrypt password.
Admin. E-mail Address
Specify the Administrator's E-mail Address.
If a failure occurs in the machine or consumables need to be replaced, e-mail messages are sent to
the Administrator's E-mail Address by E-mail Notification function.
On e-mailed scanned documents, if the sender is not specified this appears as the sender's address.
When sending e-mail under the Internet fax function, administrator's e-mail address will appear as
the sender's address under the following conditions:
• The sender has not been specified and the machine's e-mail address has not been registered.
• The specified sender is not registered in the machine's address book and the machine's e-mail
address has not been registered.
When conducting SMTP authentication for the transmitted files under the Internet fax function, the
Administrator's E-mail Address will appear in the "From:" box. If you have specified the user name
and e-mail address in [SMTP Authentication], make sure to specify this setting.
Enter up to 128 characters.
On e-mailed scanned documents, if [Auto Specify Sender Name] is [Off], specify the sender.
E-mail Communication Port
Specify the port numbers for receiving Internet faxes. The specified POP3 port number is used for [POP
before SMTP].
The default setting for POP3 is “110”.
The default setting for IMAP4 is “143”.
Enter a port number between 1 and 65535 using the number keys, and then press the [ ] key.
E-mail Recept. Interval
Specify, in minutes, the time interval for receiving Internet faxes via POP3 or IMAP4 server.
The default setting is [On], “15 minute (s)”.
If [On] is selected, the time can be set from 2 to 1440 minutes in increments of one minute.
Max. Recept. E-mail Size
Specify the maximum reception e-mail size for receiving Internet faxes.
The default setting is “2” MB.

38
File Transfer

Enter a size from 1 - 50 MB in increments of one megabyte.


E-mail Storage in Server
Specify whether or not to store received Internet fax e-mails on the POP3 or IMAP4 server.
The default setting is [Off]. 1
Default User Name/PW(Send)
Specify the user name and password required when sending scan files directly to a shared folder on
a computer running Windows, to an FTP server, or to a NetWare server.
Enter in up to 128 characters.
Auto Specify Sender Name
Set whether or not to specify the name of the sender when sending e-mail.
The default setting is [Off].
• On
If you select [On], the specified e-mail address will appear in the "From:" box. If you do not
specify the sender's address, the administrator's e-mail address will appear in the "From:" box.
If you do not specify the sender when sending a file by e-mail under the fax function, or if the
specified e-mail address is not registered in the machine's address book, the machine's e-mail
address will appear in the "From:" box. If the machine does not have an e-mail address, the
administrator's e-mail address will appear in the "From:" box.
• Off
If you select [Off], the specified e-mail address will appear in the "From:" box, but you cannot
send e-mail without specifying the sender's e-mail address. Under the fax function, you cannot
send e-mail if the specified sender's e-mail address is not registered in the machine's address
book.
Fax E-mail Account
Specify e-mail address, user name and password for receiving Internet faxes.
The default setting is [Do not Receive].
If you select [Receive], and then press [Emai.Ad.], [User], and [Password].
• E-mail Address
Enter an e-mail address using up to 128 characters.
• User Name
Enter a user name using up to 191 characters.
• Password
Enter a password using up to 128 characters.

• p.18 "Accessing User Tools"

39
1. System Settings

Administrator Tools
This section describes the user tools in the Administrator Tools menu under System Settings.
1 Administrator Tools are used by the administrator. To change these settings, contact the administrator.
We recommend specifying Administrator Authentication before making Administrator Tools settings.
Address Book Management
You can add, change or delete information registered in the Address Book.
For details, see "Address Book".
• Program/Change
You can register and change names as well as user codes.
• Name
You can register a name, key display, registration number, and title selection.
• Reg. No.
• Auth. Info
You can register a user code, and specify the functions available to each user code. You
can also register user names and passwords to be used when accessing an LDAP server.
• Auth. Protect
You can register a protection code.
• Fax Settings
You can register a fax number, international TX mode, label insertion.
• E-mail Settings
You can register e-mail address.
• Folder Info
You can register the protocol, path, port number, and server name.
• Register Group to
You can put names registered in the Address Book into a group.
• Delete
You can delete a name from the Address Book.
You can register up to 150 names.
You can register up to 100 user codes.
You can also register and manage names in the Address Book using Web Image Monitor or
SmartDeviceMonitor for Admin.

40
Administrator Tools

Prgrm./Change/Delete Group
Names registered in the Address Book can be added into a group. You can then easily manage the
names registered in each group.
• Program/Change 1
You can register and change groups.
• Group Name
You can register a name, key display, registration number, and title selection.
• Reg. No.
• Auth. Protect
You can register a protection code.
• Register Group to
You can put groups registered in the Address Book into a group.
• Delete
You can delete a group from the Address Book.
You can register up to 10 groups.
You can also register and manage groups in the Address Book using Web Image Monitor or
SmartDeviceMonitor for Admin.
Use SmartDeviceMonitor for Admin provided with the printer scanner unit.
Address Book:Print List
You can print the destination list registered in the Address Book.
• Destination List
Prints the list of names in the Address Book.
• Group Destination List
Prints the list of groups in the Address Book.
• Quick Dial Labels
Prints the quick dial label.
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book:Print List] using [ ] or [ ], and then press the [OK] key.
5. Select a desired list to print using [ ] or [ ], and then press the [OK] key.
If the selection screen of the print method is displayed, press [Duplex] or [1 Sided].
6. Press the [Start] key.
The list is printed.

41
1. System Settings

7. Press the [User Tools/Counter] key.


Display/Print Counter
Allows you to view and print the number of prints.
1 • Display
Displays the number of prints for each function (Total, Copier, Printer, Fax Prints, Send Total:Clr,
Send Total:B&W, Fax TX, Scan Send:Clr, Scan Send:B&W, Duplex).
• Print
Prints out a list of the number of prints made under each function.
Disp./Print User Counter
Allows you to view and print the numbers of prints accessed with user codes, and to set those values
to 0.
The number of prints may differ from the counter values shown in [Disp./Print User Counter].
• Display
Press [ ] or [ ] to show all the numbers of prints.
• Copier Counter
• Printer Counter
• Facsimile Print
• Fax TX Page Counter
• Scanner Send Counter:F.Clr
• Scanner Send Counter:B&W
• Print
• All Users
Prints the counter values for all the users.
• Per User
Prints the counter values for each user.
• Clear
• All Users
Sets the counter value for all the users.
• Per User
Sets the counter value for each user.
User Auth. Management
• Off
• User Code Auth.
Using User Code Authentication, you can limit the available functions and supervise their use.

42
Administrator Tools

When using User Code Authentication, register the user code.


Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes
entered using the printer driver.
For details about Basic Authentication, Windows Authentication, LDAP Authentication, and
Integration Server Authentication, consult your administrator.
1
• Restrict Functions
Copier, Printer, Printer:Auto Program, Fax, Scanner
• Printer Job Authentication
Enter, Simple (Limitation), Simple (All)
• Basic Auth.
• Windows Auth.
• LDAP Auth.
• Integration Svr. Auth.
The default setting is [Off].
Admin. Auth. Management
For details about this function, consult your administrator.
Key Counter Management
Specify the functions you want to manage with the key counter.
• Copier
• Facsimile
• Printer
• Scanner
External Charge Unit Mng.
For details about this function, consult your administrator.
Enhanced Ext.Charge Unit.
For details about this function, consult your administrator.
Extended Security
You can specify whether or not to use the extended security functions. For details about the extended
security functions, consult your administrator.
Prog/Chnge/Del LDAP Server
By registering the LDAP server, you can search the LDAP server's address book for an recipient's e-
mail address when sending files by e-mail using the scanner or fax functions.
• Name
• Server Name

43
1. System Settings

• Search Base
• Port No.
• SSL (Use Secure Connection)
1 • Authentication
• UserName
• Password
• Realm Name
• Search Conditions
• Search Options
To start an LDAP search, make sure that the items listed below are set. For other items, check your
environment and make any necessary changes.
This function supports LDAP Version 2.0 and 3.0.
To use the LDAP server, select [On] under LDAP Search.
For details about how to program the LDAP Server, see "Programming the LDAP server".
LDAP Search
Specify whether or not to use the LDAP server for searching.
The default setting is [Off].
If you select [Off], LDAP server list will not appear on the searching display.
Prog./Change/Delete Realm
Program the realm to be used for Kerberos authentication.
• Realm Name
• KDC Server Name
• Domain Name
Be sure to set both the realm name and KDC server name when programming a realm.
For details about [Prog./Change/Delete Realm], see "Programming the Realm".
AOF (Always On)
Specify whether or not to use Auto Off.
The default setting is [On].
Firmware Version
You can check the version of the software installed in this machine.
Network Security Level
For details about this function, consult your administrator.

44
Administrator Tools

Auto Erase Memory Setting


For details about this function, consult your administrator.
Erase All Memory
For details about this function, consult your administrator. 1
Delete All Logs
For details about this function, consult your administrator.
Transfer Log Setting
For details about this function, consult your administrator.
Fixed USB Port
Specify whether or not to fix the USB port.
The default setting is [Off].
If a computer with the printer driver installed is connected to another device of the same model through
the USB interface, selecting [Level 1] for this option eliminates the additional installation of the driver
to the computer. If you want to select [Level 2], contact your sales or service representative.

• p.18 "Accessing User Tools"


• p.46 "Programming the LDAP server"
• p.56 "Programming the Realm"
• p.225 "Address Book"

45
1. System Settings

Programming the LDAP server


This section describes how to specify the LDAP server settings.
1 This function supports LDAP version 2.0 and 3.0.
To start an LDAP search, make sure that the items listed below are set. For other items, check your
environment and make any necessary changes.
• Server Name
• Search Base
• Port No.
• Authentication
• Search Conditions
If [Kerberos Authentication] is selected, be sure to set the "User Name", "Password", and the "Realm Name".
If [Digest Authentication] or [Cleartext Authentication] is selected, be sure to set the "User Name" and
"Password".
To use the LDAP server in Administrator Tools, select [On] under "LDAP Search".
The LDAP version 2.0 does not support Digest Authentication.
To select Kerberos Authentication, a realm must be registered in advance.

Programming the LDAP server

This section describes how to program the LDAP server.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

46
Programming the LDAP server

4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.

1
5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Select the LDAP server you want to program or change using [ ] or [ ], and then press the
[OK] key.
When programming the server, select [*Not Programmed].

7. Select [Name] using [ ] or [ ], and then press the [OK] key.

8. Enter the name, and then press the [OK] key.

9. Select [Server Name] using [ ] or [ ], and then press the [OK] key.

47
1. System Settings

10. Enter the server name, and then press the [OK] key.

1
11. Select [Search Base] using [ ] or [ ], and then press the [OK] key.
Select the root folder to start the search from e-mail addresses registered in the selected folder which
is the search targets.

12. Enter the search base, and then press the [OK] key.
For example, if the search target is the sales department of ABC company, enter "dc=sales department,
o=ABC". (In this example, the description is for an active directory. "dc" is for the organization unit,
and "o" is for the company.)
Search base registration may be required depending on your server environment. When registration
is required, unspecified searches will result in error.
Check your server environment and enter any required specifications.

13. Select [Port No.] using [ ] or [ ], and then press the [OK] key.
Specify the port number for communicating with the LDAP server. Specify a port that is compliant with
your environment.

48
Programming the LDAP server

14. Enter the port number using the number keys, and then press the [OK] key.

1
15. Select [SSL] using [ ] or [ ], and then press the [OK] key.

16. Select [On] using [ ] or [ ], and then press the [OK] key.
Use SSL to communicate with the LDAP server.
To use SSL, the LDAP server must support SSL.

When SSL is set to [On], the port number automatically changes to "636".
If you do not use SSL, security problems may occur. SSL setting must be enabled on this machine. For
details, consult your network administrator.
17. Select [Authentication] using [ ] or [ ], and then press the [OK] key.

18. Select [Kerberos Authentication], [Digest Authentication], [Cleartext Authentication], or


[Off] using [ ] or [ ], and then press the [OK] key.
To make a search request to the LDAP server, use the administrator account for authentication.
Authentication settings must comply with your server's authentication settings. Check your server
settings before setting this machine.
[Digest Authentication] is available only with LDAP Version3.0.

49
1. System Settings

1
If you select [Kerberos Authentication], a password is sent using an encryption process that prevents
passwords from being revealed during transmission to the KDC server where authentication occurs.
If you select [Digest Authentication], a password is sent using an encryption process that prevents
passwords from being revealed during transmission to the LDAP server.
If you select [Cleartext Authentication], a password is sent to the LDAP server as is, without any
encryption processing.
If you select [Kerberos Authentication], proceed to step 19 to 21, and then proceed to step 22.
If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 19 to 20, and then
proceed to step 22.
If you select [Off], proceed to step 22.
19. Enter the User Name, and then press the [OK] key.

When [Kerberos Authentication], [Digest Authentication], or [Cleartext Authentication] is selected for


the authentication setting, use the administrator account name and password. Do not enter the
administrator account name and password when using authentication for each individual or each
search.
Procedures for the user name setting differ depending on server environment. Check your server
environment before making the setting.
Example: Domain Name\User Name, User Name@Domain Name, CN=Name, OU=Department
Name, DC=Server Name
20. Enter the Password, and then press the [OK] key.

The user name and password are required for administrator authentication to access the LDAP server.
You can connect to the LDAP server using a user name and password stored in the Address Book. For
details, see "Registering SMTP and LDAP Authentication".

50
Programming the LDAP server

If you select [Digest Authentication] or [Cleartext Authentication], proceed to step 22.


21. Select the Realm using [ ] or [ ], and then press the [OK] key.

22. Press [Com.Test].

Access the LDAP server to check that the proper connection is established. Check authentication works
according to the authentication settings.
23. Press [Exit].
24. Select [Search Conditions] using [ ] or [ ], and then press the [OK] key.

If the connection test fails, check your settings and try again.
This function does not check search conditions or the search base.
25. Select necessary search items such as [Name], [E-mail Address], [Fax Number], [Company
Name], and [Department Name] using [ ] or [ ], and then press the [OK] key.

You can enter an attribute as a typical search keyword. Using the entered attribute, the function
searches the LDAP server's Address Book.
26. Enter attribute, and then press the [OK] key.
The attribute value may change depending on the server environment. Check the attribute value
complies with your server environment before setting it.
You can leave items blank, but you cannot leave attributes blank when searching for e-mail address
from the LDAP server Address Book.

51
1. System Settings

1
27. Press [Exit].
28. Select [Search Options] using [ ] or [ ], and then press the [OK] key.

29. Enter attribute, and then press the [OK] key.


To search the LDAP server date using a keyword other than prepared keywords such as Name, E-
mail Address, FAX Number, Company Name, and Department Name, specify the attribute for the
keyword registered in your LDAP server, and the name to be displayed on the control panel during
the search. For example, to search e-mail address by “Employee No” in the key display field.
The attribute value may change depending on the server environment. Check the attribute complies
with your server environment before setting it.

30. Enter the Key Display, and then press the [OK] key.
The registered "Key Display" appears as a keyword for searching LDAP.

31. Press [Exit].

32. Press the [User Tools/Counter] key.

52
Programming the LDAP server

• p.341 "Registering SMTP and LDAP Authentication"

Changing the LDAP server 1


This section describes how to change the programmed LDAP server.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Select the LDAP server you want to program or change using [ ] or [ ], and then press the
[OK] key.

53
1. System Settings

7. Change the settings as necessary.


8. Press the [OK] key after changing each item.
9. Press [Exit].
1 10. Press the [User Tools/Counter] key.

Deleting the LDAP server

This section describes how to delete the programmed LDAP server.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prog/Chnge/Del LDAP Server] using [ ] or [ ], and then press the [OK] key.

5. Select [Delete] using [ ] or [ ], and then press the [OK] key.

54
Programming the LDAP server

6. Select the LDAP server you want to delete using [ ] or [ ], and then press the [OK] key.

1
7. Press [Yes].

8. Press the [User Tools/Counter] key.

55
1. System Settings

Programming the Realm


This section describes how to specify the Realm settings.
1 Program the realm to be used for Kerberos authentication.
A realm is the network area in which Kerberos authentication is used. After confirming the network
environment, specify the necessary items.
You can register up to 5 realms.

Programming the Realm

This section describes how to program the Realm.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

56
Programming the Realm

6. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.

1
7. Select [Realm Name], [KDC Server Name], or [Domain Name] using [ ] or [ ], and then
press the [OK] key.

If you select [Realm Name], proceed to step 8.


If you select [KDC Server Name], proceed to step 9.
If you select [Domain Name], proceed to step 10.
8. Enter the Realm Name, and then press the [OK] key.
Enter the realm name, or host name.
You can enter a realm name using up to 64 characters.
If you enter the realm name, proceed to step 11.
9. Enter the KDC Server Name, and then press the [OK] key.
Enter the KDC server name, host name, or IPv4 address.
You can enter a KDC server name using up to 64 characters.
If you enter the KDC server name, proceed to step 11.
10. Enter the Domain Name, and then press the [OK] key.
Enter the domain name, or host name.
You can enter a domain name using up to 64 characters.
11. Press [End].

12. Press the [User Tools/Counter] key.

57
1. System Settings

Changing the Realm

This section describes how to change the programmed Realm.

1 1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Select the Realm you want to change using [ ] or [ ], and then press the [OK] key.
7. Set each item as necessary.
8. Press the [OK] key after setting each item.
9. Press the [User Tools/Counter] key.

Deleting the Realm

This section describes how to delete the programmed Realm.

1. Press the [User Tools/Counter] key.

58
Programming the Realm

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

1
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prog./Change/Delete Realm] using [ ] or [ ], and then press the [OK] key.

5. Select [Delete] using [ ] or [ ], and then press the [OK] key.

6. Select the realm you want to delete using [ ] or [ ], and then press the [OK] key.

7. Press [Yes].

8. Press the [User Tools/Counter] key.

59
1. System Settings

60
2. Connecting the Machine
This chapter describes how to connect the machine to the network and specify the network settings.

Connecting to the Interfaces


This section explains how to identify the machine's interface and connect the machine according to the 2
network environment.

• A network interface cable with a ferrite core must be used for RF interference suppression.

BKR005S

1. USB Host Interface


Port for connecting the USB cable. It is used to connect device such as a digital camera to this machine.
2. IEEE 1284 port (optional)
Port for connecting the IEEE 1284 interface cable.
3. USB 2.0 port
Port for connecting the USB2.0 interface cable.
4. 10BASE-T/100BASE-TX port
Port for connecting the 100BASE-TX or 10BASE-T cable.
5. Wireless LAN port (optional)
Port for using the wireless LAN.
6. Gigabit Ethernet port (optional)
Port for using the 1000BASE-T, 100BASE-TX, or 10BASE-T cable.

61
2. Connecting the Machine

Connecting to the Ethernet Interface

This section describes how to connect Ethernet interface cable to the Ethernet interface.

• If the main power switch is on, turn it off.

2 • Use the following Ethernet cables.


• Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type
5 or more

1. A ferrite core for the Ethernet interface cable is supplied with this machine. Attach the ferrite
core at the machine end of the Ethernet cable

BKR010S

2. Make sure the main power switch of the machine is off.


3. Connect the Ethernet interface cable to the 10BASE-T/100BASE-TX port.

BKR006S

4. Connect the other end of the Ethernet interface cable to a network connection device such
as a hub.

62
Connecting to the Interfaces

5. Turn on the main power switch of the machine.

BKR022S
2
1. Indicator (green)
Lights up green when the machine is connected correctly to the network.
2. Indicator (yellow)
Lights up yellow when 100BASE-TX is in operation. Goes off when 10BASE-T is in operation.

• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.

Connecting to the Gigabit Ethernet Interface

This section describes how to connect the Ethernet interface cable to the Gigabit Ethernet port.

• If the main power switch is on, turn it off.


• Use the following Ethernet cables.
• When using 100BASE-TX/10BASE-T:
Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type
5 or more
• When using 1000BASE-T:
Unshielded Twisted Pair Cable (UTP) or Shielded Twisted Pair Cable (STP) and Category type
5e or more

63
2. Connecting the Machine

1. Attach one ferrite core at the machine end of the Ethernet cable, and then attach the other
ferrite core about 10 cm (4 inch) (1) from this core.

BKR011S

2. Make sure the main power switch of the machine is off.


3. Connect the Ethernet interface cable to the Gigabit Ethernet port.

BKR008S

4. Connect the other end of the Ethernet interface cable to a network connection device such
as a hub.
5. Turn on the main power switch of the machine.

BKR021S

1. Indicator (yellow)
When 100BASE-TX is operating, the LED is lit yellow. When 10BASE-T is operating, it is turned off.

64
Connecting to the Interfaces

2. Indicator (green)
When 10BASE-T is operating, the LED is lit green. When 100BASE-TX is operating it is turned off.
3. Indicators (both green and yellow)
When 1000BASE-T is operating, both LED are lit.

• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
2
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.

Connecting to the USB Interface

This section describes how to connect the USB2.0 interface cable to the USB2.0 port.

• Properly shielded and grounded cables and connectors must be used for connections to a host
computer (and/or peripheral) in order to meet emission limits.

1. Connect the USB2.0 interface cable to the USB2.0 port.

BKR007S

2. Connect the other end to the USB2.0 port on the host computer.

• This machine does not come with a USB interface cable. Make sure you purchase the appropriate
cable for the machine and your computer.
• The USB2.0 interface board is supported by Windows 2000/XP/Vista, Windows Server
2003/2003 R2/2008, Mac OS 9.2.2, Mac OS X 10.3.3 or higher.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.

65
2. Connecting the Machine

Connecting to the IEEE 1284 Interface

This section describes how to connect the IEEE 1284 interface cable to the IEEE 1284 interface board.

• Properly shielded and grounded cables and connectors must be used for connections to a host
2 computer (and/or peripheral) in order to meet emission limits.

1. Make sure the main power switch on the machine is off.


2. Turn off the main power switch of the host computer.
3. Connect the IEEE 1284 interface cable to the IEEE 1284 port.

BKR009S

You might have to use a conversion adapter to connect the cable to the interface. For details about
acquiring a conversion adapter, consult your sales or service representative.
4. Connect the other end of the cable into the interface connector on the host computer.
Check the shape of the connector to the computer. Connect the cable firmly.
5. Turn on the main power switch of the machine.
6. Turn on the host computer.
When using Windows 2000/XP/Vista and Windows Server 2003/2003 R2/2008, a printer driver
installation screen might appear when the computer is turned on. If this happens, click [Cancel] on
the screen.

• For details about how to turn on the main power switch, see "Turning On the Power", About This
Machine.
• For details about installing the printer driver, see "Preparing the Machine", Printer Reference.

Connecting to the Wireless LAN Interface

This section describes how to connect to the wireless LAN interface.

66
Connecting to the Interfaces

• Check the machine's IPv4 address and subnet mask, or the IPv6 address settings.
• For details about how to set the IPv4 address and subnet mask from the control panel of the machine,
see "Interface Settings".
• Before using this machine with a wireless LAN interface, you must select [Wireless LAN] in [LAN Type].

2
Setup procedure
This section describes how to setup wireless LAN interface.
Set up wireless LAN according to the following procedure:

BBM002S

• Select [802.11 Ad-hoc Mode] when connecting Windows XP as a wireless LAN client using Windows
XP standard driver or utilities, or when not using the infrastructure mode.
• When [802.11 Ad-hoc Mode] is selected in Communication mode, select the channel for [Channel].
Set a channel that matches the type of wireless LAN being used. For details about setting the channel,
see "Interface Settings ".
• You can specify either "WEP" or "WPA" to the Security Method.
• Specify "WPA", when [Communication Mode] is set to [Infrastructure Mode].

67
2. Connecting the Machine

• If you select the [WPA] option for Security Method, select one of the following: [WPA-PSK], [WPA],
[WPA2-PSK], or [WPA2]. If you select [WPA-PSK] or [WPA2-PSK], enter your PSK. If you select
[WPA] or [WPA2], authentication settings and certificate installation settings are required. For details
about setting methods, see "Configuring IEEE 802.1X”.
• For details about how to specify wireless LAN settings from the control panel on the machine, see
"Interface Settings".
2
• p.28 "Interface Settings"
• p.373 "Configuring IEEE 802.1X"

Checking the signal


This section describes how to check the machine's radio wave status.
When using in infrastructure mode, you can check the machine's radio wave status using the control panel.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Wireless LAN] using [ ] or [ ], and then press the [OK] key.
5. Select [Wireless LAN Signal] using [ ] or [ ], and then press the [OK] key.
The machine's radio wave status appears.
6. After checking radio wave status, press [Exit].
7. Press the [User Tools/Counter] key.

68
Network Settings Required to Use the Printer/LAN-Fax

Network Settings Required to Use the Printer/


LAN-Fax
This section lists the network settings required for using the printer or LAN-Fax function.

• These settings should be made by the system administrator, or with the advice of the system
2
administrator.

Ethernet

This section lists the settings required for using the printer or LAN-Fax function with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network NCP Delivery Protocol As required

Interface Settings/Network NW Frame Type As required

Interface Settings/Network SMB Computer Name As required

Interface Settings/Network SMB Work Group As required

69
2. Connecting the Machine

Menu User Tool Setting Requirements

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary


2 Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Network Machine Name As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet and wireless LAN are
both connected, the selected interface has priority.

• p.28 "Interface Settings"

Wireless LAN

This section lists the settings required for using the printer or LAN-Fax function with a wireless LAN
connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

70
Network Settings Required to Use the Printer/LAN-Fax

Menu User Tool Setting Requirements

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary 2


Interface Settings/Network NCP Delivery Protocol As required

Interface Settings/Network NW Frame Type As required

Interface Settings/Network SMB Computer Name As required

Interface Settings/Network SMB Work Group As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Network Machine Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Security Method As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings"

71
2. Connecting the Machine

Network Settings Required to Use Internet Fax


This section lists the network settings required for using Internet Fax.

• These settings should be made by the system administrator, or with the advice of the system
2 administrator.

Ethernet

This section lists the settings required for using Internet Fax with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

72
Network Settings Required to Use Internet Fax

Menu User Tool Setting Requirements

Interface Settings/Network Host Name As required

File Transfer SMTP Server Necessary

File Transfer SMTP Authentication As required

File Transfer POP before SMTP As required 2


File Transfer Reception Protocol As required

File Transfer POP3/IMAP4 Settings As required

File Transfer Admin. E-mail Address As required

File Transfer E-mail Communication Port Necessary

File Transfer E-mail Recept. Interval As required

File Transfer Max. Recept. E-mail Size As required

File Transfer E-mail Storage in Server As required

File Transfer Fax E-mail Account Necessary

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• SMTP Server and Fax E-mail Account must be specified in order to send Internet Fax.
• When POP before SMTP is set to [On], also make settings for Reception Protocol and POP3/IMAP4
Settings.
• When SMTP Authentication is set to [On], also make setting for Admin. E-mail Address.
• POP3/IMAP4 Settings, E-mail Communication Port, and Fax E-mail Account must be specified in
order to receive Internet Fax.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.

• p.28 "Interface Settings"


• p.36 "File Transfer"

73
2. Connecting the Machine

Wireless LAN

This section lists the settings required for using Internet Fax with a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements


2 Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN Security Method As required

File Transfer SMTP Server Necessary

File Transfer SMTP Authentication As required

74
Network Settings Required to Use Internet Fax

Menu User Tool Setting Requirements

File Transfer POP before SMTP As required

File Transfer Reception Protocol As required

File Transfer POP3/IMAP4 Settings As required

File Transfer Admin. E-mail Address As required 2


File Transfer E-mail Communication Port Necessary

File Transfer E-mail Recept. Interval As required

File Transfer Max. Recept. E-mail Size As required

File Transfer E-mail Storage in Server As required

File Transfer Fax E-mail Account Necessary

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
• SMTP Server and Fax E-mail Account must be specified in order to send Internet Fax.
• When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3/
IMAP4 Settings.
• When SMTP Authentication is set to [On], you must also make settings for Admin. E-mail Address.
• POP3/IMAP4 Settings, E-mail Communication Port, and Fax E-mail Account must be specified in
order to receive Internet Fax.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.

• p.28 "Interface Settings"


• p.36 "File Transfer"

75
2. Connecting the Machine

Network Settings Required to Use E-mail


Function
This section lists the network settings required for sending e-mail.

2 • These settings should be made by the system administrator, or with the advice of the system
administrator.

Ethernet

This section lists the settings required for sending e-mail with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

76
Network Settings Required to Use E-mail Function

Menu User Tool Setting Requirements

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

File Transfer SMTP Server Necessary

File Transfer SMTP Authentication As required 2


File Transfer POP before SMTP As required

File Transfer Reception Protocol As required

File Transfer POP3/IMAP4 Settings As required

File Transfer Admin. E-mail Address As required

File Transfer E-mail Communication Port As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• When POP before SMTP is set to [On], also make settings for Reception Protocol and POP3/IMAP4
Settings.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.

• p.28 "Interface Settings"


• p.36 "File Transfer"

Wireless LAN

This section lists the settings required for sending e-mail with an Wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

77
2. Connecting the Machine

Menu User Tool Setting Requirements

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required


2 Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN Security Method As required

File Transfer SMTP Server Necessary

File Transfer SMTP Authentication As required

File Transfer POP before SMTP As required

File Transfer Reception Protocol As required

File Transfer POP3/IMAP4 Settings As required

File Transfer Admin. E-mail Address As required

File Transfer E-mail Communication Port As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].

78
Network Settings Required to Use E-mail Function

• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.
• When POP before SMTP is set to [On], you must also make settings for Reception Protocol and POP3/
IMAP4 Settings.
• When setting POP before SMTP to [On], check POP3 port number in E-mail Communication Port.

• p.28 "Interface Settings"


2
• p.36 "File Transfer"

79
2. Connecting the Machine

Network Settings Required to Use Scan to Folder


Function
This section lists the network settings required for sending files.

2 • These settings should be made by the system administrator, or with the advice of the system
administrator.

Ethernet

This section lists the settings required for sending files with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

80
Network Settings Required to Use Scan to Folder Function

Menu User Tool Setting Requirements

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

File Transfer Default User Name/PW(Send) As required


2
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN interface board is installed. If both Ethernet and
wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings"


• p.36 "File Transfer"

Wireless LAN

This section lists the settings required for sending files with an Wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address Necessary

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

81
2. Connecting the Machine

Menu User Tool Setting Requirements

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required


2 Interface Settings/Network Host Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN Security Method As required

File Transfer Default User Name/PW(Send) As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings"


• p.36 "File Transfer"

82
Network Settings Required to Use the Network Delivery Scanner

Network Settings Required to Use the Network


Delivery Scanner
This section lists the network settings required for delivering data to the network.

• These settings should be made by the system administrator, or with the advice of the system
2
administrator.

Ethernet

This section lists the settings required for delivering data to the network with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

83
2. Connecting the Machine

Menu User Tool Setting Requirements

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

File Transfer Delivery Option Necessary


2
• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.
• If Delivery Option is set to [On], check that IPv4 Address is specified.

• p.28 "Interface Settings"


• p.36 "File Transfer"

Wireless LAN

This section lists the settings required for delivering data to the network with an wireless LAN connection.
For details about how to specify the settings, see "Interface Settings" and "File Transfer".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

84
Network Settings Required to Use the Network Delivery Scanner

Menu User Tool Setting Requirements

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required 2


Interface Settings/Network Host Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN Security Method As required

File Transfer Delivery Option Necessary

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN are connected, the selected interface takes precedence.
• If Delivery Option is set to [On], check that IPv4 Address is specified.

• p.28 "Interface Settings"


• p.36 "File Transfer"

85
2. Connecting the Machine

Network Settings Required to Use WSD Scanner


This section lists the network settings required for using WSD Scanner function.

• These settings should be made by the system administrator, or with the advice of the system
2 administrator.

Ethernet

This section lists the settings required for using WSD Scanner function with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network NCP Delivery Protocol As required

Interface Settings/Network NW Frame Type As required

Interface Settings/Network SMB Computer Name As required

Interface Settings/Network SMB Work Group As required

Interface Settings/Network Ethernet Speed As required

86
Network Settings Required to Use WSD Scanner

Menu User Tool Setting Requirements

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required 2


Interface Settings/Network Host Name As required

Interface Settings/Network Machine Name As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [LAN Type] is displayed when the wireless LAN board is installed. If Ethernet and wireless LAN are
both connected, the selected interface has priority.

• p.28 "Interface Settings"

Wireless LAN

This section lists the settings required for using WSD Scanner function with a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network Machine IPv6 Address As required

Interface Settings/Network IPv6 Gateway Address As required

Interface Settings/Network IPv6 Stateless Setting As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

87
2. Connecting the Machine

Menu User Tool Setting Requirements

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary


2 Interface Settings/Network NCP Delivery Protocol As required

Interface Settings/Network NW Frame Type As required

Interface Settings/Network SMB Computer Name As required

Interface Settings/Network SMB Work Group As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Network Machine Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Security Method As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed. If
both Ethernet and wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings"

88
Network Settings Required to Use Network TWAIN Scanner

Network Settings Required to Use Network


TWAIN Scanner
This section lists the network settings required for using the TWAIN Scanner under the network environment.

• These settings should be made by the system administrator, or with the advice of the system
2
administrator.

Ethernet

This section lists the settings required for using the network TWAIN Scanner with an Ethernet connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network Ethernet Speed As required

Interface Settings/Network IEEE802.1X Auth.(Ethernet) As required

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].

89
2. Connecting the Machine

• [LAN Type] is displayed when the wireless LAN interface board is installed.
• When both Ethernet and wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings"

2 Wireless LAN

This section lists the settings required for using the network TWAIN Scanner a wireless LAN connection.
For details about how to specify the settings, see "Interface Settings".

Menu User Tool Setting Requirements

Interface Settings/Network Machine IPv4 Address Necessary

Interface Settings/Network IPv4 Gateway Address As required

Interface Settings/Network DNS Configuration As required

Interface Settings/Network DDNS Configuration As required

Interface Settings/Network IPsec As required

Interface Settings/Network Domain Name As required

Interface Settings/Network WINS Configuration As required

Interface Settings/Network Effective Protocol Necessary

Interface Settings/Network LAN Type Necessary

Interface Settings/Network Permit SNMPv3 Communictn. As required

Interface Settings/Network Permit SSL/TLS Comm. As required

Interface Settings/Network Host Name As required

Interface Settings/Wireless LAN Communication Mode Necessary

Interface Settings/Wireless LAN SSID Setting As required

Interface Settings/Wireless LAN Ad-hoc Channel As required

Interface Settings/Wireless LAN Security Method As required

90
Network Settings Required to Use Network TWAIN Scanner

• For the Effective Protocol setting, check that the protocol you want to use is set to [Active].
• [Wireless LAN] and [LAN Type] are displayed when the wireless LAN interface board is installed.
When both Ethernet and wireless LAN are connected, the selected interface takes precedence.

• p.28 "Interface Settings" 2

91
2. Connecting the Machine

Using Utilities to Make Network Settings


This section describes how to make network settings using utilities.
You can also specify network settings using utilities such as Web Image Monitor, SmartDeviceMonitor for
Admin, and telnet.

2
• These settings should be made by the system administrator, or with the advice of the system
administrator.
• For details about using Web Image Monitor, see "Using Web Image Monitor".
• For details about using SmartDeviceMonitor for Admin, see "Using SmartDeviceMonitor for Admin".
• For details about using telnet, see "Using telnet".

• p.117 "Using Web Image Monitor"


• p.131 "Using SmartDeviceMonitor for Admin"
• p.156 "Remote Maintenance by telnet"

Interface Settings

This section describes how to make Interface settings using utilities.


Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet.
[Network] [Machine IPv4 Address] [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Machine IPv4 Address] [Specify] "IPv4 Address"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Machine IPv4 Address] [Specify] "Subnet Mask"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [IPv4 Gateway Address]
• Web Image Monitor: Can be used for specifying the setting.

92
Using Utilities to Make Network Settings

• SmartDeviceMonitor for Admin: Can be used for specifying the setting.


• telnet: Can be used for specifying the setting.
[Network] [Machine IPv6 Address] "Manual Config. Address"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting. 2
[Network] [IPv6 Gateway Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [IPv6 Stateless Setting]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [DNS Configuration] [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [DNS Configuration] [Specify] "DNS Server 1-3"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [DDNS Configuration]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [IPsec]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Domain Name] [Auto-Obtain (DHCP)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.

93
2. Connecting the Machine

• telnet: Can be used for specifying the setting.


[Network] [Domain Name] [Specify] "Domain Name"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.

2 [Network] [WINS Configuration] [On] "Primary WINS Server"


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [WINS Configuration] [On] "Second. WINS Server"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [WINS Configuration] [On] "Scope ID"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [WINS Configuration] [Off]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Effective Protocol] "IPv4"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: You can specify the TCP/IP settings if SmartDeviceMonitor for
Admin is communicating with the machine using IPX/SPX.
• telnet: Can be used for specifying the setting.
[Network] [Effective Protocol] "IPv6"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Effective Protocol] "NetWare"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: You can specify the IPX/SPX settings if SmartDeviceMonitor for
Admin is communicating with the machine using TCP/IP.

94
Using Utilities to Make Network Settings

• telnet: Can be used for specifying the setting.


[Network] [Effective Protocol] "SMB"
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Effective Protocol] "AppleTalk" 2
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [NCP Delivery Protocol] [IPX Priority]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [NCP Delivery Protocol] [TCP/IP Priority]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [NCP Delivery Protocol] [IPX Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [NCP Delivery Protocol] [TCP/IP Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [NW Frame Type] [Auto Select]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [NW Frame Type] [Ethernet II]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.

95
2. Connecting the Machine

[Network] [NW Frame Type] [Ethernet 802.2]


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [NW Frame Type] [Ethernet 802.3]

2 • Web Image Monitor: Can be used for specifying the setting.


• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [NW Frame Type] [Ethernet SNAP]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [SMB Computer Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [SMB Work Group]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Ethernet Speed]
• Web Image Monitor: Cannot be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [IEEE802.1X Auth.(Ethernet)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [LAN Type] [Ethernet]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.

96
Using Utilities to Make Network Settings

[Network] [LAN Type] [Wireless LAN]


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Ping Command]
• Web Image Monitor: Cannot be used for specifying the setting. 2
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [Permit SNMPv3 Communictn.] [Encryption Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Permit SNMPv3 Communictn.] [Encryption/Cleartext]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Network] [Permit SSL/TLS Comm.] [Ciphertext Only]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [Permit SSL/TLS Comm.] [Ciphertext Priority]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [Permit SSL/TLS Comm.] [Ciphertext/Cleartext]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[Network] [Host Name]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Can be used for specifying the setting.
• telnet: Can be used for specifying the setting.

97
2. Connecting the Machine

[Network] [Machine Name]


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Wireless LAN] [Communication Mode] [802.11 Ad-hoc Mode]

2 • Web Image Monitor: Can be used for specifying the setting.


• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Wireless LAN] [Communication Mode] [Infrastructure Mode]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Wireless LAN] [SSID Setting]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Wireless LAN] [Ad-hoc Channel]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.
[Wireless LAN] [Security Method]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Can be used for specifying the setting.

File Transfer

This section describes how to make File Transfer settings using utilities.
Change settings by using Web Image Monitor, SmartDeviceMonitor for Admin, and telnet.
[File Transfer] [SMTP Server]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.

98
Using Utilities to Make Network Settings

[File Transfer] [SMTP Authentication]


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [POP before SMTP]
• Web Image Monitor: Can be used for specifying the setting. 2
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Reception Protocol] [POP3]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Reception Protocol] [IMAP4]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Reception Protocol] [SMTP]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [POP3/IMAP4 Settings]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Admin. E-mail Address]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [E-mail Communication Port]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.

99
2. Connecting the Machine

[File Transfer] [E-mail Recept. Interval]


• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Max. Recept. E-mail Size]

2 • Web Image Monitor: Can be used for specifying the setting.


• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [E-mail Storage in Server]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Default User Name/PW(Send)]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.
[File Transfer] [Fax E-mail Account]
• Web Image Monitor: Can be used for specifying the setting.
• SmartDeviceMonitor for Admin: Cannot be used for specifying the setting.
• telnet: Cannot be used for specifying the setting.

100
Connecting the Machine to a Telephone Line and Telephone

Connecting the Machine to a Telephone Line and


Telephone
This section describes how to connect the machine to the telephone lines and select the line type.

Connecting the Telephone Line 2


To connect the machine to a telephone line, use a snap-in modular type connector.

• Make sure the connector is the correct type before you start.

BKR001S

1. G3 (analog) line interface connector


2. External telephone connector

Selecting the Line Type

Select the line type to which the machine is connected. There are two types: tone and pulse dial.
Select the line type using Administrator Tools.

• This function is not available in some regions.

Connecting the Optional Handset or an External Telephone

You can connect the optional handset or an external telephone to the machine.

101
2. Connecting the Machine

You can use it for telephone calls.

• When you use the optional handset or an external telephone with the [On Hook Dial] key for telephone
calls, you can not talk with the other party without pressing the [On Hook Dial] key after talking off
the receiver.

2 Specifying the handset line type

TT DP

BHJ310S

The switch on the handset should be in the appropriate position-TT (Tone Dialing) or DP (Pulse Dialing).
Adjusting the handset bell volume

Ringer
x

BHJ311S

Adjust the handset ringer volume using the volume switch.


Adjusting the handset receiver volume

Receiver

BKR030S

102
Connecting the Machine to a Telephone Line and Telephone

Adjusting the handset receiver volume using the volume switch.

• Some external telephones may not be connected or may suffer reduced functionality.

103
2. Connecting the Machine

104
3. Using a Printer Server
This chapter describes how to configure the machine as a network printer.

Preparing Printer Server


This section explains how to configure the machine as a Windows network printer. The machine is
configured to enabling network clients to use it. When the network printer is connected via
SmartDeviceMonitor for Client, you can set the printing notification function to notify clients of the results
of their print jobs. 3
• Under Windows XP Professional or Windows Server 2003/2003 R2, to change printer properties
in the [Printer] or [Printers and Faxes] window, you need Printer Management access authentication;
under Windows Vista or Windows Server 2008, Full Control access authentication. Log on to the file
server as an Administrator or member of the PowerUsers group.

1. Open the [Printers and Faxes] window from the [Start] menu.
The [Printers and Faxes] window appears.
2. Click the icon of the machine you want to use. On the [File] menu, click [Properties]. The
printer properties appear.
3. On the [Sharing] tab, click [Share this printer].
4. To share the machine with users using a different version of Windows, click [Additional
Drivers...].
If you have installed an alternative driver by selecting [Share As:] during the printer driver installation,
this step can be ignored.
5. Click [OK], and then close the printer properties.

105
3. Using a Printer Server

Using NetWare
This section describes the setting procedure for network printers in the NetWare environment. In the
NetWare environment, you can connect the machine as a “print server” or “remote printer”.

• IPv6 can not be used on this function.


Setting procedure

3 • When using the machine as a print server


1. Installing SmartDeviceMonitor for Admin
2. Setting the network interface board.
3. Turning the machine off and then back on.
• When using the machine as a remote printer
1. Installing SmartDeviceMonitor for Admin.
2. Setting the network interface board.
3. Setting NetWare.
4. Starting the print server.

• This procedure assumes an environment is already prepared for normal NetWare running
the printing service setting.
• The procedure is explained with the following example settings:
• File server's name ...CAREE
• Print server's name ...PSERV
• Printer's name ...R-PRN
• Queue name ...R-QUEUE
Using SmartDeviceMonitor for Admin
To use the machine in a NetWare environment, use SmartDeviceMonitor for Admin to set the NetWare
printing environment.
Printers listed by SmartDeviceMonitor for Admin
SmartDeviceMonitor for Admin lists printers connected to the network. If you cannot identify the
machine you want to configure, print configuration page, and then check the machine name.

• The NetWare Client provided by Novell is required to set the printing environment using
SmartDeviceMonitor for Admin under the following environments:
• NDS or Bindery mode in Windows 2000

106
Using NetWare

• NDS or Bindery mode in Windows XP


• For details about SmartDeviceMonitor for Admin, see “Using SmartDeviceMonitor for Admin”.

• p.131 "Using SmartDeviceMonitor for Admin"

Setting Up as a Print Server (NetWare 3.x)

Follow the procedure below to connect the machine as a print server using NetWare 3.x.
3
1. Start Web Image Monitor.
2. Click [Login].
A dialog box for entering the login user name and password appears.
3. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
• Print Server Name: Enter the NetWare print server name. To use the interface board as a print
server, enter the name of a print server that is not active on the file server. Use up to 47 characters.
• Logon Mode: Specify whether to designate a file server or NDS tree when logging on to
NetWare.
• File Server Name: When a file server name is entered here, only the specified file server is
searched for. This item is mandatory. Use up to 47 characters.
• NDS Tree: To enable NDS mode, enter the name of the NDS tree you want to log on to. Use up
to 32 alphanumeric characters.
• NDS Context Name: To enable NDS mode, enter the print server context. Use up to 127
characters.
• Operation Mode: Specify whether to use the interface board as a print server or a remote printer.
• Remote Printer No.: This item is effective when the interface board is specified as a remote printer.
Enter the same number as the number of the printer to be created on the print server (0 to 254
characters).
• Job Timeout: When the interface board is used as a NetWare remote printer, the printer cannot
detect when a print job ends. Therefore, the printer terminates printing when a certain period of
time has elapsed since it last received print data (i.e., when it has not received print data for a
certain period of time). Specify here this period of time (3 to 255 seconds). The initial value is
15 (seconds).
• Frame Type: Select the frame type from the drop-down menu.
• Print Server Protocol: Select the protocol for NetWare from the drop-down menu.
• NCP Delivery Protocol: Select the protocol for NCP delivery.

107
3. Using a Printer Server

5. Confirm the settings, and then click [Device Name].


Configuration is now complete. Wait several before restarting Web Image Monitor.
6. Click [Logout].

• To check the configuration is correct, enter the following from the command prompt:
F:> USERLIST
• If the printer works as configured, the name of the print server appears as a connected user.

3 • If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

• p.117 "Using Web Image Monitor"

Setting Up as a Print Server (NetWare 4.x, 5/5.1, 6/6.5)

Follow the procedure below to connect the machine as a print server using NetWare 4.x, NetWare 5/5.1,
or NetWare 6 / 6.5.

• When using the printer as a print server in NetWare 4.x, NetWare 5/5.1, or NetWare 6/6.5, set
it to the NDS mode.
• When using NetWare 5/5.1 or NetWare 6/6.5, set the printer as a print server.

1. Start Web Image Monitor.


2. Click [Login].
A dialog box for entering the login user name and password appears.
3. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
5. Confirm the settings, and then click [Device Name].
Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].

108
Using NetWare

7. Quit Web Image Monitor.

• To check the configuration is correct, enter the following from the command prompt:
F:> USERLIST
• If the printer works as configured, the name of the print server appears as a connected user.
• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer. If no printer names appear in the list, match the frame
types of IPX/SPXs for the computer and printer. Use the [Network] dialog box of Windows to change
the frame type of the computer. 3
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

• p.156 "Remote Maintenance by telnet"

Using Pure IP in the NetWare 5/5.1 or 6/6.5 Environment

Follow the procedure below to connect the machine as a print server in a pure IP environment of NetWare
5/5.1 or NetWare 6/6.5.

• When creating a queued print server in a pure IP environment of NetWare 5/5.1 or NetWare 6/6.5,
create a print queue on the file server using NetWare Administrator.
• This printer is not available as a remote printer for use in a pure IP environment.
• To use the printer in a pure IP environment, set it to IPv4.

Setting up using NWadmin

1. From Windows, start NWadmin.


For details about NWadmin, see the NetWare manuals.
2. Select the object in which the print queue is located in the directory tree, and then click
[Create] on the [Object] menu.
3. In the [Class of new object] box, click [Print Queue], and then click [OK].
4. In the [Print Queue Name] box, enter the name of the print queue.
5. In the [Print Queue Volume] box, click [Browse].
6. In the [Available objects] box, click the volume in which the print queue is created, and then
click [OK].

109
3. Using a Printer Server

7. Check the settings, and then click [Create].


8. Select the object in which the printer is located, and then click [Create] on the [Object] menu.
9. In the [Class of new object] box, click [Printer], and then click [OK]. For NetWare 5, click
[Printer (Non NDPS)].
10. In the [Printer name] box, enter the printer name.
11. Select the [Define additional properties] check box, and then click [Create].
12. Click [Assignments], and then click [Add] in the [Assignments] area.
13. In the [Available objects] box, click the queue you created, and then click [OK].
3 14. Click [Configuration], click [Parallel] in the [Printer type] list, and then click
[Communication].
15. Click [Manual load] in the [Communication type] area, and then click [OK].
16. Check the settings, and then click [OK].
17. Select a context specified, and then click [Create] on the [Object] menu.
18. In the [Class of new object] box, click [Print Server], and then click [OK]. For NetWare 5,
click [Print Server (Non NDPS)].
19. In the [Print Server Name] box, enter the print server name.
Use the same print server name specified using SmartDeviceMonitor for Admin.
20. Select the [Define additional properties] check box, and then click [Create].
21. Click [Assignments], and then click [Add] in the [Assignments] area.
22. In the [Available objects] box, click the queue you created, and then click [OK].
23. Check the settings, and then click [OK].
24. Start the print server by entering the following from the console of the NetWare server.
If the print server is in operation, quit and restart it.
To quit
CAREE: unload pserver
To start
CAREE: load pserver [print server name]

Setting up using Web Image Monitor

1. Start Web Image Monitor.


2. Click [Login].
A dialog box for entering the login user name and login password appears.
3. Enter the user login user name and password, and then click [Login].
For details about the login name and password, consult your network administrator.

110
Using NetWare

4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
5. Confirm the settings, and then click [Device Name].
Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].
7. Quit Web Image Monitor.

• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
3
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

• p.117 "Using Web Image Monitor"

Setting Up as a Remote Printer (NetWare 3.x)

Follow the procedure below to use the machine as a remote printer under NetWare 3.x.

Setting up using PCONSOLE

1. Enter “PCONSOLE” from the command prompt.


F:> PCONSOLE
2. Create a print queue.
When using the existing print queue, go to the procedure for creating a printer.
3. From the [Available Options] menu, select [Print Queue Information], and then press the
[Enter] key.
4. Press [Insert] key, and then enter a print queue name.
5. Press [Esc] key to return to the [Available Options] menu.
6. Set up the network connection to a printer.
7. On the [Available Options] menu, click [Print Server Information], and then press the [Enter]
key.
8. To create a new print server, press the [Insert] key, and then enter a print server name.
For a currently defined print server, select a print server in the [Print Server] list.
Use the same printer name specified using SmartDeviceMonitor for Admin.

111
3. Using a Printer Server

9. From the [Print Server Information] menu, select [Print Server Configuration].
10. From the [Print Server Configuration] menu, select [Printer Configuration].
11. Select the printer indicated as [Not Installed].
Use the same printer number specified as the remote printer number using SmartDeviceMonitor for
Admin.
12. To change the printer name, enter a new name.
A name “printer x” is assigned to the printer. The “x” stands for the number of the selected printer.
13. As type, select [Remote Parallel, LPT1].
3 The IRQ, Buffer size, Starting form, and Queue service mode are automatically configured.
14. Press the [Esc] key, and then click [Yes] on the confirmation message.
15. Press the [Esc] key to return to [Print Server Configuration Menu].
16. Assign print queues to the created printer.
17. From [Print Server Configuration Menu], select [Queues Serviced By Printer].
18. Select the printer created.
19. Press the [Insert] key to select a queue serviced by the printer.
You can select several queues.
20. Follow the instructions on the screen to make other necessary settings.
Following these steps, check that the queues are assigned.
21. Press the [Esc] key until “Exit?” appears, and then select [Yes] to exit PCONSOLE.
22. Start the print server by entering the following from the console of the NetWare server.
If the print server is in operation, quit and restart it.
To quit
CAREE: unload pserver
To start
CAREE: load pserver [print server name]
If the printer works as configured, the message “Waiting for job” appears.

Setting up using Web Image Monitor

1. Start Web Image Monitor.


2. Click [Login].
A dialog box for entering the login user name and login password appears.
3. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].

112
Using NetWare

5. Confirm the settings, and then click [Device Name].


Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].
7. Quit Web Image Monitor.

• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
3
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

• p.117 "Using Web Image Monitor"

Setting Up as a Remote Printer (NetWare 4.x, 5/5.1, 6/6.5)

Follow the procedure below to use the printer as a remote printer under NetWare 4.x, 5/ 5.1 and 6/6.5.

• To use the printer as a remote printer under NetWare 4.x, 5/5.1, 6/6.5, set it to NDS mode.
• Do not use the printer as a remote printer when Pure IP is used.

Setting up using NWadmin

1. From Windows, start NWadmin.


For details about NWadmin, see the NetWare manuals.
2. Set up the network connection to a print queue. Select the object in which the print queue is
located in the directory tree, and then click [Create] on the [Object] menu.
3. In the [Class of new object] box, click [Print Queue], and then click [OK].
4. In the [Print Queue Name] box, enter the name of the print queue.
5. In the [Print Queue Volume] box, click [Browse].
6. In the [Available objects] box, click the volume in which the print queue is created, and then
click [OK].
7. Check the settings, and then click [Create].
8. Set up the network connection to a printer. Select the object in which the printer is located,
and then click [Create] on the [Object] menu.

113
3. Using a Printer Server

9. In the [Class of new object] box, click [Printer], and then click [OK]. For NetWare 5, click
[Printer (Non NDPS)].
10. In the [Printer name] box, enter the printer name
11. Select the [Define additional properties] check box, and then click [Create].
12. Assign print queues to the created printer. Click [Assignments, and then click [Add] in the
[Assignments] area.
13. In the [Available objects] box, click the queue you created, and then click [OK].
14. Click [Configuration], click [Parallel] in the [Printer type] list, and then click
3 [Communication].
15. Click [Manual load] in the [Communication type] area, and then click [OK]. Check the
settings, and then click [OK].
16. Set up the network connection to a print server. Select a context specified, and then click
[Create] on the [Object] menu.
17. In the [Class of new object] box, click [Print Server], and then click [OK]. For NetWare 5,
click [Print Server (Non NDPS)].
18. In the [Print Server Name:] box, enter the print server name.
Use the same print server name specified using SmartDeviceMonitor for Admin.
19. Select the [Define additional properties] check box, and then click [Create].
20. Assign the printer to the created print server. Click [Assignments], and then click [Add] in
the [Assignments] area.
21. In the [Available objects] box, click the queue you created, and then click [OK].
22. In the [Printers] area, click the printer you assigned, and then click [Printer Number].
23. Enter the printer number, and then click [OK]. Check the settings, and then click [OK].
Use the same printer number specified as the remote printer number using SmartDeviceMonitor for
Admin.
24. Start the print server by entering the following from the console of the NetWare server.
If the print server is in operation, quit and restart it.
To exit
CAREE: unload pserver
To start
CAREE: load pserver [print server name]
25. Enter the printer server name as the context name, and then press the [Enter] key.
26. Select the printer name on the context menu, and then press the [Enter] key.

Setting up using Web Image Monitor

1. Start Web Image Monitor.

114
Using NetWare

2. Click [Login].
A dialog box for entering the login user name and login password appears.
3. Enter the user login name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
4. Click [Configuration] in the left area, and then click [NetWare Print Settings].
5. Confirm the settings, and then click [Device Name].
Configuration is now complete. Wait several minutes before restarting Web Image Monitor.
6. Click [Logout].
3
7. Quit Web Image Monitor.

• If you cannot identify the printer you want to configure, check the printer name against the
configuration page printed from the printer.
• If no printer names appear in the list, match the frame types of IPX/SPXs for the computer and printer.
Use the [Network] dialog box of Windows to change the frame type of the computer.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

• p.117 "Using Web Image Monitor"

115
3. Using a Printer Server

116
4. Monitoring and Configuring the
Printer
This chapter describes how to monitor and configure the printer.

Using Web Image Monitor


Using Web Image Monitor, you can check the machine status and change settings.
Available operations
The following operations can be remotely performed using Web Image Monitor from a client
computer. 4
• Displaying machine status or settings
• Checking the print job status or history
• Interrupting currently printing jobs
• Resetting the machine
• Managing the Address Book
• Making machine settings
• Making network protocol settings
• Making security settings
Configuring the machine
To perform the operations from Web Image Monitor, TCP/IP is required. After the machine is
configured to use TCP/IP, operations from Web Image Monitor become available.
Recommended Web browser
• Windows:
Internet Explorer 5.5 SP2 or higher
Firefox 1.0 or higher
• Mac OS:
Firefox 1.0 or higher
Safari 1.0, 1.2, 2.0 (412.2) or higher
Web Image Monitor supports screen reader software. We recommend JAWS 7.0 or a later version.

• Safari cannot be used on Mac OS X 10.4.1.


• Display and operation problems can occur if you do not enable JavaScript and cookies, or if you are
using a non-recommended Web Browser.

117
4. Monitoring and Configuring the Printer

• If you are using a proxy server, change the Web browser settings. Contact your administrator for
information about the settings.
• If you click your browser's back button but the previous page does not appear, click the browser's
refresh button and try again.
• Machine information is not automatically updated. To perform an update, click [Refresh] in the display
area.
• We recommend using Web Image Monitor in the same network.
• You cannot access to the machine from outside the firewall.
• When using the machine under DHCP, the IP address may be automatically changed by the DHCP
server settings. Enable DDNS setting on the machine, and then connect using the machine's host name.
Alternatively, set a static IP address to the DHCP server.
4 • If the HTTP port is disabled, connection to the machine using the machine's URL cannot be established.
SSL setting must be enabled on this machine. For details, consult your network administrator.
• When using the SSL encryption protocol, enter “https://(machine's IP address or host name)/”.
• Internet Explorer must be installed on your computer. Use the most recent available version. We
recommend Internet Explorer 6.0 or later.
• When you are using Firefox, fonts and colors may be different, or tables may be out of shape.
• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.
• To use JAWS 7.0 under Web Image Monitor, you must be running Windows OS and Microsoft
Internet Explorer 5.5 SP2, or a later version.

Displaying Top Page

This section explains the Top Page and how to display Web Image Monitor.

• When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
“192.168.001.010”, you must enter it as “192.168.1.10”.

1. Start your Web browser.


2. Enter “http://(machine's IP address or host name)/” in your Web browser's URL bar.
Top Page of Web Image Monitor appears.
If the machine's host name has been registered on the DNS or WINS server, you can enter it.
When setting SSL, a protocol for encrypted communication, under environment which server
authentication is issued, enter “https://(machine's IP address or host name)/”.
Every Web Image Monitor page is divided into the following areas:

118
Using Web Image Monitor

4
BKR010S

1. Menu area
If you select menu, its content will be shown on the work area, or the sub area.
2. Tab area
Details about each menu appear.
3. Header area
The dialog box for switching to the user mode and administrator mode appears, and each mode's menu will be
displayed.
The link to help and dialog box for keyword search appears.
4. Help
Use Help to view or download Help file contents.
5. Display area
Displays the contents of the item selected in the menu area.
Machine information in the display area is not automatically updated. Click [Refresh] at the upper right in the
display area to update the machine information. Click the Web browser's [Refresh] button to refresh the entire
browser screen.

• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.

119
4. Monitoring and Configuring the Printer

When User Authentication is Set

Login (using Web Image Monitor)


Follow the procedure below to log on when user authentication is set.

1. Click [Login].
2. Enter a login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.

4 • For user code authentication, enter a user code in [Login User Name], and then click [Login].
• The procedure may differ depending on the Web browser used.

Log out (using Web Image Monitor)


Click [Logout] to log off.

• When you log on and made the setting, always click [Logout].

About Menu and Mode

There are two modes available with Web Image Monitor: guest mode and administrator mode.
Displayed Items may differ depending on the machine type.
Guest Mode
In the guest mode, machine status, settings, and print job status can be viewed, but the machine settings
cannot be changed.

120
Using Web Image Monitor

4
BKR011S

1. Home
The [Status], [Device Info], and [Counter] tab are displayed. Details of the tab menu are displayed on the work
area.
2. Fax Received File
Displays received fax files.
3. Printer: Print Jobs
Allows you to display list of Sample Print, Locked Print, Hold Print, and Stored Print jobs.
4. Job
Displays all print files.
5. Configuration
Displays current machine and network settings.
Administrator Mode
In the administrator mode, you can configure various machine settings.

121
4. Monitoring and Configuring the Printer

4
BKR012S

1. Home
The [Status], [Device Info], and [Counter] tab are displayed. Details of the tab menu are displayed on the work
area.
2. Printer: Print Jobs
Allows you to display list of Locked Print, Sample Print, Hold Print, and Stored Print jobs.
3. Job
Displays all print files.
4. Address Book
User information can be registered, displayed, changed, and deleted.
5. Configuration
System settings for the machine, interface and security can be made.
6. Reset Device
Click to reset the printer. If a print job is being processed, the printer will be reset after the print job is completed.
This button is located on Top Page.
7. Reset Printer Job
Click to reset current print jobs and print jobs in queue. This button is located on Top Page.

Access in the Administrator Mode

Follow the procedure below to access Web Image Monitor in the administrator mode.

1. On Top Page, click [Login].


The window for entering the login user name and password appears.

122
Using Web Image Monitor

2. Enter your login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.

List of Setting Items

The following tables show Web Image Monitor items that can be viewed or modified depending on the
selected mode on the Web browser. Select one of the following modes to log on Web Image Monitor:
• Guest mode: logged on as a user
• Administrator mode: logged on as an administrator
Home
Status 4
Menu Guest mode Administrator mode

Reset Device None Modify

Reset Printer Job None Modify

Status Read Read

Toner Read Read

Input Tray Read Read

Output Tray Read Read

Device Info

Menu Guest mode Administrator mode

Functions Read Read

System Read Read

Version Read Read

Printer Language Read Read

Counter

Menu Guest mode Administrator mode

Copier Read Read

123
4. Monitoring and Configuring the Printer

Menu Guest mode Administrator mode

Printer Read Read

Fax Read Read

Send/TX Total Read Read

Fax Transmission Read Read

Scanner Send Read Read

Other Function(s) Read Read

4 Fax Received File

Menu Guest mode Administrator mode

Fax Received File Read/Modify None

Printer: Print Jobs

Menu Guest mode Administrator mode

Print Job List Read/Modify Read/Modify

Job
Job List

Menu Guest mode Administrator mode

Current/Waiting Jobs Read Read/Modify

Job History Read Read

Printer

Menu Guest mode Administrator mode

Spool Printing Read Read

Job History Read Read

Error Log Read Read

Fax History

124
Using Web Image Monitor

Menu Guest mode Administrator mode

Transmission Read Read/Modify

Reception Read Read/Modify

LAN-Fax Read Read

Address Book

Menu Guest mode Administrator mode

Address List None Read/Modify


4
Configuration
Device Settings

Menu Guest mode Administrator mode

System Read Read/Modify

Paper Read Read/Modify

Date/Time Read Read/Modify

Timer Read Read/Modify

Logs None Read/Modify

Download Logs None Read/Modify

E-mail Read Read/Modify

Auto E-mail Notification None Read/Modify

On-demand E-mail
None Read/Modify
Notification

File Transfer None Read/Modify

User Authentication
None Read/Modify
Management

Administrator Authentication
None Read/Modify
Management

125
4. Monitoring and Configuring the Printer

Menu Guest mode Administrator mode

Program/Change
None Read/Modify
Administrator

LDAP Server None Read/Modify

Firmware Update None Read/Modify

Program/Change Realm None Modify

Printer

4 Menu Guest mode Administrator mode

Basic Settings Read Read/Modify

Tray Parameters (PCL) None Read/Modify

Tray Parameters (PS) None Read/Modify

Virtual Printer Settings Read Read/Modify

PDF Temporary Password Modify None

PDF Group Password None Modify

PDF Fixed Password None Modify

Fax

Menu Guest mode Administrator mode

General Settings None Read/Modify

Administrator Tools None Read/Modify

E-mail Settings None Read/Modify

IP-Fax Settings None Read/Modify

IP-Fax Gateway Settings None Read/Modify

Parameter Settings None Read/Modify

Scanner

126
Using Web Image Monitor

Menu Guest mode Administrator mode

Scan Settings Read Read/Modify

Destination List Settings Read Read/Modify

Send Settings Read Read/Modify

Administrator Tools Read Read/Modify

Interface

Menu Guest mode Administrator mode

Interface Settings Read Read/Modify


4
Wireless LAN Settings Read Read/Modify

Network

Menu Guest mode Administrator mode

IPv4 Read Read/Modify

IPv6 Read Read/Modify

NetWare Read Read/Modify

AppleTalk Read Read/Modify

SMB Read Read/Modify

SNMP None Read/Modify

SNMPv3 None Read/Modify

SSDP None Read/Modify

Bonjour Read Read/Modify

System Log Read Read

Security

Menu Guest mode Administrator mode

Network Security None Read/Modify

127
4. Monitoring and Configuring the Printer

Menu Guest mode Administrator mode

Access Control None Read/Modify

IPP Authentication None Read/Modify

SSL/TLS None Read/Modify

ssh None Read/Modify

Site Certificate None Read/Modify

Device Certificate None Read/Modify

4 IPsec None Read/Modify

User Lockout Policy None Read/Modify

IEEE 802.1X (WPA/WPA2) None Read/Modify

S/MIME None Read/Modify

RC Gate

Menu Guest mode Administrator mode

Setup RC Gate None Read/Modify

Update RC Gate Firmware None Read

RC Gate Proxy Server None Read/Modify

Webpage

Menu Guest mode Administrator mode

Webpage Read Read/Modify

Extended Feature Settings

Menu Guest mode Administrator mode

Startup Setting None Read/Modify

Extended Feature Info None Read

Install None Read/Modify

128
Using Web Image Monitor

Menu Guest mode Administrator mode

Uninstall None Read/Modify

Change Allocation None Read/Modify

Administrator Tools None Read/Modify

Additional Program Startup


None Read/Modify
Setting

Install Additional Program None Read/Modify

Uninstall Additional Program None Read/Modify

Copy Extended Features None Read/Modify


4
Copy Card Save Data None Read/Modify

• Some items are not displayed depending on the security settings.


• Some items are not displayed if certain option is not installed.

Displaying Web Image Monitor Help

When using Help for the first time, clicking the icon marked “?” ( ) makes the following screen appear,
in which you can view Help in two different ways, as shown below:
Viewing Help on our Web site
Downloading Help to your computer
Downloading and Checking Help
You can download Help to your computer. As the Help URL, you can specify the path to the local file
to view the Help without connecting to the Internet.

• By clicking “?” ( ) in the header area, the contents of Help appear.


• By clicking “?” ( ), the Help icon in the display area, Help for the setting items in the display area
appears.

Downloading Help

1. In the [OS] list, select the operating system.

129
4. Monitoring and Configuring the Printer

2. In the [Language] list, select the language.


3. Click [Download].
4. Download Help by following the instructions on the screen.
5. Store the downloaded compressed file in a given location, and then decompress the file.
To create a link for the Help button ( ), save the downloaded Help files on a Web server.

Linking the URL of the downloaded Help


You can link the URL of the help file on a computer or Web server to the “?” button.

1. Log on to Web Image Monitor in the administrator mode.


4 2. In the menu area, click [Configuration].
3. Click [Webpage].
4. In the [Set Help URL Target] box, enter the URL of the help file.
If you saved the help file to "C:\HELP\EN", enter “file://C:/HELP/”. For example, if you saved the
file to a Web server, and the URL of the index file is “http:// a.b.c.d/HELP/EN/index.html”, enter
“http://a.b.c.d/HELP/”.
5. Click [OK].

• If you save the Help files on your hard disk, you must access them directly - you cannot link to them
using the Help button ( ).

130
Using SmartDeviceMonitor for Admin

Using SmartDeviceMonitor for Admin


Using SmartDeviceMonitor for Admin, you can monitor the network printers. Also, you can change the
configuration of the network interface board using TCP/IP or IPX/SPX.

• IPv6 cannot be used on this function.


Protocol stack provided with Operating System
• Windows 2000
TCP/IP
IPX/SPX
NetWare
4
Novell Client for Windows 2000/XP/2003
• Windows Server 2003/2003 R2
TCP/IP
IPX/SPX
Novell Client for Windows 2000/XP/2003
• Windows XP
TCP/IP
IPX/SPX
Novell Client for Windows 2000/XP/2003
• Windows Vista, Windows Server 2008
TCP/IP
Available operations
The following functions are available:
• Limits settings done from the control panel, and disables changes made to certain items.
• Enables selection of paper type loaded in the machine.
• Switches to, and comes out of Energy Saver mode.
• Checks information about printing, paper quantity, etc.
• Simultaneously monitors multiple printers. When there are many printers, you can create groups
and classify printers to facilitate management.
• Checks the machine's network settings and detailed device information.
• Enables you to change the machine's network settings.
• You can check details of print jobs sent from a computer.

131
4. Monitoring and Configuring the Printer

• Allows you to check job histories of printed, faxed (LAN-Fax), scanned, and photocopied
documents identified by user codes.
• Allows selection of functions such as printing and scanning for each user code.
• Fax numbers and e-mail addresses stored in the machine can be changed and saved by
computer.
• You can check each fax job history entry.
• You can make settings for and display the status changes of group devices.
• Using Address Management Tool, you can manage LAN-Fax numbers, user names for Scan to
Folder, and addresses for sending and receiving Internet faxes.
• The e-mail sender's name and folder can be protected.

4
Installing SmartDeviceMonitor for Admin

Follow the procedure below to install SmartDeviceMonitor for Admin

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The following languages are available: Czech, Danish, German, English, Spanish, French, Italian,
Hungarian, Dutch, Norwegian, Polish, Portuguese , Finnish, Swedish, Chinese Simple and Chinese
Traditional.
4. Click SmartDeviceMonitor for Admin.
5. Click [Next].
The software license agreement appears in the License Agreement dialog box.
6. After reading through its contents, click [Next].
7. Follow the instructions on the screen.
A message appears when the installation is completed.
8. Click [OK].
A message about restarting the computer may appear. Restart the computer to complete installation.

• Auto Run may not work under certain operating system settings. In this case, launch “Setup.exe”
located on the CD-ROM root directory.
• If you are required to restart the computer after installing SmartDeviceMonitor for Admin, restart the
computer and continue the configuration.

132
Using SmartDeviceMonitor for Admin

Changing the Network Interface Board Configuration

Follow the procedure below to change the network interface board configuration using
SmartDeviceMonitor for Admin.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. In the list, select a machine whose configuration you want to change. 4
4. On the [Tools] menu, click [NIB Setup Tool].

A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
NIB Setup Tool starts. Click [Web browser], and then click [OK].
5. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
6. Configure settings using Web Image Monitor.
7. Click [Logout].
8. Quit Web Image Monitor.
9. Quit SmartDeviceMonitor for Admin.

• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

• p.117 "Using Web Image Monitor"

133
4. Monitoring and Configuring the Printer

Locking the Menus on the Machine's Control Panel

Follow the procedure below to lock the menus on the machine's control panel.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select a machine.
4 4. On the [Tools] menu, point to [Device Settings], and then click [System].

A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
5. Enter the login user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
The [System] page of Web Image Monitor appears.
6. On the [Protect Printer Display Panel], select [Level 1] or [Level 2].
7. Click [OK].
8. Click [Logout].
9. Quit Web Image Monitor.
10. Quit SmartDeviceMonitor for Admin.

• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

• p.117 "Using Web Image Monitor"

134
Using SmartDeviceMonitor for Admin

Changing the Paper Type

Follow the procedure below to change the paper type.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. In the list, select a machine whose configuration you want to change.
4. On the [Tools] menu, point to [Device Settings], and then click [Paper]. 4
A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
5. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
The [Paper] page appears.
Select a paper type in the [Paper Type] list for each tray. Enter required setting items.
6. Click [Logout].
7. Quit Web Image Monitor.
8. Quit SmartDeviceMonitor for Admin.

• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about setting items, see Help in the General Settings on Configuration page.

• p.117 "Using Web Image Monitor"

Managing User Information

Follow the procedure below to manage the user's information using SmartDeviceMonitor for Admin.
Prints jobs can be managed and functions restricted by user codes.

135
4. Monitoring and Configuring the Printer

Starting User Management Tool


Follow the procedure below to start User Management Tool.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. In the list, select a machine you want to manage.

4 4. On the [Tools] menu, click [User Management Tool].

A Web browser opens and the window for entering the login user mane and password for the Web
Image Monitor administrator appears.
5. Enter the user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
User Management Tool starts.

• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about User Management Tool, see SmartDeviceMonitor for Admin Help.

Displaying the Number of Sheets Printed


Follow the procedure below to display the number of sheets printed under each user.

1. Start SmartDeviceMonitor for Admin User Management Tool.

136
Using SmartDeviceMonitor for Admin

2. Click the [User Counter Information] tab of User Management Tool.

The number of pages printed under each user appears.


3. Click [Exit] on the [File] menu to quit User Management Tool. 4
Exporting the information about the number of pages printed
Follow the procedure below to export the information of the number of pages printed under each user as
a .csv file.

1. Start SmartDeviceMonitor for Admin User Management Tool.


2. Click the [User Counter Information] tab of User Management Tool.
3. On the [File] menu, click [Export User Statistics List].

4. Specify the save location and file name, and then click [Save].
5. Click [Exit] on the [File] menu to quit User Management Tool.

Resetting the number of pages printed to 0.


Follow the procedure below to reset the number of pages printed under each user to 0.

1. Start SmartDeviceMonitor for Admin User Management Tool.


2. Click the [User Counter Information] tab of User Management Tool.
3. Select the user whose information you want to reset.

137
4. Monitoring and Configuring the Printer

4. On the [Edit] menu, click [Reset User Counters].

5. Select the check box of the items you want to reset, and then click [OK].
A confirmation message appears.
6. Click [OK].
The count for the selected paper type becomes 0 and [Modified] is displayed for [Status].
7. On the [Edit] menu, click [Apply Settings].

Changes are applied to information on the User Counter Information tab.


8. Click [Exit] on the [File] menu to quit User Management Tool.

138
Using SmartDeviceMonitor for Admin

Restricting Functions
Follow the procedure below to restrict use of individual functions.

1. Start SmartDeviceMonitor for Admin User Management Tool.


2. Click the [User Counter Information] tab of User Management Tool.
3. Click the user whose functions you want to restrict.
4. On the [Edit] menu of User Management Tool, click [Restrict Access To Device].

5. Select the check box of the functions you want to restrict.


6. Click [OK].
A confirmation message appears.
7. Click [Yes].
The settings are applied.
8. Click [Exit] on the [File] menu to quit User Management Tool.

Setting Applicable Functions to New Users


Follow the procedure below to add new users and set functions applicable to them.

1. Start SmartDeviceMonitor for Admin User Management Tool.

139
4. Monitoring and Configuring the Printer

2. Click the [Access Control List] tab of User Management Tool.

3. On the [Edit] menu, click [Add New User].


4

4. Enter the user code and user name.


5. Select the check box of the functions applicable to the new user.
If the check boxes are unavailable, there is no restriction to use that function.
6. Click [OK].
The user is added, and [New] is displayed for [Status].
7. On the [Edit] menu, click [Apply Settings].
The settings are applied.
8. Click [Exit] on the [File] menu to quit User Management Tool.

• For details about setting restrictions, see SmartDeviceMonitor for Admin Help.

140
Using SmartDeviceMonitor for Admin

Configuring Energy Save Mode

Follow the procedure below to configure Energy Save mode.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select the machine whose settings you want to make.
To make settings for all machines in the selected group, select no machine. 4
4. Click the [Group] menu, point to [Energy Save Mode], [Set Individually], and then click
[On].

To select all the machines in the group, select [Set By Group].


To disable Energy Save mode, click [Off].
5. Quit SmartDeviceMonitor for Admin.

• For details about the setting for Energy Save mode, see SmartDeviceMonitor for Admin Help.

Setting a Password

Follow the procedure below to set a password.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.

141
4. Monitoring and Configuring the Printer

Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. In the list, select a machine whose configuration you want to change.
4. On the [Tools] menu, click [NIB Setup Tool].

4 A Web browser opens and the dialog box for entering the login user name and password for the
Web Image Monitor administrator appears.
NIB Setup Tool starts when the network interface board is default. Follow the instructions on the screen.
5. Enter the login user name and password, and then click [Login].
For details about the user name and password, consult your network administrator.
6. Click [Configuration].
7. Click [Program/Change Administrator] on the [Device Settings] area, and then change the
settings.
8. Click [OK].
9. Click [Logout].
10. Quit Web Image Monitor.
11. Quit SmartDeviceMonitor for Admin.

• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

Checking the Machine Status

Follow the procedure below to check machine status.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using TCP/IP SNMP v3, enter the user authentication.

142
Using SmartDeviceMonitor for Admin

3. Click the [View] menu, and then click [Select Device List Columns].
4. From [Device] in the [Select Device List Columns] dialog box, select the items you want to
display, and then click [Add].
Selected items will move to [Show].
5. Move all the items you want to display, and then click [OK].
An icon in the list indicates the machine's status.
6. For information about a machine's status, select the machine you want to know about, and
then click [Open] in the [Device Settings] menu.
The dialog box of the selected machine appears.
7. Click the application whose status you want to view.
The machine's status is displayed. 4
8. Quit SmartDeviceMonitor for Admin.

• For details about items in the dialog box, see SmartDeviceMonitor for Admin Help.

Changing Name and Comment

Follow the procedure below to change the name and comment for the machine.

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select a machine in the list, and then click [NIB Setup Tool] on the [Tools] menu.
A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
NIB Setup Tool starts when the network interface board is default. Follow the instructions on the screen.
4. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
5. Click [Configuration].
6. Click [System] on the [Device Settings] area, and then change the settings.
7. Click [OK].
8. Click [Logout].

143
4. Monitoring and Configuring the Printer

9. Quit Web Image Monitor.


10. Quit SmartDeviceMonitor for Admin.

• In the [Device Name] box, enter a device name on the machine using up to 31 characters.
• In the [Comment] box, enter a comment on the machine using up to 31 characters.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

4 • p.117 "Using Web Image Monitor"

Load Fax Journal

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select a machine in the list, and then click [Load Fax Journal] on the [Tools] menu.
A Web browser opens and the window for entering the login user name and password for the Web
Image Monitor administrator appears.
4. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
[Fax Journal] area appears in the Web Image Monitor.
5. Click [Logout].
6. Quit Web Image Monitor.
7. Quit SmartDeviceMonitor for Admin.

• For details, see Help in Fax Journal area.


• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

144
Using SmartDeviceMonitor for Admin

• p.117 "Using Web Image Monitor"

Viewing and Deleting Spool Print Jobs

1. Start SmartDeviceMonitor for Admin.


2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication. 4
3. Select a machine in the list, and then click [Spool Printing Job List(Printer)] on the [Tools]
menu.
A Web browser opens and the dialog box for entering the login user name and password for the
Web Image Monitor administrator appears.
4. Enter the login user name and password, and then click [Login].
For details about the login user name and password, consult your network administrator.
[Spool Printing Job List] appears in the Web Image Monitor.
5. Click [Logout].
6. Quit Web Image Monitor.
7. Quit SmartDeviceMonitor for Admin.

• To display Spool Printing Job List, [Spool Printing] must be set to [Active] on Web Image Monitor in
advance.
• To delete the Spool Printing Job, select the document you want to delete and then click [Delete].
• For details, see Help in the [Spool Printing Job List] area.
• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

• p.117 "Using Web Image Monitor"

Managing Address Information

1. Start SmartDeviceMonitor for Admin.

145
4. Monitoring and Configuring the Printer

2. On the [Group] menu, point to [Search Device], and then click [IPv4], [IPX/SPX] or [IPv4
SNMPv3].
A list of machines using the selected protocol appears.
Select the protocol of the machine whose configuration you want to change.
If you are using IPv4 SNMPv3, enter the user authentication.
3. Select a machine in the list, and then click [Address Management Tool] on the [Tools] menu.
The dialog box for entering the login user name and password appears.
4. Enter the login user name and password, and then click [OK].
For details about the login user name and password, consult your network administrator.
[Address Management Tool] starts. Make the necessary settings.
4 5. Click [Exit].
6. Quit SmartDeviceMonitor for Admin.

• For details, see Address Management Tool Help.


• For details about login user names and passwords, see Security Reference, which is the administrator's
manual.

146
Using SmartDeviceMonitor for Client

Using SmartDeviceMonitor for Client


To view the status of machines using SmartDeviceMonitor for Client, configure SmartDeviceMonitor for
Client beforehand.

Monitoring Printers

Follow the procedure below to monitor the machine using SmartDeviceMonitor for Client.

1. Right-click the SmartDeviceMonitor for Client icon, point to [Properties], and then click
[Monitor Device Settings...].
4

The [SmartDeviceMonitor for Client - Options] dialog box appears.


2. On the [Printers Folder] tab, select the machine you want to monitor, and then select the [To
Be Monitored] check box in the Monitoring Information Settings area.

To display the machine status on the task bar, you must first select the [To be Monitored] check box,
and then select the [Displayed on Task Bar] check box.
3. Click [OK].
The dialog box closes and the configured machine is monitored.

147
4. Monitoring and Configuring the Printer

• For details about status icons, see SmartDeviceMonitor for Client Help.

Checking the Machine Status

Follow the procedure below to check machine status using SmartDeviceMonitor for Client.

1. Right-click the SmartDeviceMonitor for Client icon, and then click the machine.

The machine status appears in the dialog box.

• For details about items in the dialog box, see SmartDeviceMonitor for Client Help.

When Using IPP with SmartDeviceMonitor for Client

When using IPP with SmartDeviceMonitor for Client, note the following:
• The network printer can only receive one print job from SmartDeviceMonitor for Client at a time. While
the network printer is printing, another user cannot access it until the job is finished. In this case,
SmartDeviceMonitor for Client tries to access the network printer until the retry interval expires.
• If SmartDeviceMonitor for Client cannot access the network printer and times out, it will stop sending
the print job. In this case, you should cancel the paused status from the print queue window.
SmartDeviceMonitor for Client will resume access to the network printer. You can delete the print job
from the print queue window, but canceling a print job printed by the network printer might cause the
next job sent from another user to be incorrectly printed.
• If a print job sent from SmartDeviceMonitor for Client is interrupted and the network printer cancels
the job because something went wrong, send the print job again.
• Print jobs sent from another computer do not appear in the print queue window, regardless of protocol.
• If various users send print jobs using SmartDeviceMonitor for Client to network printers, the printing
order might not be the same as that in which the jobs were sent.
• An IP address cannot be used for the IPP port name because the IP address is used for the
SmartDeviceMonitor for Client port name.

148
Using SmartDeviceMonitor for Client

• When setting SSL, a protocol for encrypted communication, under environment which server
authentication is issued, enter “https://( machine's IP address or host name)/ ”. Internet Explorer
must be installed on your computer. Use the highest version. Internet Explorer 6.0 or higher is
recommended.
• If the [Security Alert] dialog box appears when accessing the machine using IPP to create or configure
an IPP port, or when printing, install the certificate. To select the certificate store location when using
Certificate Import Wizard, click [Place all certificates in the following store], and then click [Local
Computer] under [Trusted Root Certification Authorities].

• For details about SSL settings, consult your network administrator.

149
4. Monitoring and Configuring the Printer

Printer Status Notification by E-Mail


Whenever a paper tray becomes empty or paper is jammed, an e-mail alert is issued to the registered
addresses to notify the printer status.
For this notification, you can make the e-mail notification settings.
Notification timing and e-mail content can be set.

• Depending on your e-mail application, a phishing warning might appear after you receive an e-mail
message. To prevent phishing warnings appearing after you receive e-mail from a specified sender,
you must add the sender to your e-mail application's exclusion list. For details about how to do this,
4 see your e-mail application's Help.
The e-mail notification functions you can set are as follows:
• Auto e-mail notification
Information including the machine status is automatically sent by e-mail. Before you use this function,
register the e-mail address to be used.
• On-demand e-mail notification
Information including the machine status is sent by e-mail when a request from the administrator is
received.
The information that can be notified by auto e-mail notification is as follows:
• Call Service
• Out of Toner
• Toner Almost Empty
• Paper Misfeed
• Cover Open
• Out of Paper
• Unit Connection Error
• File Storage Memory Full Soon
• Log Error
• Device Access Violation
• Replacement Required: Unit
• Replacement Required Soon: Unit

1. Log on to Web Image Monitor in administrator mode.


2. In the menu area, click [Configuration].
3. Click [E-mail] on the [Device Settings] area.

150
Printer Status Notification by E-Mail

4. Make the following settings:


• Items in the Reception column: Make the necessary settings for sending and receiving e-mail.
• Items in the SMTP column: Configure the SMTP server. Check your mailing environment, and
then specify the necessary items. You can also perform mail authentication for the SMTP server.
• Items in the POP before SMTP column: Configure the POP server. Check your mailing
environment, and then specify the necessary items. You can also perform mail authentication for
the POP server.
• Items in the POP3/IMAP4 column: Configure the POP3 or IMAP4 server. Check your mailing
environment, and then specify the necessary items.
• Items in the E-mail Communication Port column: Configure the port to be used for access to the
mail server.
• Items in the Fax E-mail Account
4
• Fax E-Mail Account column: Specify these items if you want to use on-demand e-mail notification.
• Items in the E-mail Notification Account column: Specify these items If you want to use e-mail
notification.
5. Click [OK].
6. Click [Logout].
7. Quit Web Image Monitor.

• For details about login user name and password, see Security Reference, which is the administrator's
manual.
• For details about the settings, see Web Image Monitor Help.
• For details about Web Image Monitor, see “Using Web Image Monitor”.

• p.117 "Using Web Image Monitor"

Setting the Account for E-mail Notification

Before you use Auto E-mail Notification or On-demand E-mail notification, setup an e-mail account to be
used for the function. Perform the following configuration task in Web Image Monitor.

1. Log on to Web Image Monitor in administrator mode.


2. Click [Configuration] in the menu area, and then click [E-mail] on the [Device Settings] area.
3. Make the following settings in E-mail Notification Account:
• E-mail Notification E-mail Address: Enter the address using alphanumeric characters.
• Receive E-mail Notification: Specify whether to use on-demand e-mail notification.

151
4. Monitoring and Configuring the Printer

• E-mail Notification User Name: Enter the administrator's user name as the mail originator name.
• E-mail Notification Password: Enter the password of the mail notification user.
4. Click [OK].
5. Click [Logout].
6. Quit Web Image Monitor.

• The user name and e-mail address that is already registered as e-mail destination cannot be specified
as the recipient of e-mail notification.

Mail Authentication
4
You can configure mail authentication to prevent illegal use of the mail server.
SMTP Authentication
Specify SMTP authentication.
When mail is sent to the SMTP server, authentication is performed using the SMTP AUTH protocol by
prompting the mail originator to enter the user name and password. This prevents illegal use of the
SMTP server.
1. Log on to Web Image Monitor in administrator mode.
2. Click [Configuration] in the menu area, and then click [E-mail] on the [Device Settings] area.
3. Make the following settings in SMTP column:
• SMTP Server Name: Enter the IP address or host name of the SMTP server
• SMTP Port No.: Enter the port number used when sending e-mail to the SMTP server.
• SMTP Authentication: Enable or disable SMTP authentication.
• SMTP Auth. E-mail Address: Enter the e-mail address.
• SMTP Auth. User Name: Enter the SMTP account name.
• SMTP Auth. Password: To set or change the password for SMTP AUTH.
• SMTP Auth. Encryption: Select whether to encrypt the password or not.
Encryption-Auto Select: If the authentication method is PLAIN, LOGIN, CRAM-MD5, or
DIGEST-MD5.
Encryption-Active: If the authentication method is CRAM-MD5 or DIGEST-MD5.
Encryption-Inactive: If the authentication method is PLAIN or LOGIN.
4. Click [OK]
5. Click [Logout].
6. Quit Web Image Monitor.

152
Printer Status Notification by E-Mail

POP before SMTP Authentication


Select whether to log on to the POP3 server before sending e-mail.
1. Log on to Web Image Monitor in administrator mode.
2. Click [Configuration] in the menu area, and then click [E-mail] on the [Device Settings] area.
3. Make the following settings in POP before SMTP column:
• POP before SMTP: Enable or disable POP before SMTP.
• POP E-mail Address: Enter the e-mail address.
• POP User Name: Enter the POP account name.
• POP Password: To set or change the POP password.
• Timeout setting after POP Auth.: Enter the time available before connecting to the SMTP
server after logging on to the POP server. 4
4. Click [OK].
5. Click [Logout].
6. Quit Web Image Monitor.

Auto E-mail Notification

1. Log on to Web Image Monitor in administrator mode.


2. Click [Configuration] in the menu area, and then click [Auto E-mail Notification] on the
[Device Settings] area.
The dialog box for making notification settings appears.
3. Make the following settings:
• Notification Message: You can set this according to your needs, for example, the machine's
location, service representative contact information.
• Items in the Groups to Notify column: E-mail notification addresses can be grouped as required.
• Items in the Select Groups/Items to Notify column: Select groups for each notification type, such
as machine status and error.
To make detailed settings for these items, click [Edit] next to [Detailed Settings of Each Item].
4. Click [OK].
5. Click [Logout].
6. Quit Web Image Monitor.

• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about the settings, see Web Image Monitor Help.

153
4. Monitoring and Configuring the Printer

• p.117 "Using Web Image Monitor"

On-demand E-mail Notification

1. Log on to Web Image Monitor in administrator mode.


2. Click [Configuration] in the menu area, and then click [On-demand E-mail Notification] on
the [Device Settings] area.
The dialog box for making notification settings appears.
3. Make the following settings:
4 • Notification Subject: Enter a text string to be added to the subject line of return e-mails.
• Notification Message: You can set this according to your needs, for example, the machine's
location, service representative contact information.
• Restriction to Device Status Info.: Select whether or not to allow access to the information such
as the machine settings and status.
• Items in the Receivable E-mail Address/Domain Name Settings column: Enter an e-mail address
or domain name to use for requesting information by e-mail and to receive its return e-mail.
4. Click [OK].
5. Click [Logout].
6. Quit Web Image Monitor.

• For details about Web Image Monitor, see “Using Web Image Monitor”.
• For details about the settings, see Web Image Monitor Help.

• p.117 "Using Web Image Monitor"

Format of On-demand E-mail Messages

To use mail notification, you need to send an on-demand e-mail message to this machine.
Using your mail software, enter the following:

Item Description

Subject (Referred to as Subject) Enter “requeststatus”.

154
Printer Status Notification by E-Mail

Item Description

From (Referred to as From) Specify a valid mail address. The device


information will be sent to the address specified
here.

• A mail message must be within 1 MB in size.


• E-mail may be incomplete if sent immediately after power on.
• The subject is not case sensitive.
• The body of a request e-mail has no meaning. Any text written in the e-mail body is ignored.
4

155
4. Monitoring and Configuring the Printer

Remote Maintenance by telnet

• Remote Maintenance should be protected so that access is allowed to administrators only.


• The password is the same as the one of Web Image Monitor administrator. When the password is
changed using “mshell”, other's change also.

Using telnet

Follow the procedure below to use telnet.


4
• Only one user at a time can log on to perform remote maintenance.
• If you are using Windows Vista, you must enable the telnet server and telnet client beforehand.

1. Use the IP address or the host name of the machine to start telnet.
% telnet “IP address”
2. Enter your user name and password.
For details about the user name and password, consult your network administrator.
For user authentication, enter a login user name and password.
For user code authentication, enter a user code in User Name.
3. Enter a command.
4. Quit telnet.
msh> logout
The configuration message about saving the changes appears.
5. Enter “yes” to save the changes, and then press the [Enter] key.
If you do not want to save the changes, enter “no”, and then press the [Enter] key. To make further
changes, enter “return” at the command line, and then press the [Enter] key.

• If the message “Can not write NVRAM information” appears, the changes are not saved. Repeat the
procedure above.
• When the changes are saved, the network interface board is reset automatically with that changes.
• When the network interface board resets, the print job in print process will be printed. However, print
jobs in queue will be canceled.

156
Remote Maintenance by telnet

8021x

Use the "8021x" commands to display IEEE 802.1x related information.


View settings
msh> 8021x
Configuration
msh> 8021x "parameter"

Parameter Value configured

eap {tls|ttls|leap|peap} {chap| You can specify the EAP authentication type.
mschap|mschapv2|pap|md5| tls: EAP-TLS (default) 4
tls}
ttls: EAP-TTLS
leap: LEAP
peap: PEAP
chap, mschap, mschapv2, pap, md5, or tls are settings for
the phase 2 method, and must be set when using EAP-TTLS
or PEAP.
Do not make these settings when using other EAP
authentication types.
If you select EAP-TTLS, you can select chap, mschap,
mschapv2, pap, or md5.
If you select PEAP, you can select mschapv2 or tls.

username "character string" You can specify the login user name for the Radius server.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.

username2 "character string" You can specify the phase 2 username for EAP-TTLS/PEAP
phase 2 authentication.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.

domain name "character string" You can specify the login domain name for the Radius server.
The characters you can enter are ASCII 0x20-0x7e (31
bytes), but not "@" or "\".
The default is blank.

password "character string" You can specify the login for the Radius server.

157
4. Monitoring and Configuring the Printer

Parameter Value configured


Usable characters: ASCII 0x20-0x7e (128 bytes). The
default is blank.

srvcert {on|off} You can set the server certificate. The default is "off".

imca {on|off} You can enable or disable the certificate when the
intermediate certificate authority is present. The default is
"off".

srvid "character string" You can set the server ID and subdomain of the certificate
server.

4 Usable characters: ASCII 0x20-0x7e (128 bytes). The


default is blank.

subdomain {on|off} You can specify the subdomain permission.

clear {a each command|all} Returns the selected setting to its default value.
If you specify "all", all settings will be restored to their default
values. However, IEEE 802.1x Auth. status (enable or
disable) for Ethernet and wireless LAN will not be initialized.

access

Use the “access” command to view and configure access control. You can also specify two or more access
ranges.
View settings
msh> access
IPv4 configuration display
msh> access ID range
IPv6 configuration display
msh> access ID range6
IPv6 access mask configuration display
msh> access ID mask6
IPv4 configuration
msh> access ID range “start-address end-address”
Example: to specify accessible IPv4 addresses between 192.168.0.10 and 192.168.0.20:
msh> access 1 range 192.168.0.10 192.168.0.20

158
Remote Maintenance by telnet

IPv6 configuration
msh> access ID range6 “start-address end-address”
Example: to specify accessible IPv6 addresses between 2001:DB8::100 and 2001:DB8::200.
msh> access 1 range6 2001:DB8::100 2001:DB8::200
IPv6 access mask configuration
msh> access ID mask6 “base-address prefixlen”
Example: to specify accessible IPv6 addresses to 2001:DB8::/32
msh> access 1 mask6 2001:DB8:: 32
Access control initialization
msh> access flush
• Use the “flush” command to restore the default settings so that all access ranges become
4
“0.0.0.0” for IPv4, and “::” for IPv6.

• You can specify each IPv6 entry by either range or mask. For the range parameter, you can select
“start-address end-address”. For the mask parameter, you can select “base-address prefixlen”.
• The access range restricts computers from use of the machine by IP address. If you do not need to
restrict printing, make the setting “0.0.0.0” for IPv4, and “::” for IPv6.
• Valid ranges must be from lower (start address) to higher (end address).
• For IPv4 and IPv6, you can select an ID number between 1 and 5.
• IPv6 can register and select the range and the mask for each access ranges.
• IPv6 mask ranges between 1 - 128 can be selected.
• Up to five access ranges can be specified. The entry is invalid if the target number is omitted.
• You cannot send print jobs, or access Web Image Monitor and diprint from a restricted IP address.

appletalk

Use the “appletalk” command to view and configure AppleTalk parameters.


View settings
msh> appletalk
• [2] means “active” and [0] means “inactive”.
• The default is [2].
Changing PAP timeout configuration
msh> appletalk ptimeout value > 0
• Timeout value becomes effective.

159
4. Monitoring and Configuring the Printer

msh> appletalk ptimeout value = 0


• Timeout value becomes ineffective.

authfree

Use the "authfree" command to view and configure AuthFree parameters.


View settings
The following command displays the current AuthFree settings:
msh> authfree
• If print job authentication exclusion is not set, authentication exclusion control cannot be
4 displayed.
IPv4 address settings
msh> authfree "ID" range_addr1 range_addr2
IPv6 address settings
msh> authfree "ID" range6_addr1 range6_addr2
IPv6 address mask configuration
msh> authfree "ID" mask6_addr1 masklen
Parallel/USB settings
msh> authfree [parallel | usb] [on|off]
• To enable authfree, set to on. To disable authfree, set to off. Always specify the interface.
Authentication exclusion control initialization
msh> authfree flush

autonet

Use the “autonet” command to configure AutoNet parameters.


View settings
The following command displays the current AutoNet settings:
msh> autonet
Configuration
You can configure AutoNet settings.
msh> autonet {on|off}
• {on} means “active” and {off} means “inactive”.

160
Remote Maintenance by telnet

Current interface priority configuration display


msh> autonet priority
Interface priority configuration
msh> autonet priority “interface_name”
• You can give interface's AutoNet parameter priority.
• Priority settings are available when multiple interfaces are installed.
• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface


4

• If an interface is not selected, the current interface connection settings remain in effect.
• For details about AutoNet, refer to autonet parameters.

bonjour

Use the “bonjour” command to display Bonjour-related settings.


View settings
Bonjour settings are displayed.
msh> bonjour
Bonjour service name setting
You can specify the Bonjour service name.
msh> bonjour cname “computer name”
• The computer name can be entered using up to 63 alphanumeric characters.
• If you do not specify a character string, the current setting is displayed.
Bonjour Installation location information setting
You can enter information about the location where the printer is installed.
msh> bonjour location “location”
• Information about location can be entered using up to 32 alphanumeric characters.
• If you do not specify a character string, current setting is displayed.
Setting order of priority for each protocol
• msh> bonjour diprint [0-99]

161
4. Monitoring and Configuring the Printer

• msh> bonjour lpr [0-99]


• msh> bonjour ipp [0-99]
You can specify the order of priority for “diprint”, “lpr”, and “ipp”. Smaller numbers indicate higher
priority.
IP TTL setting
msh> bonjour ip ttl [1-255]
You can specify the IP TTL (the number of routers a packet can pass through).
• The default is 255.
Resetting the computer name and location information
You can reset the computer name and location information.
4 msh> bonjour clear {cname|location}
• cname: Reset the computer name. The default computer name will be displayed when the
computer is restarted.
• location: Reset the location information. The previous location information will be deleted.
Interface configuration
msh> bonjour linklocal “interface_name”
• If you do not specify an interface, the Ethernet interface is selected automatically.
• If many types of interface are installed, configure the interface that communicates with linklocal
address.
• If you do not specify an interface, the Ethernet interface is automatically selected.
• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

Setting IPP-SSL printing


msh> bonjour ippport {ipp|ssl}
• If IPP-SSL Printing is set to ssl, the IPP port number will appear as 443, and IPP-SSL printing can
be performed with higher security.
• If IPP-SSL Printing is set to ipp, the IPP port number will appear as 631. Port 631 is the port for
normal IPP printing.

162
Remote Maintenance by telnet

devicename

Use the “devicename” command to display and change the printer name.
View settings
msh> devicename
Printer name configuration
msh> devicename name “string”
• Enter a printer name using up to 31 alphanumeric characters.
• Set single names for each printer.
Printer name initialization
msh> devicename clear name
4
• Reset the printer name to its default.

dhcp

Use the “dhcp” command to configure DHCP settings.


View settings
The following command displays the current DHCP settings.
msh> dhcp
Configuration
You can configure DHCP.
msh> dhcp “interface_name” {on|off}
• Click {on} to enable dhcp. Click {off} to disable DHCP.
• If the DNS server address and domain name are obtained from DHCP, be sure to click {on}.
• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface name Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

Current interface priority configuration display


msh> dhcp priority
Interface priority configuration
msh> dhcp priority “interface_name”

163
4. Monitoring and Configuring the Printer

• You can select which interface has DHCP parameter priority.


• Priority settings are available when multiple interfaces are installed.
DNS server address selection
msh> dhcp dnsaddr {dhcp|static}
• Specify whether to obtain the DNS server address from the DHCP server or use the address set
by a user.
• To obtain the DNS server address from the DHCP server, specify “dhcp”. To use the address set
by a user, specify “static”.
Domain name selection
msh> dhcp domainname {dhcp|static}
4 • Specify whether to obtain the domain name from the DNS server or use the domain name set
by a user.
• To obtain the domain name from the DHCP server, specify “dhcp”. To use the domain name set
by a user, specify “static”.

• p.363 "Using DHCP"

dhcp6

Use the “dhcp6”command to display or configure DHCPv6 settings.


View settings
The following command displays the current DHCPv6 settings.
msh> dhcp6
DHCPv6-lite configuration and display
msh> dhcp6 “interface_name” lite {on|off}
Viewing and specifying DNS server address selection (obtained from the dhcpv6 server/user
specified value)
msh> dhcp6 dnsaddr {dhcp|static}
DUID(DHCP unique ID) deletion and display
msh> dhcp6 duid clear
Viewing and specifying the time required to re-obtain the parameter obtained from dhcpv6
msh> dhcp6 option lifetime [0-65535]
• It can be entered between 0 and 65535 minutes.
• The default is 60 minutes.
• If you specify "0", you cannot re-obtain the value.

164
Remote Maintenance by telnet

diprint

The direct printing port enables direct printing from a network-connected computer.
Use the “diprint” command to change direct printing port settings.
View settings
The following command displays the current direct printing port settings:
msh> diprint
Example output:
port 9100
timeout=300(sec)
bidirect on
4
conn multi
apl async
• The “port” specifies the port number of the direct printing port.
• The “bidirect” setting indicates whether the direct printing port is bidirectional or not.
Setting timeout
msh> diprint timeout [30-5535]
• You can specify the timeout interval to use when the printer is expecting data from the network.
• The default is 300 seconds.
• This command functions in conjunction with the “lpr” command.
Specifying the number of concurrent connections
msh> diprint conn {multi|single}
• The above command specifies the number of concurrent diprint connections. Specify “multi” for
multiple connections or “single” for a single connection.
• The default is “multi”.

dns

Use the “dns” command to configure or display DNS (Domain Name System) settings.
View settings
The following command displays current DNS settings:
msh> dns
IPv4 DNS server configuration
The following command enables or disables the IPv4 DNS server address:

165
4. Monitoring and Configuring the Printer

msh> dns “ID” server “server address”


The following command displays a configuration using the IP address 192.168.15.16 on a DNS 1
server:
msh> dns 1 server 192.168.15.16
• You can register IPv4 DNS Server address.
• You can select an ID number between 1 and 3. You can select up to three ID numbers.
• You cannot use “255.255.255.255” as the DNS server address.
IPv6 DNS server configuration
The following command enables or disables the IPv4 DNS server address:
msh> dns “ID” server6 “server address”
4 • You can register IPv6 DNS Server address.
• The selectable ID number is between 1 and 3. You can select up to 3 ID.
Dynamic DNS function setting
msh> dns “interface_name” ddns {on|off}
• You can set the dynamic DNS function “active” or “inactive”.
• {on} means “active” and {off} means “inactive”.
• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface name Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

Specifying the record overlap operation


msh> dns overlap {update|add}
• You can specify operations performed when records overlap.
• update: To delete old records and register new records.
• add: To add new records and store the old records.
• When CNAME overlaps, it is always changed, irrespective of settings.
CNAME registration
msh> dns cname {on|off}
• You can specify whether to register CNAME.
• {on} means “active” and {off} means “inactive”.
• The CNAME registered is the default name beginning with rnp. CNAME cannot be changed.

166
Remote Maintenance by telnet

A records registration
msh> dns arecord {dhcp|own}
• dhcp: You can specify the method of registering an A record when the dynamic DNS function
is enabled and DHCP is used.
• own: To register an A record using the printer as the DNS client.
The DNS server address and the domain name already designated are used for the registration.
Record updating interval settings
msh> dns interval [1-255]
• You can specify the interval after which records are updated when using the dynamic DNS
function.
• The updating interval is specified hourly. It can be entered between 1 and 255 hours. 4
• The default is 24 hours.
resolv.conf display
msh> dns resolv
Specifying the protocol when asking names during dual stacking
msh> dns resolv protocol {ipv4|ipv6}
• Appears during dual stacking only.

domainname

Use the “domainname” command to display or configure the domain name settings.
You can configure the Ethernet interface or IEEE 802.11 interface.
View settings
The following command displays the current domain name:
msh> domainname
Interface domain configuration
msh> domainname “interface_name”
Setting the Domain Name
msh> domainname “interface_name” name “domain name”
• A domain name can be entered using up to 63 alphanumeric characters.
• The Ethernet interface and IEEE 802.11 interface will have the same domain name.
• wlan can be specified only when the IEEE 802.11 interface is installed.

167
4. Monitoring and Configuring the Printer

Interface Interface set

ether Ethernet interface

wlan IEEE 802.11 interface

Deleting the Domain Name


msh> domainname “interface_name” clear name

etherauth

4 Use the "etherauth" command to display or modify the authentication related parameters for Ethernet.
View settings
msh> etherauth
802.1x Configuration
msh> etherauth 8021x {on|off}
• {on} means "active" and {off} means "inactive".

etherconfig

Use the "etherconfig" command to view and configure the Ethernet parameters.
View settings
msh> etherconfig
Specify Ethernet speed
msh> etherconfig speed {auto|10f|10h|100f|100h}
• auto = Auto Select
• 10f = 10 Mbps Full Duplex
• 10h = 10 Mbps Half Duplex
• 100f = 100 Mbps Full Duplex
• 100h = 100 Mbps Half Duplex
• The default is "auto".

help

Use the “help” command to display the available command list and the procedures for using those
commands.

168
Remote Maintenance by telnet

Command list display


msh> help
Display of procedure for using commands
msh> help “command_name”

hostname

Use the “hostname” command to change the printer name.


View settings
msh> hostname
IPv4 configuration 4
msh> hostname “interface_name” “printer_name”
• Enter the printer name using up to 63 alphanumeric characters.
• You cannot use a printer name beginning “RNP” (in either upper or lower case).
• The Ethernet interface and IEEE 802.11 interface will have the same printer name.
• wlan can be specified only when the IEEE 802.11 interface is installed.
• If you do not specify an interface, the Ethernet interface is selected automatically.

Interface name Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

Initializing the printer name for each interface


msh>hostname “interface_name” clear name

ifconfig

Use the “ifconfig” command to view and configure TCP/IP (IP address, subnet mask, broadcast address,
default gateway address) for the printer.
View settings
msh> ifconfig
IPv4 configuration
msh> ifconfig “interface_name” “parameter” “address”
• If you did not enter an interface name, it is automatically set to the Ethernet interface.

169
4. Monitoring and Configuring the Printer

• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface name Interface configured

ether Ethernet Interface

wlan IEEE 802.11 Interface

The following explains how to configure an IPv4 address 192.168.15.16 on Ethernet interface.
msh> ifconfig ether 192.168.15.16
IPv6 configuration
msh> ifconfig ether inet6 “interface_name” “printer_name”
4 The following explains how to configure a IPv6 address to 2001:DB8::100 with prefix length 64 on
the Ethernet interface.
msh> ifconfig ether inet6 2001:DB8::100 64
Netmask configuration
msh> ifconfig “interface_name” netmask “address”
The following explains how to configure a subnet mask 255.255.255.0 on Ethernet interface.
msh> ifconfig ether netmask 255.255.255.0
Broadcast address configuration
msh> ifconfig “interface_name” broadcast “address”
Changing the interface
msh> ifconfig “interface” up
• When using the optional IEEE 802.11 interface unit, you can specify either Ethernet or IEEE
802.11 interface.

• To get the above addresses, contact your network administrator.


• Use the default configuration if you cannot obtain setting addresses.
• The IP address, subnet mask and broadcast address are the same as that for the Ethernet interface
and IEEE 802.11 interface.
• TCP/IP configuration is the same for both Ethernet and IEEE 802.11 interface. If interfaces are
changed, the new interface inherits the configuration.
• Use “0x” as the initial two letters of a hexadecimal address.

info

Use the “info” command to display printer information such as paper tray, output tray, and printer language.

170
Remote Maintenance by telnet

Printer information display


msh> info

• p.196 "Getting Printer Information over the Network"

ipp

Use the “ipp” command to view and configure IPP settings.


Viewing settings
The following command displays the current IPP settings:
msh> ipp
4
IPP timeout configuration
Specify how many seconds the computer waits before canceling an interrupted print job. The time
can be entered between 30 to 65535 seconds.
msh> ipp timeout [30-65535]
IPP user authorization configuration
Use IPP user authorization to restrict users to print with IPP. The default is “off”.
msh> ipp auth {basic|digest|off}
• User authorization settings are “basic” and “digest”.
• If user authorization is specified, register a user name. You can register up to 10 users.
IPP user name configuration
Configure IPP users according to the following messages:
msh> ipp user
The following message appears:
msh> Input user number (1 to 10):
Enter the number, user name, and password.
msh> IPP user name:user1
msh> IPP :*******
After configuring the settings, the following message appears:
User configuration changed.

ipsec

Use the "ipsec" command to view and configure IPsec settings.

171
4. Monitoring and Configuring the Printer

Viewing settings
The following command displays the current IPsec settings:
msh> ipsec

• For details about displayed contents, see Security Reference.

ipv6

Use the “ipv6” command to display and configure IPv6 settings.


View settings
4 msh> ipv6
IPv6 stateless address
msh> ipv6 stateless {on|off}
If “on” is selected, IPv6 requests information required for maintaining stateful connection to the router
for as long as the printer power is turned on. This setting allows information from the router to be
obtained constantly, and periodically refreshes the effective period of the stateless address.

logout

Use the “logout” command to save the changes and quit telnet.
Quit telnet
msh> logout
A confirmation message appears.
{yes|no|return}
Enter [yes], [no] or [return] by typing the word, and then press the [Enter] key.
To save the changes and quit telnet, enter [yes].
To discard the changes and quit telnet, enter [no].
To continue making changes, enter [return]

lpr

Use the “lpr” command to view and configure LPR settings.


View settings
msh> lpr

172
Remote Maintenance by telnet

Checking host name when deleting the job


msh> lpr chkhost {on|off}
• The default is “on”.
If “on” is selected, you can delete print jobs only from the IP address of the host that sent the print job.
If LPR is disabled, you can also delete print jobs sent from IP addresses other than that of the host.
Printer Error Detection Function
lpr prnerrchk {on|off}
• The default is “off”.
If you set this to “on”, the printer stops receiving data and will wait until the error is resolved before
continuing processing a job.
4
netware

Use the “netware” command to view and configure the NetWare settings such as the print server name or
file server name.
NetWare Printer Server Names
msh> netware pnamecharacter string
• Enter the NetWare print server name using up to 47 characters.
NetWare File Server Names
msh> netware fname character string
• Enter the NetWare file server name using up to 47 characters.
Encap type
msh> netware encap {802.3|802.2|snap|ethernet2|auto}
Remote Printer Number
msh> netware rnum [0-254]
• The default is 0.
Timeout
msh> netware timeout [3-255]
• The default is 15.
Printer server mode
msh> netware mode pserver
msh> netware mode ps
Remote printer mode
msh> netware mode rprinter

173
4. Monitoring and Configuring the Printer

msh> netware mode rp


NDS context name
msh> netware context “character string”
SAP interval
msh> netware “sap_interval[0-3600]”
It can be entered between 0 and 3600 seconds.
Setting login mode for file server
msh> netware login server
Setting login mode for NDS tree
msh> netware login tree
4 Setting login mode for NDS tree name
msh> netware tree “NDS tree name”
File transfer protocol
msh> netware trans {ipv4pri|ipxpri|ipv4|ipx}
• If you do not specify the protocol, the current setting is displayed.

Protocol Set Protocol

ipv4pri IPv4+IPX(IPv4)

ipxpri IPv4+IPX(IPX)

ipv4 IPv4

ipx IPX

pathmtu

Use the “pathmtu” command to display and configure the PathMTU Discovery service function.
View settings
msh> pathmtu
Configuration
msh> pathmtu {on|off}
• The default is “on”.
• If the MTU size of the sent data is larger than the router's MTU, the router will declare it
impassable, and communication will fail. If this happens, selecting the “pathmtu” to “on”
optimizes the MTU size and prevents data output failure.

174
Remote Maintenance by telnet

• Depending on the environment, information might not be obtained from the router, and
communication will fail. If this happens, select the “pathmtu” to “off”.

prnlog

Use the “prnlog” command to obtain printer log information.


Print logs display
msh> prnlog
• Display previous print jobs.
msh> prnlog “ID Number”
• Specify the ID number of the displayed print log information to display additional details about 4
a print job.

• p.204 "Understanding the Displayed Information"

rhpp

Use the “rhpp” command to view and configure RHPP settings.


View settings
msh> rhpp
Changing rhpp port number
msh> rhpp [1024-65535]
• The default is 59100.
Setting timeout
msh> rhpp timeout [30-65535]
• The default is 300 seconds.

• “RHPP” is an abbreviation of “Reliable Host Printing Protocol”, which is a manufacturer-original


printing protocol.

route

Use the “route” command to view and control the routing table.
Specified route information display
msh> route get “destination”

175
4. Monitoring and Configuring the Printer

• Specify the IPv4 address to destination.


“0.0.0.0” cannot be specified as destination address.
Enabling/disabling specified IPv4 destination
msh> route active {host|net} “destination” {on|off}
• If you do not specify {host|net}, the host setting is automatically selected.
Adding IPv4 Routing Table
msh> route add {host|net} “destination” “gateway”
• Adds a host or network route to “destination”, and a gateway address to “gateway” in the table.
• Specify the IPv4 address to destination and gateway.

4 • If you do not specify {host|net}, the host setting is selected automatically.


• You cannot specify“0.0.0.0” as the destination address.
Setting the Default IPv4 Gateway
msh> route add default “gateway”
Deleting specified IPv4 destination from Routing Table
msh> route delete {host|net} “destination”
• If you do not specify {host|net}, the host setting is automatically selected.
• IPv4 address of destination can be specified.
Setting IPv6 Default Gateway
msh> route add6 default gateway
Adding a specified IPv6 destination to Routing Table
msh> route add6 “destination” “prefixlen[1-128]” “gateway”
• Specify the IPv6 address to destination and gateway.
• If the prefix of the address is between 1 and 127, the network is selected. If the prefix of the
address is 128, the host is selected.
• You cannot register a record that has the same destination and prefix as a registered record.
• You cannot register a record that uses “0000:0000:0000:0000:0000:0000:0000:0000” as
its destination.
Deleting a specified IPv6 destination from Routing Table
msh> route delete6 “destination” “prefixlen”
• Specify the IPv6 address to destination and gateway.
Display information about a specified IPv6 route information
msh> route get6 “destination”
• Specify the IPv6 address to destination and gateway.

176
Remote Maintenance by telnet

Enabling/disabling a specified IPv6 destination


msh> route active6 “destination” “prefixlen[1-128]” {on|off}
Route initialization
msh> route flush

• The maximum number of IPv4 routing tables is 16.


• The maximum number of IPv6 routing tables is 2.
• Set a gateway address when communicating with devices on an external network.
• The same gateway address is shared by all interfaces.
• “Prefixlen” is a number between 1 and 128.
4
set

Use the “set” command to set the protocol information display “active” or “inactive”.
View settings
The following command displays protocol information (active/inactive).
msh> set ipv4
msh> set ipv6
msh> set ipsec
msh> set appletalk
msh> set netware
msh> set smb
msh> set protocol
• When protocol is specified, information about TCP/IP, AppleTalk, NetWare and SMB appears.
msh> set lpr
msh> set lpr6
msh> set ftp
msh> set ftp6
msh> set rsh
msh> set rsh6
msh> set diprint
msh> set diprint6
msh> set web

177
4. Monitoring and Configuring the Printer

msh> set snmp


msh> set ssl
msh> set ssl6
msh> set nrs
msh> set rfu
msh> set rfu6
msh> set ipp
msh> set ipp6
msh> set http
msh> set http6
4 msh> set bonjour
msh> set bonjour6
msh> set nbt
msh> set ssdp
msh> set ssh
msh> set sftp
msh> set sftp6
msh> set wsdev
msh> set wsdev6
msh> set wsprn
msh> set wsscn
msh> set rhpp
msh> set rhpp6
Configuration
• Enter “up” to enable protocol, and enter “down” to disable protocol.
You can set the protocol to “active” or “inactive”.
msh> set ipv4 {up|down}
• If you disable IPv4, you cannot use remote access after logging off. If you did this by mistake,
you can use the control panel to enable remote access via IPv4.
• Disabling IPv4 also disables lpr, ftp, rsh, diprint, web, snmp, ssl, ipp, http, bonjour, wsdev, and
sftp.
msh> set ipv6 {up|down}
• If you disable IPv6, you cannot use remote access after logging off. If you did this by mistake,
you can use the control panel to enable remote access via IPv6.

178
Remote Maintenance by telnet

• Disabling IPv6 also disables lpr6, ftp6, rsh6, diprint6, ssl6, ipp6, http6, bonjour6, wsdev6, and
sftp6.
msh> set ipsec {up|down}
msh> set appletalk {up|down}
msh> set netware {up|down}
msh> set smb {up|down}
msh> set lpr {up|down}
msh> set lpr6 {up|down}
msh> set ftp {up|down}
msh> set ftp6 {up|down}
msh> set rsh {up|down} 4
msh> set rsh6 {up|down}
msh> set diprint {up|down}
msh> set diprint6 {up|down}
msh> set web {up|down}
msh> set snmp {up|down}
msh> set ssl {up|down}
msh> set ssl6 {up|down}
• If Secured Sockets Layer (SSL, an encryption protocol) function is not available for the printer,
you cannot use the function by enabling it.
msh> set nrs {up|down}
msh> set rfu {up|down}
msh> set rfu6 {up|down}
msh> set ipp {up|down}
msh> set ipp6 {up|down}
msh> set http {up|down}
msh> set http6 {up|down}
msh> set bonjour {up|down}
msh> set bonjour6 {up|down}
msh> set ssh {up|down}
msh> set ssdp {up|down}
msh> set nbt {up|down}
msh> set sftp {up|down}
msh> set sftp6 {up|down}

179
4. Monitoring and Configuring the Printer

msh> set wsdev {up|down}


msh> set wsdev6 {up|down}
• If “wsdev” and “wsdev6” are enabled simultaneously, both appear as “up” on the protocol
information display, but both use IPv4 for WSD (Device), WSD (Printer) and WSD (Scanner).
msh> set wsprn {up|down}
msh> set wsscn {up|down}
msh> set rhpp {up|down}
msh> set rhpp6 {up|down}

show
4
Use the “show” command to display network interface board configuration settings.
View settings
msh> show
• If “-p” is added, you can view settings one by one.

• p.204 "Understanding the Displayed Information"

slp

Use the “slp” command to view and configure SLP settings.


msh> slp ttl “ttl_val[1-255]”
• You can search the NetWare server using SLP in the PureIP environment of NetWare 5/5.1. Using
the “slp” command, you can configure the value of TTL which can be used by SLP multicast packet.
• The default value of TTL is 1. A search is executed only within a local segment. If the router does not
support multicast, the settings are not available even if the TTL value is increased.
• The acceptable TTL value is between 1 and 255.

smb

Use the “smb” command to configure or delete the computer or workgroup name for SMB.
Computer name settings
msh> smb comp “computer name”
• Set computer name using up to 15 characters.
• Names beginning with “RNP” or “rnp” cannot be entered.

180
Remote Maintenance by telnet

Working group name settings


msh> smb group “work group name”
• Set workgroup name using up to 15 characters.
Comment settings
msh> smb comment “comment”
• Set comment using up to 31 characters.
Notify print job completion
msh> smb notif {on|off}
• To notify print job completion, specify “on”. Otherwise, specify “off”.
Deleting computer name
msh> smb clear comp
4
Deleting group name
msh> smb clear group
Deleting comment
msh> smb clear comment
View protocol
msh> smb protocol

snmp

Use the “snmp” command to display and edit SNMP configuration settings such as the community name.
View settings
msh> snmp
• Default access settings 1 is as follows:
Community name:public
IPv4 address:0.0.0.0
IPv6 address:::
IPX address:00000000:000000000000
Access type:read-only
Effective Protocol:IPv4/IPv6/IPX
• Default access settings 2 is as follows:
Community name:admin
IPv4 address:0.0.0.0
IPv6 address:::

181
4. Monitoring and Configuring the Printer

IPX address:00000000:000000000000
Access type:read-write
Effective Protocol:IPv4/IPv6/IPX
• If “-p” is added, you can view settings one by one.
• To display the current community, specify its registration number.
Display
msh> snmp ?
Community name configuration
msh> snmp “number” name “community_name”

4 • You can configure ten SNMP access settings numbered 1-10.


• The printer cannot be accessed from SmartDeviceMonitor for Admin or SmartDeviceMonitor for
Client if “public” is not registered in numbers 1-10. When changing the community name, use
SmartDeviceMonitor for Admin and SNMP Setup Tool to correspond with printer settings.
• The community name can be entered using up to 15 characters.
Deleting community name
msh> snmp “number” clear name
Access type configuration
msh> snmp “number” type “access_type”

Access type Type of access permission

no not accessible

read read only

write read and write

trap user is notified of trapmessages

Protocol configuration
Use the following command to set protocols “active” or “inactive”: If you set a protocol “inactive”,
all access settings for that protocol are disabled.
msh> snmp {ipv4|ipv6|ipx} {on|off}
• Specify “ipv4” for IPv4, “ipv6” for IPv6, or “ipx” for IPX/SPX.
• {on} means “active” and {off} means “inactive”.
• All protocols cannot be turned off concurrently.
Configuration of protocol for each registration number
msh> snmp “number” active {ipv4|ipv6|ipx} {on|off}

182
Remote Maintenance by telnet

• To change the protocol of access settings, use the following command. However, if you have
disabled a protocol with the above command, activating it here has no effect.
Access configuration
msh> snmp “number” {ipv4|ipv6|ipx} “address”
• You can configure a host address according to the protocol used.
• The network interface board accepts requests only from hosts that have IPv4, IPv6, and IPX
addresses with access types of “read-only” or “read-write”. Enter “0” to have network interface
board accept requests from any host without requiring a specific type of access.
• Enter a host address to deliver “trap” access type information to.
• To specify IPv4 or IPv6, enter “ipv4” or “ipv6” followed by a space, and then the IPv4 or IPv6
address.
• To specify IPX/SPX, enter “ipx” followed by a space, the IPX address followed by a decimal,
4
and then the MAC address of the network interface board.
sysLocation configuration
msh> snmp location
Deleting sysLocation
msh> snmp clear location
sysContact setting
msh> snmp contact
Deleting sysContact
msh> snmp clear contact
SNMP v1v2 function configuration
msh> snmp v1v2 {on|off}
• Specify “on” to enable, and “off” to disable.
SNMP v3 function configuration
msh> snmp v3 {on|off}
• Specify “on” to enable, and “off” to disable.
SNMP TRAP configuration
msh> snmp trap{v1|v2|v3} {on|off}
• Specify “on” to enable, and “off” to disable.
Remote Configuration Authorization configuration
msh> snmp remote {on|off}
• Specify “on” to enable, and “off” to disable the SNMP v1v2 setting.

183
4. Monitoring and Configuring the Printer

SNMP v3 TRAP configuration display


msh> snmp v3trap
msh> snmp v3trap [1-5]
• If a number from 1 to 5 is entered, settings are displayed for that number only.
Configuring a sending address for SNMP v3 TRAP
msh> snmp v3trap [1-5] {ipv4|ipv6|ipx} “address”
Configuring a sending protocol for SNMP v3 TRAP
msh> snmp v3trap [1-5] active {ipv4|ipv6|ipx} {on|off}
Configuring a user account for SNMP v3 TRAP
msh> snmp v3trap [1-5] account “account_name”
4 • Enter an account name using up to 32 alphanumeric characters.
Deleting an SNMP v3 TRAP user account
msh> snmp v3trap [1-5] clear account
Configuring an SNMP v3 encryption algorithm
msh> snmp v3auth {md5|sha1}
Configuring SNMP v3 encryption
msh> snmp v3priv {auto|on}
• Set “auto” for automatic encryption configuration.
• If you select “on”, plain-text communication becomes impossible - only encrypted
communication is possible.

• “Encrypted communication” means an encrypted password is set on the machine.

sntp

The printer clock can be synchronized with a NTP server clock using Simple Network Time Protocol (SNTP).
Use the “sntp” command to change SNTP settings.
View settings
msh> sntp
NTP IPv4 server address configuration
You can specify the IPv4 address of the NTP server.
msh> sntp server “IPv4_address”
NTP hostname configuration
You can specify the hostname of the NTP server.

184
Remote Maintenance by telnet

msh> sntp server “hostname”


Deleting NTP server configuration
msh> sntp server clear
Interval configuration
msh> sntp interval “polling_time”
• You can specify the interval at which the printer synchronizes with the operator-specified NTP
server. The default is 60 minutes.
• The interval can be entered from 0, or between 15 and 10,080 minutes.
• If you set 0, the printer synchronizes with the NTP server only when you turn the printer on. After
that, the printer does not synchronize with the NTP server.
Time-zone configuration 4
msh> sntp timezone “±hour_time”
• You can specify the time difference between the printer clock and NTP server clock. The values
are between -12:00 and +13:00.

• You can only select either the address or host name for the ntp server.

spoolsw

Use the “spoolsw” command to view and configure Job Spool settings.
You can only specify diprint, trap, lpr, ipp, ftp, sftp, wsd (printer), and smb (TCP/IP) protocol.
• The “spoolsw” command for configuring Job Spool settings is available only when the optional hard
disk is installed.
View settings
The Job Spool setting appears.
msh> spoolsw
Job Spool setting
msh> spoolsw spool {on|off}
• Specify “on” to enable Job Spool, or “off” to disable it.
Resetting Job spool setting
msh> spoolsw clear job {on|off}
• When the printer power is cut during job spooling, this determines whether to reprint the spooled
job.
Protocol configuration
msh> spoolsw diprint {on|off}

185
4. Monitoring and Configuring the Printer

msh> spoolsw lpr {on|off}


msh> spoolsw ipp {on|off}
msh> spoolsw smb {on|off}
msh> spoolsw ftp {on|off}
msh> spoolsw sftp {on|off}
msh> spoolsw wsprn {on|off}

ssdp

Use the “ssdp” command to view and configure SSDP settings.


4 View settings
msh> ssdp
Setting effective time
msh> ssdp profile [1801-86400]
• The default is 10800 seconds.
Advertise packet TTL settings
msh> ssdp ttl [1-255]
• The default is 4.

ssh

Use the “ssh” command to view and configure SSH settings.


View settings
msh> ssh
Data compression communication settings
msh> ssh compression {on|off}
• The default is “on”.
SSH/SFTP communication port setting
msh> ssh port [22, 1024-65535]
• The default is 22.
SSH/SFTP communication timeout setting
msh> ssh timeout [0-65535]
• The default is 300.

186
Remote Maintenance by telnet

SSH/SFTP communication login timeout setting


msh> ssh logintimeout [0-65535]
• The default is 300.
Setting an open key for SSH/SFTP
msh> ssh genkey {512|768|1024} “character string”
• Create an open key for SSH/SFTP communication.
• Usable characters are ASCII 0x20-0x7e (32 bytes) other than "0".
• The default key length is 1024, and the character string is blank.
• If you do not specify this parameter, an open key with the default value will be created.
Deleting open key for ssh/sftp communication
msh> ssh delkey
4

• If you do not specify a character string, current setting is displayed.


• ssh can be used only with sftp.

status

Use the “status” command to display the printer status.


View messages
msh> status

• p.196 "Getting Printer Information over the Network"

syslog

Use the “syslog” command to display the information stored in the printer's system log.
View message
msh> syslog

• p.216 "Message List"

upnp

Use the “upnp” command to display and configure the universal plug and play.

187
4. Monitoring and Configuring the Printer

Public URL display


msh> upnp url
Public URL configuration
msh> upnp url “string”
• Enter the URL string in the character string.

web

Use the “web” command to display and configure parameters on Web Image Monitor.
View settings
4 msh> web
URL configuration
You can set URLs linked by clicking [URL] on Web Image Monitor.
msh> web “ID” url http:// “The URL or IP address you want to register”/
• Specify “1” or “2” for ID as the number corresponding to the URL. Up to two URLs can be
registered and specified.
Resetting URLs registered as link destinations
msh> web “ID” clear url
• Specify “1” or “2” for ID as the corresponding number to the URL.
Link name configuration
You can enter the name for URL that appears on Web Image Monitor.
msh> web “ID” name “Name you want to display”
• Specify “1” or “2” for ID the corresponding number to the link name.
Resetting URL names registered as link destinations
msh> web “ID” clear name
• Specify “1” or “2” for ID as the number corresponding to the link name.
Help URL Configuration
You can set URLs linked by clicking “?” on Web Image Monitor.
msh> web help http://“Help URL or IP address”/help/
Resetting Help URL
msh> web clear help

188
Remote Maintenance by telnet

wiconfig

Use the “wiconfig” command to make settings for IEEE 802.11.


View settings
msh> wiconfig
View IEEE 802.11 settings
msh> wiconfig cardinfo
• If IEEE 802.11 is not working correctly, its information is not displayed.
Configuration
msh> wiconfig “parameter”
4
Parameter Value configured

mode {ap|802.11adhoc} You can set the infrastructure mode (ap) or the 802.11 Ad
hoc mode (802.11adhoc).
The default is the infrastructure mode.

ssid “ID value” You can specify an SSID in infrastructure mode. The
characters you can enter in the SSID string are ASCII
0x20-0x7e (32 bytes). If you do not specify a character
string, the machine will connect to the nearest access point.
The default SSID is blank.

channel frequency “channel no.” In 802.11 ad hoc mode, you can select a channel between
1 and 14, or 36, 40, 44, or 48.
Be sure to set the same channel for all ports that will transmit
and receive data.
The default is “11”.

key “key value” val [1|2|3|4] You can specify the WEP key when entering in hexadecimal.
With a 64-bit WEP, you can use 10 digit hexadecimals. With
a 128-bit WEP, you can use 26 digit hexadecimals.
Up to four WEP keys can be registered. Specify the number
to be registered with “val”.
When a WEP is specified by key, the WEP specified by key
phrase is overwritten.
To use this function, set the same key number and WEP key
for all ports that transmit data to each other. Put “0x”on the
front of WEP key.

189
4. Monitoring and Configuring the Printer

Parameter Value configured


You can omit the numbers with “val”. The key number is set
to 1 when making these omissions. The default is blank.

keyphrase “phrase” val [1|2|3|4] You can specify the WEP key when entering in ASCII.
With a 64-bit WEP, you can use 5 digit hexadecimals. With
a 128-bit WEP, you can use 13 digit hexadecimals.
Up to four WEP keys can be registered. Specify the number
to be registered with “val”.
When a WEP is specified by key phrase, the WEP specified
by key is overwritten.
4 To use this function, set the same key number and WEP key
for all ports that transmit data to each other.
You can omit the numbers with “val”. The key number is set
to1 when making these omissions. The default is blank.

encval [1|2|3|4] You can specify which of the four WEP keys is used for packet
encoding. “1” is set if a number is not specified.

wepauth {open|shared} You can set an authorization mode when using WEP. The
specified value and authorized mode are as follows:
open: open system authorized (default)
shared: shared key authorized rate

security {none|wep|wpa} You can specify the security mode.


none: No encryption (default)
wep: WEP encryption
wpa: WPA encryption

wpaenc {tkip|ccmp} You can specify WPA encryption key when using WPA
encryption.
tkip: TKIP
ccmp: CCMP (AES) (default)

wpaauth {wpapsk|wpa| You can specify the WPA authentication mode when using
wpa2psk|wpa2} WPA encryption.
wpapsk: WPA-PSK authentication (default)
wpa: WPA authentication
wpa2psk: WPA2-PSK authentication

190
Remote Maintenance by telnet

Parameter Value configured


wpa2: WPA2 authentication

psk “character string” You can specify the Pre-Shared key.


Usable characters: ASCII 0x20-0x7e (8 to 63 bytes).
The default is blank.

eap {tls|ttls|leap|peap} {chap| You can specify the EAP authentication type.
mschap|mschapv2|pap|md5| tls: EAP-TLS (default)
tls}
ttls: EAP-TTLS
leap: LEAP
peap: PEAP
4
chap, mschap, mschapv2, pap, md5, or tls are settings for
the phase 2 method, and must be set when using EAP-TTLS
or PEAP.
Do not make these settings when using other EAP
authentication types.
If you select EAP-TTLS, you can select chap, mschap,
mschapv2, pap, or md5.
If you select PEAP, you can select mschapv2 or tls.

username “character string” You can specify the login user name for the Radius server.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.

username2 “character string” You can specify the phase 2 username for EAP-TTLS/PEAP
phase 2 authentication.
Usable characters: ASCII 0x20-0x7e (31 bytes).
The default is blank.

domain “character string” You can specify the login domain name for the Radius server.
The characters you can enter are ASCII 0x20-0x7e (31
bytes), but not “@” or “\”.
The default is blank.

password “character string” You can specify the login for the Radius server.
Usable characters: ASCII 0x20-0x7e (128 bytes). The
default is blank.

191
4. Monitoring and Configuring the Printer

Parameter Value configured

srvcert {on|off} You can set the server certificate. The default is “off”.

imca {on|off} You can enable or disable the certificate when the
intermediate certificate authority is present. The default is
“off”.

srvid “character string” You can set the server ID and subdomain of the certificate
server.
Usable characters: ASCII 0x20-0x7e (128 bytes). The
default is blank.

4 Connectinfo Obtains connection information.

clear {a each command|all} Returns the selected setting to its default value.
If you specify “all”, all settings will be restored to their default
values.

miccheck {on|off} You can enable or disable the MIC check function.
The default setting is “On” (enabled).
If you specify “Off”, you cannot perform MIC checks. We
recommend you specify “On” for the MIC check function
when using this machine.

wins

Use the “wins” command to configure WINS server settings.


View settings
msh> wins
• If the IPv4 address obtained from DHCP differs from the WINS IPv4 address, the DHCP address
is the valid address.
Configuration
msh> wins “interface_name” {on|off}
• {on} means “active” and {off} means “inactive”.
• Be sure to specify the interface.
• wlan can be specified only when the IEEE 802.11 interface is installed.

192
Remote Maintenance by telnet

Interface name Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

Address configuration
Use the following command to configure a WINS server IP address:
wins “interface_name” {primary|secondary} “IP address”
• Use the “primary” command to configure a primary WINS server IP address.
• Use the “secondary” command to configure a secondary WINS server IP address.
• Do not use “255.255.255.255” as the IP address. 4
NBT (NetBIOS over TCP/IP) Scope ID Selection
You can specify the NBT scope ID.
msh> wins “interface_name” scope “scope ID”
• The scope ID can be entered using up to 31 alphanumeric characters.
• Be sure to specify the interface.
• wlan can be specified only when the IEEE 802.11 interface is installed.

Interface name Interface configured

ether Ethernet interface

wlan IEEE 802.11 interface

wsmfp

Use the “wsmfp” command to view and configure WSD (Device), WSD (Printer) and WSD (Scanner)
settings.
View settings
msh> wsmfp
Comment settings
msh> wsmfp comments “comment”
• If you do not specify a comment, current setting is displayed.
Location configuration
msh> wsmfp location “location”
• If you do not specify a comment, current setting is displayed.

193
4. Monitoring and Configuring the Printer

Presentation URL configuration


msh> wsmfp url “URL”
• Enter the URL string in the “URL”.
WSD (Device) TCP port configuration
msh> wsmfp devport “port_number”
• The Default is 53000.
WSD (Printer) TCP port configuration
msh> wsmfp prnport “port_number”
• The Default is 53001.

4 WSD (Printer) Timeout configuration


msh> wsmfp prntimeout [30-65535]
• The default is 900 seconds.
WSD (Scanner) TCP port configuration
msh> wsmfp scnport “port_number”
• The Default is 53002.
Comment initialization
msh> wsmfp clear comments
Location initialization
msh> wsmfp clear location
Presentation URL initialization
msh> wsmfp clear url

194
SNMP

SNMP
Using the SNMP manager, you can get information about the machine.
The SNMP agent operating on UDP and IPX is incorporated into the built-in Ethernet board and optional
IEEE 802.11 interface unit of this machine.
This machine also supports SNMPv3, which increases user authentication, data encryption, and access
control security.
To encrypt communication by SNMPv3, you must specify the machine's encrypted password.

• If you changed the machine's community name, change the configuration of the connected computer
accordingly, using SNMP Setup Tool. For details, see SNMP Setup Tool Help. 4
The default community names are [public] and [admin]. You can get MIB information using these community
names.
Start SNMP Setup Tool
• Windows 2000:
Click the [Start] button.
Point to [SmartDeviceMonitor for Admin] on the [Programs] menu.
Click [SNMP Setup Tool].
• Windows XP/Vista, Windows Server 2003/2003 R2/2008
Click the [Start] button.
Point to [SmartDeviceMonitor for Admin] on the [All Programs] menu.
Click [SNMP Setup Tool].

195
4. Monitoring and Configuring the Printer

Getting Printer Information over the Network


This section explains details of each item displayed in the printer status and information.

Current Printer Status

This section explains how you can check the machine's status and the items displayed. Depending on the
options installed on the machine, some items might not be displayed.
• UNIX: Use the “lpq” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• mshell: Use the “status” command.
4 Messages Description

Access Restricted The job was canceled because user have no


authority.

Access Restricted (Classi-Code) The job was canceled because no classification


code is specified.

Adjusting... The machine is initializing or calibrating.

Call Service Center There is a malfunction in the machine.

Canceled The job is reset.

Canceling Job... The job is being reset.

Cannot Eject Original Through The original cannot be ejected.

Cannot multi-install: SD Card The SD card has been configured using another
device.

Card/Counter not inserted The machine is waiting for prepaid card or key.

Coin or amount not inserted The machine is waiting for coin to be inserted.

Coin/Key Counter not inserted The machine is waiting for coin or key counter.

Configuring... Setting is being changed.

Cooling Down Fusing Unit... The fusing unit is cooling down.

Cover Open: ADF The document feeder is open.

Cover Open: Duplex Unit The cover of the duplex unit is open.

196
Getting Printer Information over the Network

Messages Description

Cover Open: Front Cover The front cover is open.

Cover Open: Lower Right Cover The lower right cover is open.

Cover Open: Right Cover The right cover is open.

Current Job Suspended The current job is suspended.

Data Size Error The data size error occurred.

Empty: Black Toner The black toner cartridge is almost empty.

Energy Saver Mode The machine is in Energy Saver Mode. 4


Error An error has occurred.

Error: Address Book An error has occurred in the data of the address
book.

Error: Command Transmission An error has occurred in the machine.

Error: DIMM Value A memory error occurred.

Error: Ethernet Board An Ethernet board error has occurred.

Error: HDD Board A hard disk drive board error has occurred.

Error: Media Link Board An error has occurred on the File Format Converter.

Error: Memory Switch A memory switch error has occurred.

Error: Optional Font An error has occurred in the font file of the machine.

Error: Optional RAM An error has occurred in the optional memory unit.

Error: Parallel I/F Board An error has occurred in the parallel interface.

Error: PDL An error has occurred in the page description


language.

Error: Rem. Certificate Renewal An error has occurred in the remote server renewal.

Error: USB Board An error has occurred in the USB interface board.

Error: USB Interface An error has occurred in the USB interface.

Error: Wireless Board An error has occurred in the wireless interface


board or IEEE 802.11 interface unit.

197
4. Monitoring and Configuring the Printer

Messages Description

Error: Wireless Card Wireless card is not inserted during start up, or the
IEEE 802.11 interface unit or the wireless card is
taken out after start up.

Full: Log Data Capacity The log data capacity is full.

Full: Waste Toner The waste toner is full.

Hex Dump Mode It is a hex dump mode.

Immed. Trans. not connected It did not connect directly with the other party of the

4 transmission.

Immediate Transmission Failed An error has occurred while transmitting directly.

In Use: Copier The copier is being used.

In Use: Fax The fax is being used.

In Use: Input Tray The input tray is being used by other functions.

Independent-supplier Toner Toner that is not recommended is set.

Jobs Suspended All jobs are suspended.

Key Card not inserted The machine is waiting for key card to be inserted.

Key Card/Counter not inserted The machine is waiting for key card or key counter
to be inserted.

Key Counter not inserted The machine is waiting for key counter to be left in
it.

Malfunction: Bypass Tray There is a problem with the bypass tray.

Malfunction: Ext. Charge Unit There is a problem with the external charge unit.

Malfunction: Output Tray There is a problem with the output tray.

Malfunction: Tray 1 There is a problem with tray 1.

Malfunction: Tray 2 There is a problem with tray 2.

Malfunction: Tray 3 There is a problem with tray 3.

Memory Low: Copy Memory shortage has occurred while the copy was
operating.

198
Getting Printer Information over the Network

Messages Description

Mismatch: Paper Size Indicated paper tray does not contain paper of
selected size.

Nearly Full: Log Data Capacity The log is nearing data capacity

Nearly Full: Waste Toner Bottle2 Waste toner bottle 2 is nearly full.

No Paper: Selected Tray There is no paper in specified tray.

No Paper: Tray 1 There is no paper in tray 1.

No Paper: Tray 2 There is no paper in tray 2.

No Paper: Tray 3 There is no paper in tray 3.


4
Not Detected: Black Toner Black toner is not correctly set.

Not Detected: Duplex Unit The duplex feed unit is not correctly set.

Not Detected: Fusing Unit The fusing unit is not correctly set.

Not Detected: Input Tray The paper feed tray is not correctly set.

Not Detected: Transfer Unit The transfer unit is not correctly set.

Not Detected: Tray 1 Tray 1 is not correctly set.

Not Detected: Tray 2 Tray 2 is not correctly set.

Not Detected: Tray 3 Tray 3 is not correctly set.

Not Detected: WasteToner Bottle Waste toner bottle is not correctly set.

Not Detected: Int. Transfer Unit Int.transfer unit is not correctly set.

Not Reached, Data Deleted Unreached job is deleted.

Not Reached, Data Stored Unreached documents are saved.

Offline Machine is offline.

Operating Thermo-range Error The machine is operating outside the permissible


temperature range.

Original on Exposure Glass The original remains on the exposure glass.

Panel Off Mode The machine is in Panel-Off mode.

199
4. Monitoring and Configuring the Printer

Messages Description

Panel Off Mode>>Printing ava. The machine is in Control Panel-Off mode.

Paper in Duplex Unit The paper remains in the duplex unit.

Paper Misfeed: ADF The paper has jammed in Document Feeder.

Paper Misfeed: Duplex Unit The paper has jammed in Duplex Unit.

Prepaid Card not inserted The prepaid card is not inserted, or has insufficient
credit.

Print Complete The print was completed.


4 Printing... Printing is in progress.

Processing Data is being processed.

Proxy Address/Port Incorrect The proxy address and port setting is incorrect.

Proxy User /Password Incorrect The proxy user name and password setting is
incorrect.

RC Gate Connection Error Failed connect with RC Gate (Basil).

Readjusting... The machine is readjusting itself.

Ready The machine is ready to print.

Renewing Remote Certificate The remote certificate is being renewed.

Replace Black PCU It is time to replace the black photoconductor unit.

Replace Charger Kit It is time to replace the charger kit.

Replace Cleaning Web It is time to replace the Cleaning Web.

Replace Developer It is time to replace the development unit.

Replace Fusing Unit It is time to replace the fusing unit.

Replace Maintenance Kit It is time to replace the maintenance kit.

Replace Transfer Cleaning Unit It is time to replace the transfer cleaning unit.

Replace Transfer Roller It is time to replace the transfer roller.

Reset IPDS fonts An IPDS font error occurred.

200
Getting Printer Information over the Network

Messages Description

Retarding... Printing has stopped momentarily to allow printed


sheets to dry.

SD Card Authentication failed SD card authentication failed.

SD Card not inserted The machine is waiting for SD card.

Setting Remotely The RDS setting is being processed.

Skipped due to Error Skipped the error.

Storage Complete The storage is complete.

Storage Failed The storage has failed.


4
Supplies Order Call failed The supply order call has failed.

Suspend / Resume Key Error Finisher stop button was pressed.

Transmission Aborted The transmission was interrupted.

Transmission Complete The transmission completion was completed.

Transmission Failed The transmission has failed.

Tray Error: Chaptering The paper feed tray specification error has
occurred because chaptering as well as the normal
paper use the same tray for printing.

Tray Error: Duplex Printing Selected paper tray cannot be used for duplex
printing.

Unit Left Open: ADF Document feeder is opened.

Waiting for Job Suspension The machine is waiting for Job Suspension.

Warming Up... The machine is warming up.

• For details about UNIX commands, see UNIX Supplement.


• Check the error contents that may be printed in the configuration page.

201
4. Monitoring and Configuring the Printer

Printer configuration

You can check the printer configuration using telnet.


This section explains the checking procedure for input/output tray and printer language.
• UNIX: Use the “info” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• mshell: Use the “info” command.

Input Tray
Item Description

No. ID number of the paper tray

4 Name Name of the paper tray

Page Size Size of paper loaded in the paper tray

Status Current status of the paper tray


• Normal: Normal
• NoInputTray: No tray
• PaperEnd: No paper

Output Tray
Item Description

No. ID number of the output tray

Name Name of the output tray

Status Current status of the output tray


• Normal: Normal
• PaperExist: Paper exist
• OverFlow: Paper is full
• Error: Other errors

Printer Language
Item Description

No. ID number of the printer language used by the


printer

Name Name of the printer language used in the printer

202
Getting Printer Information over the Network

Item Description

Version Version of the printer language

• For details about UNIX commands and parameters, see UNIX Supplement.

203
4. Monitoring and Configuring the Printer

Understanding the Displayed Information


This section explains how to read status information returned by the network interface board.

Print Job Information

Use the following command to display print job information:


• UNIX: Use the “info” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• mshell: Use the “info” command.

4 Item Description

Rank Print job status.


• Active
Printing or preparing for printing.
• 1st, 2nd, 3rd, 4th...
Waiting to be transferred to the printer.

Owner Print request user name.

Job Print request number.

Files The name of the document.

Total Size The size of the data (spooled).


The default is 0 bytes.

• For details about UNIX commands and parameters, see UNIX Supplement.

Print Log Information

This is a record of the most recent jobs printed.


Use the following command to display print log information:
• UNIX: Use the “prnlog” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• telnet : Use the “prnlog” command.

204
Understanding the Displayed Information

Item Description

ID Print request ID.

User Print request user name.

Page Number of pages printed

Result Print Request Result


Communication Result
• OK
Print was completed normally. However, the
print result may not be as required due to
printer problems.
4
• NG
Printing was not completed normally.
• Canceled
An “rcp”, “rsh”, or “lpr” command print
request was canceled, possibly due to the
printing application. Not applicable to the
“ftp” or “rprinter” command.

Time Time the print requested was received.


Time of print request reception

User ID (when designating Job ID on telnet) Printer driver-configured User ID.


Appears when the print request ID is specified.

JobName (when designating Job ID on telnet) Name of the document for printing
Appears when the print request ID is specified.

• For details about UNIX commands and parameters, see UNIX Supplement.

Configuring the Network Interface Board

Use the following command to display network interface board settings:


• telnet : Use the “show” command.

205
4. Monitoring and Configuring the Printer

Item Description

Common

Mode

Protocol Up/Down Protocol Settings

AppleTalk

IPv4

IPv6

4 IPsec

NetWare

SMB

Device Up/Down Device Settings

Parallel

USB

Ethernet interface

Syslog priority

NVRAM version

Device name

Comment

Location

Contact

Soft switch

AppleTalk AppleTalk settings

Mode

Net

Object

Type

206
Understanding the Displayed Information

Item Description

Zone

TCP/IP TCP/IP settings

Mode (IPv4)

Mode (IPv6)

ftp

lpr

rsh 4
telnet

diprint

web

http

ftpc

snmp

ipp

autonet

Bonjour

ssl

nrs

rfu

nbt

ssdp

ssh

sftp

WSD (Device)

WSD (Printer)

207
4. Monitoring and Configuring the Printer

Item Description

WSD (Scanner)

rhpp

IPv4

DHCP

Address

Netmask

4 Broadcast

Gateway

IPv6

Stateless

Manual

Gateway

DHCPv6-lite

DUID

DHCPv6 option lifetime

IPsec

Manual Mode

Excluded Protocol

https

dns

dhcp

wins

EncapType

Host name

DNS Domain

208
Understanding the Displayed Information

Item Description

Access Control Access Control settings

IPv4

Access Entry [X] X can be set between 1 and 5.

IPv6

Access Entry [X] X can be set between 1 and 5.

SNTP Server Time settings

Time Zone 4
SNTP Server polling time

SYSLOG server Websys settings

Home page URL1

Home page link name1

Home page URL2

Home page link name2

Help page URL

RHPP Port

RHPP timeout

NetWare

EncapType

RPRINTER number

Print server name

File server name

Context name

Switch

Mode

NDS/Bindery

209
4. Monitoring and Configuring the Printer

Item Description

Packet negotiation

Login Mode

Print job timeout

Protocol

SAP interval time

NDS Tree Name

4 Transfer Protocol

SMB SMB settings

Switch

Mode

Direct print

Notification

Workgroup name

Computer name

Comment

Share name [1]

Protocol

Wireless LAN Wireless LAN settings

Host Name

Communication Mode

SSID

Channel

Security

WEP Authentication

WEP Encryption key number

210
Understanding the Displayed Information

Item Description

WEP Encryption keys [X] X can be set between 1 and 4.

WPA Encryption

WPA Authentication

Pre-Shared Key

User name

Domain name

EAP Type 4
Password

Phase 2 user name

Phase 2 Method TTLS

Phase 2 Method PEAP

Server cert.

Intermediate CA

Server ID

Sub domain

MIC check

Ethernet

802.1X Authentication

DNS DNS settings

IPv4

Server [X] X can be set between 1 and 3.

Selected IPv4 DNS Server

IPv6

Server [X] X can be set between 1 and 3.

Selected IPv6 DNS Server

211
4. Monitoring and Configuring the Printer

Item Description

Resolver Protocol

Domain name

ether

wlan

DDNS

ether

4 wlan

WINS WINS settings

ether

Primary WINS

Secondary WINS

wlan

Primary WINS

Secondary WINS

SSDP SSDP settings

UUID

Profile

TTL

UPnP UPnP settings

URL

Bonjour Bonjour settings

Computer Name (cname)

Local Hostname (ether)

Local Hostname (wlan)

Location

212
Understanding the Displayed Information

Item Description

Priority (diprint)

Priority (lpr)

Priority (ipp)

IP TTL

LinkLocal Route for Multi I/F

IPP Port

SNMP SNMP settings 4


SNMPv1v2

SNMPv3

protocol

v1Trap

v2Trap

v3Trap

SNMPv1v2 Remote Setting

SNMPv3 Privacy

ssh ssh settings

Compression

Port

TimeOut

Login TimeOut

AuthFree Authfree settings

IPv4

AuthFree Entry [X] X can be set between 1 and 5.

IPv6

AuthFree Entry [X] X can be set between 1 and 5.

213
4. Monitoring and Configuring the Printer

Item Description

Parallel

USB

LPR

lprm check host

lpr prnerr chk

Certificate

4 Verification

WS-MFP

Network Device Name

Comments

Location

Presentation URL

WSD (Device) TCP Port

WSD (Printer) TCP Port

WSD (Printer) Job Timeout

WSD (Scanner) TCP Port

MetadataVersion

UUID

IEEE 802.1X IEEE 802.1X settings

User name

Domain name

EAP Type

Password

Phase 2 user name

Phase 2 Method TTLS

214
Understanding the Displayed Information

Item Description

Phase 2 Method PEAP

Server cert

Intermediate CA

Server ID

Sub domain

Shell mode Remote maintenance tool mode

215
4. Monitoring and Configuring the Printer

Message List
This is a list of messages that appear in the machine's system log. The system log can be viewed using the
“syslog” command.

System Log Information

Use the following command to display the system log information:


• UNIX: Use the “syslog” command and “rsh”, “rcp”, “ftp”, and “sftp” parameters.
• telnet: Use the “syslog” command.
4 Message Problem and solutions

Access to NetWare server <file server name> (In the print server mode) Login to the file server
denied. Either there is no account for this print server failed. Make sure that the print server is registered
on the NetWare server on password was incorrect. on the file server. If a password is specified for the
print server, delete it.

account is unavailable: encryption is impossible. Encryption is not possible and account is disabled.
This could be because:
• Security option is not installed.
• Encryption password has not been specified.

account is unavailable: same account name be User account is disabled. This could be because it
used. use the same account name as the administrator
account.

account is unavailable: The authentication User account is disabled. This could be because the
password is not set up. authentication password is not set, and only the
encryption account is set.

add_sess_IPv4: bad trap addr: <IPv4 address>, The IPv4 address (0.0.0.0.) is unavailable when the
community: <community name> community access type is TRAP. Specify the host
IPv4 address for the TRAP destination.

add_sess_IPv4: community <community name> The same community name already exists. Use
already defined. another community name.

add_sess_IPv6: bad trap addr: <IPv6 address>, The IPv6 address [::] is unavailable when the
community: <community name> community access type is TRAP. Specify the host
IPv6 address for the TRAP destination.

216
Message List

Message Problem and solutions

add_sess_IPv6: community <community name> The same community name already exists. Use
already defined. another community name.

add_sess_IPX: bad trap addr: <IPX address> The IPX address (00:00:00:00:00:00) is
community <community name> unavailable when the community access type is
TRAP. Specify the host IPX address for the TRAP
destination.

add_sess_IPX: community <community name> The same community name already exists. Use
already defined. another community name.

adjust time server <NTP server name> offset: xx sec. ncsd tells you the timing of the NTP server and
whether or not the time system clock is set.
4
Attach FileServer=<file server> Connection to the file server as the nearest server
has been established.

Attach to print queue <print queue name> (In the print server mode) Attached to the print
queue.

centrod is disabled. Communication via parallel connections


unavailable because centrod is disabled in the
security mode.
Enable centrod in the security mode.

child process exec error! <process name> The network service failed to start. Turn the printer
off and then on. If this does not work, contact your
service or sales representative.

Connected DHCPv6 server <IPv6 address> The IP address was successfully received from the
DHCPv6 server.

connection from <IP address> A user logged in from the host <IP address>.

Could not attach to FileServer <error number> (In the remote printer mode) Connection to the file
server has not been established. The file server has
refused the connection. Check the file server
configuration.

Could not attach to PServer <print server> (In the remote printer mode) Connection to the print
server has not been established. The print server
has refused the connection. Check the print server
configuration.

217
4. Monitoring and Configuring the Printer

Message Problem and solutions

Current Interface Speed: <Ethernet I/F Speed> Speed of the Ethernet interface (10Mbps, 100
Mbps, or 1Gbps).

Current IPX address <IPX address> Current IPX address.

DHCPv6 server not found. The DHCPv6 server was not found. Make sure that
the DHCPv6 is on the network.

Duplicate IP=<IP address> (from<MAC address>). A conflicting IPv4 or IPv6 address was used. Each
IPv4 or IPv6 address must be unique.
Check the device address in [MAC address].
4 Established SPX Connection with PServer, (In the remote printer mode) Connection to the print
(RPSocket=<socket number>, server has been established.
connID=<connection ID>)

Frametype=<frametype name> The frame type name is configured to be used on


NetWare.

Exit pserver (In the print server mode) The print server function
is disabled because the necessary print server
settings have not been made.

IEEE 802.11 Card does NOT support WPA . A wireless card that does not support WPA is
installed. Install a wireless card that supports WPA.

IEEE 802.11 Card Firmware REV.<version> Displays the version number of the 802.11 card's
firmware.

IEEE 802.11 current channel <channel number> Displays the current channel number of the active
wireless card (in ad hoc and infrastructure mode).

IEEE 802.11 MAC Address = <MAC address> Displays the MAC address of the wireless interface.

IEEE 802.11 SSID <ssid> (AP MAC Address The MAC address and SSID of the access point are
<MAC address>) connected in infrastructure mode.

IEEE 802.11 <communication mode> mode Displays IEEE 802.11 communication mode.

(IKE phase-1) mismatched authentication type: This machine's <authentication type 1> in IKE phase
local=<authentication type 1> 1 does not match the communicating host's
remote=<authentication type 2> <authentication type 2>, Make sure this machine's
ISAKMP SA authentication type matches that of the
communicating host.

218
Message List

Message Problem and solutions

(IKE phase-1) mismatched encryption type: This machine's ISAKMP SA Oakley group
<encryption algorithm 1> remote=<encryption <encryption algorithm 1> in IKE phase 1 does not
algorithm 2> match the communicating host's ISAKMP SA
Oakley group < encryption algorithm 2>, Make
sure this machine's ISAKMP SA Oakley group
matches that of the communicating host.

(IKE phase-1) mismatched DH group: local=<DH This machine's ISAKMP SA Oakley group <DH
group number 1> remote=<DH group number 2> group number 1> in IKE phase 1 does not match
the communicating host's ISAKMP SA Oakley
group <DH group number 2>, Make sure this
machine's ISAKMP SA Oakley group matches that 4
of the communicating host.

(IKE phase-1) mismatched hash type: local=<Hash This machine's ISAKMP SA <Hash Algorithm 1> in
Algorithm 1> remote=<Hash Algorithm 2> IKE phase 1 does not match the communicating
host's ISAKMP SA <Hash Algorithm 2>, Make sure
this machine's ISAKMP SA Hash Algorithm matches
that of the communicating host.

IKE [% s] is disable, set PSK text The specified IKE entry invalid. Enter the PSK text.

< Interface > started with IP: < IP address > IP address (IPv4 or IPv6 address) has been set for
the interface and is operating.

inetd start. The inetd service has started.

job canceled. jobid=%d. The spooled job was canceled due to error or user
request.

Lease Time=<lease time>(sec), The resource lease time received from the DHCP
RenewTime=<renew time>(sec). server is displayed in [lease time] in seconds. The
renewal time is displayed in [renew time] in
seconds.

Login to fileserver <file server name> (<IPX|IP>), When the print server was online, the system
<NDS|BINDERY> logged in to <file server> in NDS or BINDERY
mode. The transfer protocol in use is also displayed.

Manual [% s ] is disable, set authentication key The specified manual SA entry could is invalid. Set
the authentication key.

Manual [% s ] is disable, set encryption key The specified manual SA entry could is invalid. Set
the authentication key.

219
4. Monitoring and Configuring the Printer

Message Problem and solutions

Name registration failed. name=<NetBIOS name> Name registration of <NetBIOS Name> failed.
Change to a different NetBIOS name.

Name registration success in Broadcast Name registration by <NetBIOS Name>


name=<NetBIOS name> broadcast was successful.

Name registration success. WINS server=<WINS Name registration of <NetBIOS Name> to <WINS
server address> NetBIOS Name=<NetBIOS server address> was successful.
name>

npriter start. (NetWare) (In the remote printer mode) The NetWare service
4 has started.

Open log file <file name> (In the print server mode) The specified log file has
been opened.

Printer <printer name> has no queue (In the print server mode) The print queue is not
assigned to the printer. Using NWadmin, assign the
print queue to the printer, and then restart it.

Printer queue <print queue name> cannot be (In the print server mode) The print queue cannot
serviced by printer 0, <print server name> be established. Make sure that print queue exists
on the specified file server.

Print server <print server name> has no printer (In the print server mode) The printer is not assigned
to the print server. Using NWadmin, assign the
printer, and then restart it.

Print sessions full No more print jobs can be accepted. Wait a while
before sending any more print jobs.

pserver start. (NetWare) (In the print server mode) The NetWare service has
started.

Required file server (<file server name>) not found The required file server <file server name> could
not be found.

sap enable. saptype=<SAP type>, sapname=<SAP The SAP function was started. The SAP packet is
name> issued to advertise the service in the SAP table on
the NetWare server.

session_IPv4 <community name> not defined. The requested community name is not defined.

session_IPv6 <community name> not defined. The requested community name is not defined.

220
Message List

Message Problem and solutions

session_IPX <community name> not defined. The requested community name is not defined.

Set context to <NDS context name> The NDS context name <NDS context name> has
been set.

shutdown signal received. network service The network reboot process is starting.
rebooting...

Smbd start. (NetBIOS) SMBD (Server Message Block Daemon) has been
started.

SMTPC: failed to get smtp server ip-address. The SMTP server IP address could not be obtained.
This could be because: 4
• The specified DNS server could not be found.
• No connection to the network has been
established.
• The specified DNS server could not be found.
• An incorrect DNS server is specified.
• The specified SMTP server IP address could
not be found in the DNS server.

SMTPC: failed to connect smtp server. timeout. Connection to the SMTP server failed due to
timeout. This could be because the specified SMTP
server name is incorrect, or no connection to the
network has been established, or the network
configuration is incorrect, so there is no response
from the SMTP server. Check the SMTP server
name, or the network connection and
configuration.

SMTPC: refused connect by smtp server. Connection to the SMTP server is denied. This could
be because server other than the SMTP server has
been specified, or the specified SMTP server port
number is incorrect. Check the SMTP server name,
port number, or the SMTP server port number.

SMTPC: no smtp server. connection close. Connection to the SMTP server failed due to no
response from SMTP. This could be because a
server other than the SMTP server has been
specified, or the specified SMTP server port number

221
4. Monitoring and Configuring the Printer

Message Problem and solutions


is incorrect. Check the SMTP server name, port
number, or the SMTP server port number.

SMTPC: failed to connect smtp server. Connection to the SMTP server failed. This could be
because no connection to the network has been
established, or the network configuration is
incorrect, so there is no response from the SMTP
server, or the specified SMTP server name is
incorrect, or the specified SMTP server IP address
could not be found in the DNS server, or a server
other than the SMTP server has been specified, or
4 the specified SMTP server port number is incorrect.
Check the DNS Server's IP address and SMTP
server's IP address, or the SMTP server name and
SMTP port number, or the SMTP server's SMTP port
number, or the network connection and
configuration.

SMTPC: username or password wasn't correct. Connection to the SMTP server failed, because the
[response code] (information) specified SMTP user name is incorrect, or the
specified SMTP password is incorrect. Check the
SMTP user name and password.

Snmp over IPv4 is ready Communication over IPv4 with snmp is available.

Snmp over IPv6 is ready. Communication over IPv6 with snmp is available.

Snmp over IPX is ready. Communication over IPX with snmp is available.

snmpd start. The snmpd service has started.

The print server received error <error number> Login to the file server failed when the print server
during attempt to log in to the network. Access to was online. The print server is not registered or a
the network was denied. Verify that the print server password is specified. Register the print server
name and password are correct. without specifying a password.

trap account is unavailable. v3Trap cannot be sent. This could be because the
Trap destination account is different from the
account specified by the printer.

Updated (option name)(value) via DHCPv6 Server The parameter obtained from the DHCP server has
been updated.

222
Message List

Message Problem and solutions

WINS name registration: No response to server There was no response from the WINS server.
(WINS server address) Check that the correct WINS server address is
entered. Also, check that the WINS server is
functioning properly.

WINS wrong scope ID=<scope ID> The scope ID is invalid. Use a valid scope ID.

write error occurred. (diskfull) A “diskfull” error occurred while the machine was
writing to the spool file. Wait for the current print
job to finish, When it finishes, more HDD space will
be available. Only pages that were spooled when
the error occurred will be printed. 4
write error occurred. (fatal) A fatal error occurred while the printer was writing
to the spool file. Turn off the power of the printer,
and then turn it on again. If the error recurs, contact
your service representative. The print job that was
being spooled when the error occurred will not be
printed.

WSD (Device) started. WS-Device has started.

WSD (Printer) started. WS-Printer has started.

WSD (Scanner) started. WS-Scanner has started.

#[nfa (process ID)] <time date> + Failed to send An error occurred while trying to send a log file to
logos to a log collection server <IP address>. both the primary and secondary log collection
servers.

#[nfa (process ID)] <time date> + Failed to send 60 minutes has passed since the last log entry.
logs to a collection server <IP address> n time(s) in During that time, an error occurred while trying to
1 hour. send the log file to both the primary and secondary
log collection servers.

• For details about UNIX commands and parameters, see UNIX Supplement.

223
4. Monitoring and Configuring the Printer

224
5. Registering Addresses and Users for
Facsimile/Scanner Functions
This chapter describes how to register destinations and users in the Address Book. For details on how to
access System Settings, see "Accessing System Settings ".

Address Book
This section describes Address Book settings.
Registering information such as the names of users and their e-mail addresses in the Address Book allows
you to manage them easily.

• Address Book data is stored on the hard disk. It can be lost if there is some kind of hard disk failure.
• The manufacturer shall not be held responsible for any damages resulting in data loss.
5
You can register and manage the following items in the Address Book:
Name
You can register the name of the user and the key display. This is the basic information required for
managing users of the machine.
To register a fax number or e-mail address in the address book, you must register information such
as the user name and destination name in advance.

Auth. Info (Authentication Information)


You can register user codes in order to restrict particular functions to certain users, and to check their
use of each function. You can also register login user names and login passwords to be used when
sending e-mail, sending to folders, or accessing an LDAP server.

Auth.Protect (Authentication Protection)


You can set protection codes to stop sender's name from being used or folders from being accessed
without authorization.

225
5. Registering Addresses and Users for Facsimile/Scanner Functions

Fax Settings
You can register fax numbers, line, fax header and select label insertion.
When using IP-Fax, you can register the IP-Fax destination and select the protocol.

E-mail Settings
5 You can register e-mail destinations in the Address Book.

Folder Info (Folder Information)


You can register the protocol, path name and server name.
• SMB

• FTP

• NCP

226
Address Book

Register Group to
You can put registered e-mail and folder destinations into a group for easier management.

• You can also use Web Image Monitor to register names in the Address Book. With
SmartDeviceMonitor for Admin, you can register multiple names at the same time. For details about 5
using Web Image Monitor, see Web Image Monitor Help.
• Using Address Management Tool in SmartDeviceMonitor for Admin, you can backup Address Book
data. We recommend backing up data when using the Address Book. For operating instructions, see
SmartDeviceMonitor for Admin Help.

Managing Names in the Address Book

By registering a name and key display beforehand, you can specify e-mail and folder destinations simply
by selecting the name key.

• p.230 "Registering Names"

Sending fax by Quick Dial

Register a fax number in the Address Book so you can specify it only by selecting the fax destination, shown
on the fax initial display when sending a fax. When label insertion is set to "On", the receiver's name is
printed on the fax message when it is received at the other end.
By registering IP-Fax destinations in the Address Book, you can specify a destination simply by selecting it
from the destinations that appear in the initial fax display. Registered IP-Fax numbers can be used and
printed as sender's IP-Fax numbers.

• p.251 "Fax Destination"

227
5. Registering Addresses and Users for Facsimile/Scanner Functions

Sending e-mail by Quick Dial

By registering e-mail addresses in the Address Book, you can specify e-mail destinations simply by selecting
them from the fax initial display when sending a document by Internet fax or e-mail.
You can also specify an e-mail address by selecting the destination shown on the initial scanner display
when sending a document using the scanner function. A registered e-mail address can be used as the
sender's address, and the sender's addresses are automatically entered in the "From" field of an e-mail
header.

• p.274 "E-mail Destination"

Sending received fax documents or scanned files to a shared folder directly

5 After registering the path name, user name and password, you can connect to a shared folder simply by
selecting the destination shown on the initial facsimile display whenever sending files using the facsimile
function to a shared folder. You can also connect to a shared folder by selecting the destination shown on
the initial scanner display whenever sending files using the scanner function.
To share the folder using Windows, select the SMB protocol.
To register the folder to the FTP server, select the FTP protocol.
To register the folder to the NetWare server, select the NCP protocol.

• p.282 "Registering Folders"

Preventing unauthorized user access to shared folders from the machine

After registering a protection code, you can specify the object of protection to prevent an e-mail destination
from being used without permission.
You can prevent unauthorized access to registered folders.

• p.334 "Registering a Protection Code"

Managing users and machine usage

Register user codes to limit users to the following functions and check their use of each function:
• Copier
• Facsimile

228
Address Book

• Printer
• Scanner

• p.235 "Authentication Information"

229
5. Registering Addresses and Users for Facsimile/Scanner Functions

Registering Names
Register user information including their names.
The user name is useful for selecting a destination when sending faxes.
You can register up to 150 names.

Registering Names

This section describes how to register names.

1. Press the [User Tools/Counter] key


2. Select [System Settings] using [ ] and [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] and [ ], and then press the [OK] key.

230
Registering Names

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

When you register a new Reg. No., currently available numbers are automatically displayed.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
7. Enter the name, and then press the [OK] key.
For the user name, up to 20 characters are usable.

5
8. Press the [OK] key.

9. Press the [User Tools/Counter] key.

Changing a Registered Name

This section describes how to change a name.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] and [ ], and then press the [OK] key.

231
5. Registering Addresses and Users for Facsimile/Scanner Functions

3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] and [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

If you do not wish to change the registration number, proceed to the next step.
You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, registration number, user code, fax destination, E-mail address,
folder name.
7. Enter the new name, and then press the [OK] key.

232
Registering Names

8. Press the [OK] key.

To change a registration number, press [Reg. No.].


Enter a new number using the number keys or a Quick Dial key, and then press the [OK] key.
9. Press the [User Tools/Counter] key.

• You can search by the registered name, or fax number.

Deleting a Registered Name 5


This section describes how to delete a name.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] and [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] and [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] and [ ], and then press the [OK] key.

233
5. Registering Addresses and Users for Facsimile/Scanner Functions

5. Select [Delete] using [ ] and [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001- 016 by pressing the Quick Dial key.
5 Press [Search] to search by name, destination list, registration number, user code, fax number.
7. Press [Yes].

8. Press the [User Tools/Counter] key.

234
Authentication Information

Authentication Information
Following describes the procedure for authenticating a user code.

• The functions associated with each user code are the same. If you change or delete user codes,
management data and limits associated with that code become invalid.
Register user codes to limit users to the following functions and check their use of each function:
• Copier
• Facsimile
• Printer
• Scanner

• You can register up to 100 user codes.


5
• The number of copies scanned using the scanner function is counted for each user code. This allows
you to check each user's usage.
• To automatically register the printer driver user code, select [Auto Program] under Printer for the printer
in User Code Authentication. To use the user code set in User Tools, set the user codes registered in
User Tools for the printer driver.
• For details about setting user codes for the printer driver, see the printer driver Help.

• p.40 "Administrator Tools"

Registering a User Code

This section describes how to register a user code.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

235
5. Registering Addresses and Users for Facsimile/Scanner Functions

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

236
Authentication Information

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [User Code] using [ ] or [ ], and then press the [OK] key.

11. Enter the user code using the number keys, and then press the [OK] key.

If you have entered a wrong code, press the [Clear/Stop] key and then enter the correct code again.
You can use up to eight digits for specifying the user code.
12. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.

13. Select the function you want to set the user code for using [ ], and then press the [OK] key.

237
5. Registering Addresses and Users for Facsimile/Scanner Functions

14. Press the [Escape] key.

15. Press [End].

16. Press the [OK] key.

17. Press the [User Tools/Counter] key.

• You can enter a one-to eight-digit user code.


• To register the name, see "Registering Names".

• p.230 "Registering Names"

Changing a User Code

This section describes how to change a user code.

• Even if you change a user code, the counter value will not be cleared.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

238
Authentication Information

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001- 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

239
5. Registering Addresses and Users for Facsimile/Scanner Functions

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [User Code] using [ ] or [ ], and then press the [OK] key.

11. Enter the new user code using the number keys, and then Press the [OK] key.

12. Select permit Functions on Auth. using [ ] or [ ], and then press the [OK] key.

13. Check the registered function you want to change the user code for, and then press the [OK]
key.
To select the check box, use [ ]. To clear the check box, use [ ].

240
Authentication Information

14. Press the [Escape] key.

15. Press [End].

16. Press the [OK] key.

17. Press the [User Tools/Counter] key.

• To change the name, key display and title, see "Registering Name".

• p.230 "Registering Names"

Deleting a User Code

This section describes how to delete a user code.

• After clearing the user code, the counter is automatically cleared.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

241
5. Registering Addresses and Users for Facsimile/Scanner Functions

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys, and then press the
[OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

242
Authentication Information

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [User Code] using [ ] or [ ], and then press the [OK] key.

11. Press the [Clear/Stop] key to the user code, and then press the [OK] key.

12. Press the [Escape] key.

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key.

243
5. Registering Addresses and Users for Facsimile/Scanner Functions

• To delete a name from the Address Book entirely, see "Registering Name".

• p.230 "Registering Names"

Displaying the Counter for Each User

This section describes how to display the counter for each user.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Press [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.

5. Select [Display] using [ ] or [ ], and then press the [OK] key.

244
Authentication Information

6. Select the function you want to display the counter for using [ ] or [ ], and then press the
[OK] key.

7. Press the [OK] key.

8. Press the [User Tools/Counter] key.


5
Printing the Counter for Each User

This section describes how to display the counter for each user.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Press [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.

245
5. Registering Addresses and Users for Facsimile/Scanner Functions

5. Select [Print] using [ ] or [ ], and then press the [OK] key.

6. Select [Per User] using [ ] or [ ], and then press the [OK] key.

7. Select the method of user selection using [ ] or [ ], and then press the [OK] key.

8. Select the user to print.


If you select [Manual] in step 7, enter the user code and then press the [OK] key.

If you select Display Destination List in step 7, confirm the user code using [ ] and then press the [OK]
key.

9. Select the function you want to print the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.

246
Authentication Information

10. Press the [Start] key.

11. Press the [User Tools/Counter] key.

Printing the Counter for All Users

This section describes how to print the counter for all users.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
5

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.

5. Select [Print] using [ ] or [ ], and then press the [OK] key.

247
5. Registering Addresses and Users for Facsimile/Scanner Functions

6. Select [All Users] using [ ] or [ ], and then press the [OK] key.

7. Select the function you want to print the counter for using [ ] or [ ], and then confirm it by
pressing [ ], and then press the [OK] key.

8. Press the [Start] key.


5

9. Press the [User Tools/Counter] key.

Clearing the Number of Prints

This section describes how to clear the counter.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

248
Authentication Information

4. Select [Disp./Print User Counter] using [ ] or [ ], and then press the [OK] key.

5. Select [Clear] using [ ] or [ ], and then press the [OK] key.

6. Select [Per User] using [ ] or [ ], and then press the [OK] key.

7. Select the method of user selection using [ ] or [ ], and then press the [OK] key.

8. Select the user to clear.


If you select Manual in step 7, enter the user code and then press the [OK] key.

If you select Display Destination List in step 7, confirm the user code using [ ] and then press the [OK]
key.

249
5. Registering Addresses and Users for Facsimile/Scanner Functions

9. Select the function you want to clear the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.

10. Press [Yes].

11. If you want to clear the counter for all users, select [All Users] using [ ] or [ ], and then
5 press the [OK] key.

12. Select the function you want to clear the counter for using [ ] or [ ], then confirm it by
pressing [ ], and then press the [OK] key.

13. Press [Yes].

14. Press the [User Tools/Counter] key.

250
Fax Destination

Fax Destination
This section describes the procedure for registering, changing, and deleting Fax Destinations.
Register a fax destination so you do not need to enter fax numbers each time, and can send documents
that have been scanned in using the facsimile function.
• It is easy to select the fax destination if you register "Name" for the fax destination.
• You can register fax destinations as a group.
• You can register fax destinations by selecting them from redial function.
• Registered Fax numbers can be used as sender's Fax numbers.
There are two types of fax destination, as shown below:
• Fax Destination
Select this to send the fax over the telephone network.
• IP-Fax Destination 5
Select this to send the fax to a machine on a TCP/IP network.
You cannot send the fax to a machine on another network if that network is behind a firewall.
You can program the following items in a fax destination:
Fax number
Registers the destination's fax number. You can enter a fax number using up to 128 digits. You must
include every digit in the number.
SUB Code
Registering a SUB Code allows you to use Confidential Transmission to send messages to the other
fax machines which support a similar function called "SUB Code". See "SUB Code", Facsimile
Reference.
SEP Code
Registering a SEP Code allows you to use Polling Reception to receive faxes from the other fax
machines which support Polling Reception. See "SEP Code", Facsimile Reference.
International TX mode
When setting the International TX mode to [On], the machine transmits more carefully by lowering
transmission speed. However, communication times increase.
Label insertion
Use label insertion to print information such as the destination name on the sheet printed out at the
destination.
Data is printed as follows:
• Destination Name

251
5. Registering Addresses and Users for Facsimile/Scanner Functions

The destination name specified in [Fax Destination] is printed with "To" before it at the top of the
sheet.
You can program the following items in an IP-Fax Destination:
IP-Fax
Register the IP-Fax destination. You can register the name using up to 128 characters. You must make
this setting when using IP-Fax.
This setting only works if the IP-Fax function has been selected.
SUB Code
Registering a SUB Code allows you to use Confidential Transmission to send messages to the other
fax machines which support a similar function called "SUB Code". See "SUB Code", Facsimile
Reference.
SEP Code
Registering a SEP Code allows you to use Polling Reception to receive faxes from the other fax
5 machines which support Polling Reception. See "SEP Code", Facsimile Reference.
Select Protocol
Select the protocol for the IP-Fax transmission.
This setting only works if the IP-Fax function has been selected.

Registering a Fax Destination

This section describes how to register a fax destination.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

252
Fax Destination

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

253
5. Registering Addresses and Users for Facsimile/Scanner Functions

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter the fax number using the number keys, and then press the [OK] key.

11. Specify optional settings such as "SUB Code", "SEP Code", "International TX Mode", and
"Label Insertion".
5 12. Press [End].

13. Press the [OK] key.


14. Press the [User Tools/Counter] key.

• After entering a fax number, be sure to press the [OK] key. If you press the [Escape] key without
pressing the [OK] key, the entered number is not registered.
• To register the name, see "Registering Names".
• When a group is registered, you can also add this fax destination to the group. For details about
registering groups, see "Registering Names to a Group".

• p.230 "Registering Names"


• p.319 "Registering Names to a Group"

Changing a Fax Destination

This section describes how to change a registered fax destination.

1. Press the [User Tools/Counter] key.

254
Fax Destination

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

255
5. Registering Addresses and Users for Facsimile/Scanner Functions

7. Press the [OK] key.

8. Press [Details].

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter again the item to be changed.


11. Press [End].

12. Press the [OK] key.


13. Press the [User Tools/Counter] key.

• To change the name, see "Registering Name".

• p.230 "Registering Names"

Using a fax destination as a sender


Following describes the procedure for using a fax number as the sender (sending number).

256
Fax Destination

1. Press [Details].

2. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.

3. Select [Register as] using [ ] or [ ], and then press the [OK] key.

4. Select [Sender Only] using [ ] or [ ], and then press the [OK] key.

5. Press the [Escape] key.

6. Press [End].

7. Press the [OK] key.

257
5. Registering Addresses and Users for Facsimile/Scanner Functions

To change the fax number


This section describes how to change the fax number.

1. Enter the new fax number using the number keys, and then press the [OK] key.

To program the SUB Code


This section describes how to program the SUB Code.

1. Press [Option].
5

2. Select [SUB Code] using [ ] or [ ], and then press the [OK] key.

3. Enter the SUB Code using the number keys, and then press the [OK] key.

4. Enter the password using the number keys and then press the [OK] key.

258
Fax Destination

5. Press [Exit].

To program the SEP Code


This section describes how to program the SEP Code.

1. Press [Option].

5
2. Select [SEP Code] using [ ] or [ ], and then press the [OK] key.

3. Enter the SUB Code using the number keys, and then press the [OK] key.

4. Enter the password using the number keys and then press the [OK] key.

5. Press [Exit].

259
5. Registering Addresses and Users for Facsimile/Scanner Functions

To set the International TX Mode


This section describes how to set the International TX Mode.

1. Press [Option].

2. Select [International TX Mode] using [ ] or [ ], and then press the [OK] key.

5
3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

4. Press [Exit].

To set label insertion


This section describes how to set label insertion.
When Label Insertion is set to ON, the receiver's name is printed on the fax message when it is received
at the other end.

1. Press [Option].

260
Fax Destination

2. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.

3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

4. Press [Exit].

• To change the name, see "Registering Names".

• p.230 "Registering Names"

Using the tone


This function allows the machine to send tonal signals when it is connected to a pulse dialing line (for
example: to use a special service on a tone dialing line).

1. Press [Tone].

A tone is shown as a "T" on the display.

Deleting a Fax Destination

This section describes how to delete a registered fax destination.

261
5. Registering Addresses and Users for Facsimile/Scanner Functions

• If you delete a destination that is a specified delivery destination, messages to its registered Personal
Box, for example, cannot be delivered. Be sure to check the settings in the fax function before deleting
any destinations.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

262
Fax Destination

7. Press the [OK] key.

8. Press [Details].

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Press the [Clear/Stop] key to delete the fax number, and then press the [OK] key.

11. Press [End].

12. Press the [OK] key.


13. Press the [User Tools/Counter] key.

• To delete the name, and title, see "Registering Names".

• p.230 "Registering Names"

263
5. Registering Addresses and Users for Facsimile/Scanner Functions

Registering an IP-Fax Destination

This section describes how to register an IP-Fax Destination.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

264
Fax Destination

7. Press the [OK] key.

8. Press [Details].

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Press [IP].

11. Select the protocol using [ ] or [ ], and then press the [OK] key.

12. Enter the IP-Fax destination, and then press the [OK] key.

265
5. Registering Addresses and Users for Facsimile/Scanner Functions

13. Press [Option] to select the items to be set.

14. Press the [OK] key.


15. Press [End].

16. Press the [OK] key.


5 17. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".

• p.230 "Registering Names"

Changing a Registered IP-Fax Destination

This section describes how to change an IP-Fax Destination.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

266
Fax Destination

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

267
5. Registering Addresses and Users for Facsimile/Scanner Functions

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter again the item to be changed.


11. Press [End].

12. Press the [OK] key.


5 13. Press the [User Tools/Counter] key.

• To change the name, key display and title, see "Registering Names".

• p.230 "Registering Names"

To change the protocol and IP-Fax destination


This section describes how to select the protocol.

1. Press [IP].

2. Select the protocol using [ ] or [ ], and then press the [OK] key.

268
Fax Destination

3. Enter the new IP-Fax destination and then press the [OK] key.

To program the SUB Code


This section describes how to program the SUB Code.

1. Press [Option].

5
2. Select [SUB Code] using [ ] or [ ], and then press the [OK] key.

3. Enter the SUB Code using the number keys, and then press the [OK] key.

4. Enter the password using the number keys and then press the [OK] key.

5. Press [Exit].

269
5. Registering Addresses and Users for Facsimile/Scanner Functions

To program the SEP Code


This section describes how to program the SEP Code.

1. Press [Option].

2. Select [SEP Code] using [ ] or [ ], and then press the [OK] key.

5
3. Enter the SUB Code using the number keys, and then press the [OK] key.

4. Enter the password using the number keys and then press the [OK] key.

5. Press [Exit].

To set label insertion


This section describes how to set label insertion.
When Label Insertion is set to On, the receiver's name is printed on the fax message when it is received at
the other end.

270
Fax Destination

1. Press [Option].

2. Select [Label Insertion] using [ ] or [ ], and then press the [OK] key.

3. Select [On] or [Off] using [ ] or [ ], and then press the [OK] key.

4. Press [Exit].

• To change the name, see "Registering Names".

• p.230 "Registering Names"

Deleting a Registered IP-Fax Destination

This section describes how to delete a registered IP-Fax destination.


If you delete a destination that is a specified delivery destination, messages to its registered Personal Box,
for example, cannot be delivered. Be sure to check the settings in the fax function before deleting any
destinations.

1. Press the [User Tools/Counter] key.

271
5. Registering Addresses and Users for Facsimile/Scanner Functions

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

272
Fax Destination

7. Press the [OK] key.

8. Press [Details].

9. Select [Fax Settings] using [ ] or [ ], and then press the [OK] key.

10. Press [IP] and then press the [OK] key.

11. Press the [Clear/Stop] key to delete the IP-Fax destination, then press the [OK] key twice.
12. Press [End].

13. Press the [OK] key.


14. Press the [User Tools/Counter] key.

• To change the name and title, see "Registering Names".

• p.230 "Registering Names"

273
5. Registering Addresses and Users for Facsimile/Scanner Functions

E-mail Destination
This section describes the procedure for registering, changing, and deleting E-mail Destination.
Register e-mail destinations so you do not need to enter an e-mail address every time, and can send scan
files from scanner or fax function by e-mail.
• It is easy to select the e-mail destination if you register "User (Destination) Name" as the e-mail
destination.
• You can register e-mail destinations as a group.
• You can use the e-mail address as the sender's address when sending scan files in scanner mode. If
you want to do this, set a protection code on the sender address to prevent unauthorized access.

• You can select an e-mail address from an LDAP server, and then register it in the Address Book. See

5 "Sending Scan File by E-mail", Scanner Reference.


• You can set the machine to send a Transmission Result Report by e-mail whenever a transmission is
sent. See Facsimile Reference.

Registering an E-mail Destination

This section describes how to register an e-mail destination.

• When using a e-mail destination as the sender, you must register the user code previously.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

274
E-mail Destination

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

275
5. Registering Addresses and Users for Facsimile/Scanner Functions

9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter the e-mail address using the number keys and the Quick Dial keys, and then press the
[OK] key.

11. Select [E-mail/Internet Fax Dest.] or [Internet Fax Dest. only] using [ ] or [ ], and then press
5 the [OK] key.

12. Select [On] or [Off] to specify whether or not SMTP server is to be used using [ ] or [ ], and
then press the [OK] key.

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key.

• You can enter up to 128 characters for the e-mail address.


• To register the name, see "Registering Names".

276
E-mail Destination

• p.230 "Registering Names"

Changing an E-mail Destination

This section describes how to change an e-mail destination.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
5

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

277
5. Registering Addresses and Users for Facsimile/Scanner Functions

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

5
9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.

10. Enter the new e-mail address using the number keys and the Quick Dial keys, and then press
the [OK] key.

11. Select [E-mail/Internet Fax Dest.] or [Internet Fax Dest. only] using [ ] or [ ], and then press
the [OK] key.

278
E-mail Destination

12. Select [On] or [Off] to specify whether or not SMTP server is to be used using [ ] or [ ], and
then press the [OK] key.

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key. 5
• To change the name and title, see "Registering Names".

• p.230 "Registering Names"

Deleting an E-mail Destination

This section describes how to delete an e-mail destination.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

279
5. Registering Addresses and Users for Facsimile/Scanner Functions

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

280
E-mail Destination

9. Select [E-mail Settings] using [ ] or [ ], and then press the [OK] key.

10. Press the [Clear/Stop] key to delete the mail address, then press the [OK] key.

11. Press [End].

12. Press the [OK] key.


13. Press the [User Tools/Counter] key.

• To delete the name and title, see "Registering Names".

• p.230 "Registering Names"

281
5. Registering Addresses and Users for Facsimile/Scanner Functions

Registering Folders
This section describes the procedure for registering, changing, and deleting folders.
By registering a shared folder, you can send scan files or received fax documents to it directly.
There are three types of protocol you can use:
• SMB
For sending files to shared Windows folders.
• FTP
Use when sending files to an FTP server.
• NCP
Use when sending files to a NetWare server.

5 • For details about protocols, server names, and folder levels, consult your network administrator.
• You can prevent unauthorized users from accessing folders from the machine. See "Registering a
Protection Code".
• You can only select either SMB, FTP, or NCP. If you change protocol after finishing your settings, all
previous entries are cleared.

• p.334 "Registering a Protection Code"

Registering an SMB Folder

This section describes how to register an SMB folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

282
Registering Folders

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

283
5. Registering Addresses and Users for Facsimile/Scanner Functions

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.

11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].

12. Enter the login user name, and then press the [OK] key.

13. Press [Password].

284
Registering Folders

14. Enter the password, and then press the [OK] key.

15. Enter the password again to confirm, and then press the [OK] key.

16. Press the [OK] key.

17. Press the [Escape] key.

18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

19. Select [SMB] using [ ] or [ ], and then press the [OK] key.

285
5. Registering Addresses and Users for Facsimile/Scanner Functions

20. Select [Manual Entry] or [Browse Network] using [ ] or [ ], and then press the [OK] key.

To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
21. Press [Com.Test] to check the path is set correctly.

5 22. Press [Exit].

23. Press the [Escape] key.

24. Press [End].

25. Press the [Escape] key.


26. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".


• You can enter up to 64 characters for the user name.
• You can enter up to 64 characters for the password.

286
Registering Folders

• You can enter a path using up to 128 characters.


• When [Do not Specify] is selected in step 11, the SMB User Name and SMB Password that you have
specified in Default User Name/Password (Send) of File Transfer settings applies.
• If the connection test fails, check the settings, and then try again.
• If User Authentication is specified, contact your administrator.

• p.36 "File Transfer"


• p.230 "Registering Names"

Locating the SMB folder manually


This section describes how to locate the SMB folder manually.

1. Select [Manual Entry] using [ ] or [ ], and then press the [OK] key. 5

2. Enter the path and then press the [OK] key.

If the format of the entered path is not correct, a message appears. Press [Exit], and then enter the
path again.

• Enter the path using this format: "\\ServerName\Share- Name\PathName".


• You can also enter an IPv4 address.
• You can enter a path using up to 128 characters.

Locating the SMB folder using browse network


This section describes how to locate the SMB folder using Browse Network.

287
5. Registering Addresses and Users for Facsimile/Scanner Functions

1. Select [Browse Network] using [ ] or [ ], and then press the [OK] key.

2. Select a work group using the scroll keys, and then press the [OK] key.

The client computers sharing the same network as the machine appear.
Network display only lists client computers you are authorized to access.
5 3. Select a client computer using the scroll keys, and then press the [OK] key.
Shared folders under it appear.

You can press [Up] to switch between levels.


4. Select the folder you want to register using the scroll keys, and then press [Apply].

5. Press the [OK] key.

If a login screen appears


This section describes how to log on to the machine if the login screen appears when you try to access a
folder by browsing the network.

288
Registering Folders

If you have not specified folder authentication, or if an incorrect user name or password has been entered
for folder authentication, the login screen appears.

1. Enter the login user name, and then press the [OK] key.
Enter the login user name specified for folder authentication.

2. Enter the password, and then press the [OK] key.

5
The path to the selected folder appears.
If a message appears, press [Exit], and then enter the login user name and password again.

Changing an SMB Folder

This section describes how to change settings of the registered SMB folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

289
5. Registering Addresses and Users for Facsimile/Scanner Functions

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

290
Registering Folders

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

10. Select [SMB] using [ ] or [ ], and then press the [OK] key.

11. Select [Manual Entry] or [Browse Network] using [ ] or [ ], and then press the [OK] key.

To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
12. Specify the folder.

13. Press [Com.Test] to check the path is set correctly.

14. Press [Exit].

291
5. Registering Addresses and Users for Facsimile/Scanner Functions

15. Press the [Escape] key.

16. Press [End].

17. Press the [OK] key.


18. Press the [User Tools/Counter] key.
5
• To change the name, see "Registering Names".

• p.230 "Registering Names"

Changing the protocol


This section describes how to change the protocol.

1. Select [FTP] or [NCP] using [ ] or [ ], and then press the [OK] key.

A confirmation message appears.


2. Press [Yes].

3. Enter each item again.

292
Registering Folders

Deleting an SMB Folder

This section describes how to delete the registered SMB folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

293
5. Registering Addresses and Users for Facsimile/Scanner Functions

7. Press the [OK] key.

8. Press [Details].

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.

A confirmation message appears.


11. Press [Yes].

12. Press the [Escape] key twice.

294
Registering Folders

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key.

• To delete the name, see "Registering Names".

• p.230 "Registering Names"

5
Registering an FTP Folder

This section describes how to register an FTP folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

295
5. Registering Addresses and Users for Facsimile/Scanner Functions

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
5 Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

296
Registering Folders

10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.

11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].

12. Enter the login user name, and then press the [OK] key.

13. Press [Password].

14. Enter the password, and then press the [OK] key.

15. Enter the password again to confirm, and then press the [OK] key.

297
5. Registering Addresses and Users for Facsimile/Scanner Functions

16. Press the [OK] key.

17. Press the [Escape] key.

18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

19. Select [FTP] using [ ] or [ ], and then press the [OK] key.

20. Enter the server name, and then press the [OK] key.

21. If you want to change the port number, enter the new port number, and then press the [OK]
key.
Otherwise, just press the [OK] key.

You can enter 1 to 65535.

298
Registering Folders

22. Enter the path, and then press the [OK] key.

You can also enter an IPv4 address.


23. Press [Com.Test] to check the path is set correctly.

24. Press [Exit].


5

25. Press the [Escape] key.

26. Press [End].

27. Press the [OK] key.


28. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".


• You can enter up to 64 characters for the user name.
• You can enter up to 64 characters for the password.
• You can enter a server name using up to 64 characters.

299
5. Registering Addresses and Users for Facsimile/Scanner Functions

• You can enter a path using up to 128 characters.


• You can enter an absolute path, using this format: "/user/ home/username"; or a relative path, using
this format: directory/sub-directory".
• If you leave the path blank, the login directory is assumed to be the current working directory.
• When [Do not Specify] is selected in step 11, the FTP User Name and FTP Password that you have
specified in Default User Name/Password (Send) of File Transfer settings applies. For details, see
"File Transfer".
• If the connection test fails, check the settings, and then try again.
• If User Authentication is specified, contact your administrator.

• p.36 "File Transfer"


• p.230 "Registering Names"

5
Changing an FTP Folder

This section describes how to change the registered FTP folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

300
Registering Folders

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

301
5. Registering Addresses and Users for Facsimile/Scanner Functions

10. Select [FTP] using [ ] or [ ], and then press the [OK] key.

11. To change the server name, enter the new server name, and then press the [OK] key.
Otherwise, just press the [OK] key.

12. To change the port number, enter the new port number, and then press the [OK] key.
5 Otherwise, just press the [OK] key.

13. To change the path, enter the new path, and then press the [OK] key.
Otherwise, just press the [OK] key.

14. Press [Com.Test] to check the path is set correctly.

15. Press [Exit].

302
Registering Folders

16. Press the [Escape] key.

17. When you have finished making changes, press [End].

18. Press the [OK] key.


19. Press the [User Tools/Counter] key.
5
• To change the name, see "Registering Names".

• p.230 "Registering Names"

Changing the protocol


This section describes how to change the protocol.

1. Select [SMB] or [NCP] using [ ] or [ ], and then press the [OK] key.

A confirmation message appears.


2. Press [Yes].
Changing the protocol will clear all settings made under the previous protocol.

3. Enter each item again.

303
5. Registering Addresses and Users for Facsimile/Scanner Functions

Deleting an FTP Folder

This section describes how to delete the registered FTP folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

304
Registering Folders

7. Press the [OK] key.

8. Press [Details].

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.

A confirmation message appears.


11. Press [Yes].

12. Press the [Escape] key twice.

305
5. Registering Addresses and Users for Facsimile/Scanner Functions

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key.

• To delete a name entirely, see "Registering Names".

• p.230 "Registering Names"

5
Registering an NCP Folder

This section describes how to register an NCP folder.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

306
Registering Folders

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

307
5. Registering Addresses and Users for Facsimile/Scanner Functions

10. Select [Folder Authentication] using [ ] or [ ], and then press the [OK] key.

11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].

12. Enter the login user name, and then press the [OK] key.

13. Press [Password].

14. Enter the password, and then press the [OK] key.

15. Enter the password again to confirm, and then press the [OK] key.

308
Registering Folders

16. Press the [OK] key.

17. Press the [Escape] key.

18. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

19. Select [NCP] using [ ] or [ ], and then press the [OK] key.

20. Select the connection type using [ ] or [ ], and then press the [OK] key.
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a
NetWare server, press [Bindery].

21. Select Manual Entry or Browse Network to specify the path entry method using [ ] or [ ],
and then press the [OK] key.

309
5. Registering Addresses and Users for Facsimile/Scanner Functions

To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
22. Press [Com.Test] to check the path is set correctly.

23. Press [Exit].

5 24. Press the [Escape] key.

25. Press [End].

26. Press the [OK] key.


27. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".


• You can enter up to 64 characters for the user name.
• If you select [NDS] for the connection type, after the user name, enter the context name where the
user object resides. If the user name is "user" and the context name is "context", the user name you
would enter is "user.context".
• You can enter up to 64 characters for the password.
• To specify a folder, you can either enter the path manually or locate the folder by browsing the
network.

310
Registering Folders

• When [Do not Specify] is selected, the NCP User Name and NCP Password that you have specified
in Default User Name/Password (Send) of File Transfer settings applies.
• If User Authentication is specified, contact your administrator.

• p.36 "File Transfer"


• p.230 "Registering Names"

Locating the NCP folder manually


This section describes how to locate the SMB folder manually.

1. Select [Manual Entry] using [ ] or [ ], and then press the [OK] key.

2. Enter the path and then press the [OK] key.

• If you set "Connection Type" to [NDS], and if the NDS tree name is "tree", the name of the context
including the volume is "context", the volume name is "volume" and the folder name is "folder", then
the path will be "\\tree\volume. context\folder".
• If you set "Connection Type" to [Bindery], and if the NetWare server name is "server", the volume
name is "volume" and the folder name is "folder", then the path will be "\\server\volume\folder".
• You can enter a path using up to 256 characters.
• If the connection test fails, check the settings, and then try again.

Locating the NCP folder using browse network


This section describes how to locate the NCP folder using Browse Network.

311
5. Registering Addresses and Users for Facsimile/Scanner Functions

1. Select [Browse Network] using [ ] or [ ], and then press the [OK] key.

2. If you have set "Connection Type" to [NDS], a list of items in the NDS tree appears. If you
have set "Connection Type" to [Bindery], a list of items on the NetWare server appears.

3. Search for the destination folder in the NDS tree or NetWare server, and then press [Apply].
5

You can press [Up] to switch between levels.


4. Press the [OK] key.

• Only the folders you are allowed to access appear in [Browse Network].
• If the languages used on the machine and the destination you want to view differ, the items in the list
may not appear correctly.
• Up to 100 items can be displayed in the list.

Changing an NCP Folder

This section describes how to change the registered NCP folder.

1. Press the [User Tools/Counter] key.

312
Registering Folders

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

313
5. Registering Addresses and Users for Facsimile/Scanner Functions

7. Press the [OK] key.

8. Press [Details].

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

10. Select [NCP] using [ ] or [ ], and then press the [OK] key.

11. Select the connection type using [ ] or [ ], and then press the [OK] key.
If you want to specify a folder in an NDS tree, press [NDS]. If you want to specify a folder on a
NetWare server, press [Bindery].

12. Select [Manual Entry] or [Browse Network] to specify the path entry method using [ ] or
[ ], and then press the [OK] key.

314
Registering Folders

To specify a folder, you can either enter the path manually or locate the folder by browsing the
network. See "Locating the folder manually" and "Locating the folder using Browse Network".
13. Specify the folder.

14. Press [Com.Test] to check the path is set correctly.

15. Press [Exit]. 5

16. Press the [Escape] key.

17. Press [End].

18. Press the [OK] key.


19. Press the [User Tools/Counter] key.

• To change the name, see "Registering Names".

• p.230 "Registering Names"

315
5. Registering Addresses and Users for Facsimile/Scanner Functions

Changing the protocol


This section describes how to change the protocol.

1. Select [SMB] or [FTP] using [ ] or [ ], and then press the [OK] key.

A confirmation message appears.


2. Press [Yes].
Changing the protocol will clear all settings made under the previous protocol.

3. Enter each item again.

Deleting an NCP Folder

This section describes how to delete the registered NCP folder.

1. Press the [User Tools/Counter] key


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

316
Registering Folders

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

317
5. Registering Addresses and Users for Facsimile/Scanner Functions

9. Select [Folder Info] using [ ] or [ ], and then press the [OK] key.

10. Select the protocol which is not currently selected using [ ] or [ ], and then press the [OK]
key.

A confirmation message appears.


5 11. Press [Yes].

12. Press the [Escape] key twice.

13. Press [End].

14. Press the [OK] key.


15. Press the [User Tools/Counter] key.

• To delete a name entirely, see "Registering Names".

• p.230 "Registering Names"

318
Registering Names to a Group

Registering Names to a Group


This section describes how to register names to a group.
You can register names to a group to enable easy management of e-mail addresses and folders for each
group.
To add names to a group, the groups must be registered beforehand.

• When using Scan to Folder function, you cannot send scan files to a group with over 10 folders
registered.
• The maximum number of destinations registerable to a group is 100.

• You can set a protection code to prevent unauthorized access to the folders registered in a group.
For details, see "Registering a Protection Code". 5
• p.230 "Registering Names"

Registering a Group

This section describes how to register a group.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

319
5. Registering Addresses and Users for Facsimile/Scanner Functions

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.
5

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
7. Enter the group name, and then press the [OK] key.

8. Press the [OK] key.

9. Press the [User Tools/Counter] key.

Registering Names to a Group

This section describes how to register names to a registered group.


You can put names that have been registered in the Address Book into a group.
When registering new names, you can also register groups at the same time.

320
Registering Names to a Group

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
5

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.

321
5. Registering Addresses and Users for Facsimile/Scanner Functions

7. Press the [OK] key.

8. Press [Details].

9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.

10. Select the group name to which you want to register using [ ], and then press the [OK] key.

11. Press [End].

12. Press the [OK] key.


13. Press the [User Tools/Counter] key.

Adding a Group to Another Group

This section describes how to add a group to another group.

1. Press the [User Tools/Counter] key.

322
Registering Names to a Group

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number of the group that you want to put into another group using
the number keys or the Quick Dial keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.

323
5. Registering Addresses and Users for Facsimile/Scanner Functions

8. Press [Details].

9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.

10. Select the group name to which you want to register using [ ] or [ ], and then press the
[OK] key.
5

11. Press [End].

12. Press the [OK] key.

13. Press the [User Tools/Counter] key.

Displaying Names Registered in a Group

This section describes how to display names registered in a group.


You can check the names or groups registered in each group.

1. Press the [User Tools/Counter] key.

324
Registering Names to a Group

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to display using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.

325
5. Registering Addresses and Users for Facsimile/Scanner Functions

8. Press [Details].

9. Select [Programd. User/Group] using [ ] or [ ], and then press the [OK] key.

All the user (destination) names in the specified group appear.


10. Press the [User Tools/Counter] key.
5
Removing a Name from a Group

This section describes how to remove a name from a group.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

326
Registering Names to a Group

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.

327
5. Registering Addresses and Users for Facsimile/Scanner Functions

10. Select the group name from which you want to delete using [ ] or [ ], and then press the
[OK] key.

11. Press [End].

12. Press the [OK] key.


5 13. Press the [User Tools/Counter] key.

Deleting a Group within Another Group

This section describes how to delete a group within another group.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

328
Registering Names to a Group

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number of the group that you want to delete from using the number
keys or the Quick Dial keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number. 5
7. Press the [OK] key.

8. Press [Details].

9. Select [Register Group to] using [ ] or [ ], and then press the [OK] key.

329
5. Registering Addresses and Users for Facsimile/Scanner Functions

10. Select the group you want to delete using [ ] or [ ], then confirm it by pressing [ ], and
then press the [OK] key.

11. Press [End].

12. Press the [OK] key.


5 13. Press the [User Tools/Counter] key.

Changing a Group Name

This section describes how to change a group name.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

330
Registering Names to a Group

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to change using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number. 5
7. Enter the new group name using the number keys and the Quick Dial keys, and then press
the [OK] key.

8. To change the registration number, press [Reg. No.].

9. Enter the new registration number using the number keys or the Quick Dial keys, and then
press the [OK] key.

10. Press the [OK] key.


11. Press the [User Tools/Counter] key.

331
5. Registering Addresses and Users for Facsimile/Scanner Functions

Deleting a Group

This section describes how to delete a group.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

5. Select [Delete] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to delete using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.

332
Registering Names to a Group

7. Press [Yes].

8. Press the [User Tools/Counter] key.

333
5. Registering Addresses and Users for Facsimile/Scanner Functions

Registering a Protection Code


This section describes how to register a Protection Code.
You can stop sender's names or folders being accessed by setting a protection code.
You can use this function to protect the following:
• Folders
You can prevent unauthorized access to folders.
• Sender's names
You can prevent misuse of sender's names.

Registering a Protection Code to a Single User

5 This section describes how to register a Protection code to a single user.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

334
Registering a Protection Code

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to protect using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail 5
address, or folder destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.

335
5. Registering Addresses and Users for Facsimile/Scanner Functions

10. Select [Register as] using [ ] or [ ], and then press the [OK] key.

11. Select [Destination Only], [Sender Only] or [Dest. & Sender] using [ ] or [ ], and then press
the [OK] key.

12. Select [Dest.Protect Obj.] using [ ] or [ ], and then press the [OK] key.
5

13. Select [Folder] or [Sender] using [ ] or [ ], and then press the [OK] key.

If you select [Destination Only] in [Register as], only [Folder] can be selected.
If you select [Sender Only] in [Register as], only [Sender] can be selected.
14. Select [Protect] or [Do not protect] using [ ] or [ ], and then press the [OK] key.

[Protect] or [Do not protect] can be selected for both [Folder] and [Sender] at the same time.
15. Press the [Escape] key.

336
Registering a Protection Code

16. Select [Dest.Protect Code] using [ ] or [ ], and then press the [OK] key.

17. Enter a protection code using the number keys, and then press the [OK] key.

18. Press the [Escape] key.

19. Press [End].

20. Press the [OK] key.


21. Press the [User Tools/Counter] key.

• Specify a protection code of up to eight digits. You can also specify "Protection" without specifying a
protection code.

Registering a Protection Code to a Group User

This section describes how to register a Protection Code to a Group User.

1. Press the [User Tools/Counter] key.

337
5. Registering Addresses and Users for Facsimile/Scanner Functions

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number of group you want to protect using the number keys or the
Quick Dial keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to search by name, destination list, or registration number.
7. Press the [OK] key.

338
Registering a Protection Code

8. Press [Details].

9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.

10. Select [Folder Protect] using [ ] or [ ], and then press the [OK] key.

11. Select [On] using [ ] or [ ], and then press the [OK] key.

12. Select [Dest.Protect Code] using [ ] or [ ], and then press the [OK] key.

13. Enter a protection code using the number keys, and then press the [OK] key.

339
5. Registering Addresses and Users for Facsimile/Scanner Functions

14. Press [Exit] twice.

15. Press the [OK] key.

16. Press the [User Tools/Counter] key.

5 • Specify a protection code of up to eight digits. You can also specify "Protection" without specifying a
protection code.

340
Registering SMTP and LDAP Authentication

Registering SMTP and LDAP Authentication


This section describes how to register SMTP and LDAP Authentication.

SMTP Authentication

This section describes how to register SMTP Authentication.


For each user registered in the Address Book, you can register a login user name and login password to
be used when accessing an SMTP server.
To use an SMTP server, you need to program it beforehand.

• When [Do not Specify] is selected for SMTP Authentication the User Name and Password that you
have specified in SMTP Authentication of File Transfer settings applies. For details, see "File Transfer".
5
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

341
5. Registering Addresses and Users for Facsimile/Scanner Functions

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

5
8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [SMTP Authentication] using [ ] or [ ], and then press the [OK] key.

342
Registering SMTP and LDAP Authentication

11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].

12. Enter the login user name, and then press the [OK] key.

13. Press [Password].

14. Enter the password, and then press the [OK] key.

15. Enter the password again to confirm, and then press the [OK] key.

16. Press the [Escape] key.

17. Press the [Escape] key.

343
5. Registering Addresses and Users for Facsimile/Scanner Functions

18. Press [End].

19. Press the [OK] key.


20. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".


• You can enter up to 191 characters for the user name.
• When using POP before SMTP Authentication, you can enter up to 63 characters.
• You can enter up to 128 characters for the password.
5 • To change the SMTP Authentication settings, repeat step 3 to 18.

• p.36 "File Transfer"


• p.230 "Registering Names"

LDAP Authentication

This section describes how to register LDAP Authentication.


For each user registered in the Address Book, you can register a login user name and login password to
be used when accessing an LDAP server.
To use an LDAP server, you need to program it beforehand. For details, see "Programming the LDAP server".

• When [Do not Specify] is selected for LDAP Authentication, the User Name and Password that you
have specified in Program/Change LDAP Server of Administrator Tools settings applies. For details,
see "Programming the LDAP server".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

344
Registering SMTP and LDAP Authentication

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to register using the number keys or the Quick Dial
keys, and then press the [OK] key.

You can automatically specify registration numbers 001 - 016 by pressing the Quick Dial key.
Press [Search] to specify by name, destination list, registration number, user code, fax number, e-mail
address, or folder destination.
7. Press the [OK] key.

345
5. Registering Addresses and Users for Facsimile/Scanner Functions

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [LDAP Authentication] using [ ] or [ ], and then press the [OK] key.

11. Select [Specify Other Auth. Info] using [ ] or [ ], and then press [User].

12. Enter the login user name, and then press the [OK] key.

13. Press [Password].

346
Registering SMTP and LDAP Authentication

14. Enter the password, and then press the [OK] key.

15. Enter the password again to confirm, and then press the [OK] key.

16. Press the [Escape] key.

17. Press the [Escape] key.


18. Press [End].

19. Press the [OK] key.


20. Press the [User Tools/Counter] key.

• To register the name, see "Registering Names".


• You can enter up to 128 characters for the user name.
• You can enter up to 128 characters for the password.
• To change the LDAP Authentication settings, repeat step 3 to 19.

• p.46 "Programming the LDAP server"


• p.230 "Registering Names"

347
5. Registering Addresses and Users for Facsimile/Scanner Functions

Searching
This section describes explains how to search for a user name or destination registration registered in the
address book.
You can search for the user information stored in [Address Book Management] under [Administrator Tools]
in [System Settings] by displaying a list. Alternatively, you can search by name, registration number, user
code, or fax number.
For details, about accessing Address Book Management, see “Registering Names”.

• p.230 "Registering Names"

Searching by Name
5 Search the address book using a destination or user name.

1. Press [Search].

2. Select [Search by Name] using [ ] or [ ], and then press the [OK] key.

3. Enter the name you want to search for, and then press the [OK] key. You can also search
by entering part of the name.

348
Searching

4. Press the [OK] key.

The search results appear.


5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

5
• For details about entering text, see “Entering Text”, About This Machine.

Searching from the Display List

Search the address book by displaying a list of registered user names and destinations.

1. Press [Search].

2. Select [Display List] using [ ] or [ ], and then press the [OK] key.
The list of registered user names or destination names appears.

349
5. Registering Addresses and Users for Facsimile/Scanner Functions

3. Select the destination using [ ] or [ ], then confirm it by pressing [ ], and then press the
[OK] key.

• For details about entering text, see “Entering Text”, About This Machine.

Searching by Registration Number

Search the address book using the registration number of a user destination.
5 1. Press [Search].

2. Select [Search by Registration No.] using [ ] or [ ], and then press the [OK] key.

3. Enter the registration number you want to search using the number keys, and then press the
[OK] key.

4. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

350
Searching

Searching by User Code

Search the address book using the registered user codes.

1. Press [Search].

2. Select [Search by User Code] using [ ] or [ ], and then press the [OK] key.

5
3. Enter the user code you want to search using the number keys, and then press the [OK] key.
4. Press the [OK] key.
The search results appear.

5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

Searching by Fax Number

Search the address book using the registered fax numbers.

351
5. Registering Addresses and Users for Facsimile/Scanner Functions

1. Press [Search].

2. Select [Search Fax Destination] using [ ] or [ ], and then press the [OK] key.

3. Enter the fax number you want to search using the number keys, and then press the [OK]
key.
5 To search by IP-Fax number, press [IP], enter the IP-Fax number, and then press the [OK] key.

4. Press the [OK] key.

The search results appear.


5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

Searching by E-mail Address

Search the address book using registered e-mail addresses.

352
Searching

1. Press [Search].

2. Select [Search by E-mail Address] using [ ] or [ ], and then press the [OK] key.

3. Enter the e-mail address you want to search for, and then press the [OK] key.
You can also search by entering part of the e-mail address.
5

4. Press the [OK] key.

The search results appear.


5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

Searching by Destination Folder Name

Search the address book using destination folder names.

353
5. Registering Addresses and Users for Facsimile/Scanner Functions

1. Press [Search].

2. Select [Search by Folder Name] using [ ] or [ ], and then press the [OK] key.

3. Enter the destination folder name, and then press the [OK] key.
You can also search by entering part of the destination folder name.
5

4. Press the [OK] key.

The search results appear.


5. Select the name using [ ] or [ ], then confirm it by pressing [ ], and then press the [OK]
key.

354
6. Special Operations under Windows
This chapter describes how to print files directly from Windows.

Printing Files Directly from Windows


You can print files directly using Windows commands. For example, you can print PostScript files for
PostScript 3.
Windows 2000/XP, Windows Server 2003/2003 R2
You can print files directly using lpr, rcp ftp or sftp command.
Windows Vista, Windows Server 2008
You can print files directly using lpr, ftp or sftp command.

Setup

Follow the procedure below to make network environment settings.


6
1. Enable TCP/IP with the control panel, and then set up the printer's network environment
about TCP/IP including IP addresses.
TCP/IP of the printer is set as default.
2. Install a TCP/IP in Windows to set up the network environment.
Consult the network administrator for the local setting information.
3. To print under Windows 2000/XP/Vista, Windows Server 2003/2003 R2/2008, install
“Printing service for UNIX” as the network application.

• p.363 "Using DHCP"

Using a Host Name Instead of an IPv4 Address

When a host name is defined, you can specify a printer by host name instead of IP address. The host names
vary depending on the network environment.

When using DNS


Use the host name set to the data file on the DNS server.

355
6. Special Operations under Windows

When setting the IPv4 address of a printer using DHCP


Use the printer name on the configuration page as the host name.

In other cases
Add the IP address and host name of the network printer to the hosts file on the computer used for printing.
Methods of addition vary depending on operating systems.

1. Open the hosts file using memo pad files, for instance.
The hosts file is in the following folder:
\WINNT\SYSTEM32\DRIVERS\ETC\HOSTS
“\WINNT” is the directory of the installation destination for Windows 2000/XP, and Windows
Server 2003/2003 R2/2008.
2. Add an IPv4 or IPv6address and host name to the hosts file using the following format:
192.168.15.16 host # NP
“192.168.15.16” is the IPv4 address, “host” is the printer's host name, and “#NP” is replaced by
6 comments. Insert a space or tab between “192.168.15.16” and “host”, between “host” and “#NP”
respectively, using one line for this format.
2001:DB::100 host # NP
“2001:DB::100” is the IPv6 address, “host” is the printer's host name, and “#NP” is replaced by
comments. Insert a space or tab between “2001:DB::100” and “host”, between “host” and “#NP”
respectively, using one line for this format.
3. Save the file.

• When using a host name under Windows Server 2003/2003 R2/2008, or Windows Vista with
IPv6 protocol, perform host name resolution using an external DNS server. The host file cannot be
used.

Printing Commands

The following explains printing operations using the “lpr”, “rcp”, “ftp” and “sftp” commands.
Enter commands using the command prompt window. The location of the command prompts varies
depending on operating systems:
• Windows 2000
[Start] - [Programs] - [Accessories] - [Command Prompt]
• Windows XP/Vista, Windows Server 2003/2003 R2/2008
[Start] - [All Programs] - [Accessories] - [Command Prompt]

356
Printing Files Directly from Windows

• Match the data format of the file to be printed with the emulation mode of the printer.
• If the message "print requests full" appears, no print jobs can be accepted. Try again when sessions
end. For each command, the amount of possible sessions is indicated as follows:
• lpr: 5(When the spool printing function is available: 10)
• rcp, rsh: 5
• ftp: 3
• sftp: 3
• Enter the file name in a format including the path from the directory executing commands.

lpr
When specifying a printer by IP address
c:> lpr -Sprinter's IP address [-Poption] [-ol] \path name\file name
When using a host name instead of an IP address
c:> lpr -Sprinter's host name [-Poption] [-ol] \path name\file name
6
When printing a binary file, add the “-ol” option (lowercase O, and lowercase L).
When using a printer with the host name “host” to print a PostScript file named “file 1” located in the
“C:\PRINT” directory, the command line is as follows:
c:> lpr -Shost -Pfiletype=RPS -ol C:\PRINT\file1
Printing from the virtual printer
c:> lpr -S “printer's IP address” -P[virtual printer name] [-ol] \path name\file
name

• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.

rcp
First, register the printer's host name in the hosts file.
c:> rcp [-b] \path name\file name [path name\file name...] printer's host name:
[option]
In file names, “*” and “?” can be used as wild cards.
When printing a binary file, add the “-b” option.
When using a printer with the host name “host” to print a PostScript file named “file 1” or “file 2” located
in the “C:\PRINT” directory, the command line is as follows:
c:> rcp -b C:\PRINT\file1 C:\PRINT\file2 host:filetype=RPS

357
6. Special Operations under Windows

Printing from the virtual printer


c:> rcp [-b] \path name\file name [\path name\file name...] printer's host name:
[virtual printer name]

• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.

ftp / sftp
Use the “put” or “mput” command according to the number of files to be printed.
When one file is printed
ftp> put \path name\file name [option]
Printing from the virtual printer
ftp> put \path name\file name [virtual printer name]
When multiple files are printed
ftp> mput \path name\file name [\path name\file name...] [option]
6 Follow the procedure below to print using the “ftp” command.

1. Formulate the printer's IP address or the host name of the hosts file printer as an argument
and use the “ftp” command.
% ftp “printer's IP address”
2. Enter the user name and password, and then press the [Enter] key.
For details about the user name and password, consult your network administrator.
User:
Password:
When user authentication is set, enter a login user name and password.
3. When printing a binary file, set the file mode to binary.
ftp> bin
When printing a binary file in ASCII mode, print may not come out correctly.
4. Specify files to be printed.
The following shows the examples of printing a PostScript file named “file 1” in the “C:\PRINT”
directory and printing file 1 and file 2.
ftp> put C:\PRINT\file1 filetype=RPS
ftp> mput C:\PRINT\file1 C:\PRINT\file2
5. Quit ftp.
ftp> bye

358
Printing Files Directly from Windows

• “=”, “,”, “_”, and “;” cannot be used for filenames. File names will be read as option strings.
• If you are using ftp, you cannot specify an option using the “mput” command.
• If you are using ftp, you cannot specify an option using the “pwd” command.
• If you are using sftp, you cannot specify an option using the “cd” command.
• If you are using sftp, you cannot specify an option using the “pwd” command.
• To use sftp, you must create an open key for ssh communication. Use Web Image Monitor to create
an open key. For details, see Web Image Monitor help.
• If personal authentication (Basic, Windows, LDAP, or Integrated Server Authentication) is enabled,
only authenticated users (users authenticated by login user name and password) can log on.
• For “mput” command, “*” and “?” can be used as wild cards in file names.
• When printing a binary file in ASCII mode, print may not come out correctly.
• For details about login user name and password, see Security Reference, which is the administrator's
manual.
• For details about the virtual printer configuration, see “Using the Virtual Printer”, Printer Reference.
6

359
6. Special Operations under Windows

360
7. Appendix

When Using Windows Terminal Service/Citrix


Presentation Server/Citrix XenApp
The following explains how to use Windows Terminal Service and Maintenance.

Operating Environment

The following operating systems and MetaFrame versions are supported.


Windows 2000 Server/Advanced Server
• Citrix Presentation Server 4.0
• Citrix XenApp 4.5
Windows server 2003/2003 R2
• Citrix Presentation Server 4.0
• Citrix XenApp 4.5
7
Supported Printer Drivers

When Windows Terminal Service is operating


• PCL drivers

Limitations

The following limitations apply to the Windows Terminal Service environment.


These limitations are built in Windows Terminal Service or Citrix Presentation Server/Citrix XenApp.
Windows Terminal Service
In the Windows Terminal Service environment, some of the printer driver's functions are unavailable.
In an environment where Windows Terminal Service is installed, some of the printer driver's functions
are unavailable, even if any function of Windows Terminal Service is not used. When you install
SmartDeviceMonitor for Client in an environment where the Terminal Service is running on the
Windows 2000 Server family computer, be sure to install it using the install mode. The following are
the two methods of installation using the install mode:
1. Use [Add/Remove Programs] in [Control Panel] to install SmartDeviceMonitor for Client.
2. Enter the following command in the MS-DOS command prompt:

361
7. Appendix

CHANGE USER /INSTALL


To quit the install mode, enter the following command in the MS-DOS command prompt.
CHANGE USER /EXECUTE
Citrix Presentation Server/Citrix XenApp [Auto-creating client printers]
Using [Auto-creating client printers] can select a logical printer created by copying the client's local
printer data to the MetaFrame server. We strongly recommend testing this function in your network
environment before using it for your work.
• The settings for optional equipment will not be stored in the server after the equipment is
disconnected. The settings for optional equipment will be restored to its defaults each time the
client computer logs on to the server.
• When printing a large number of bitmap images or using the server in a WAN environment over
dial-up lines such as ISDN, printing may not be possible or errors may occur, depending on
data transfer rates.
Citrix Presentation Server/Citrix XenApp [Printer driver replication]
Using [Printer driver replication] can distribute printer drivers across all servers in a server farm. We
strongly recommend testing this function in your network environment before using it for your work.
• If the printer drivers are not properly copied, install them directly onto each server.

362
Using DHCP

Using DHCP
You can use the printer in a DHCP environment. You can also register the printer NetBIOS name on a
WINS server when it is running.
• Printers that register the printer NetBIOS name on a WINS server must be configured for the WINS
server.
• Supported DHCP servers are Microsoft DHCP Server included with Windows 2000 Server, and
Windows Server 2003/2003 R2, and Windows Server 2008, and the DHCP server included with
NetWare and UNIX.
• If you do not use the WINS server, reserve the printer's IP address in the DHCP server so the same IP
address is assigned every time.
• To use the WINS server, change the WINS server setting to “active” using the control panel.
• Using the WINS server, you can configure the host name via the remote network printer port.
• DHCP relay-agent is not supported. If you use DHCP relay-agent on a network via ISDN, it will result
in increased line charges. This is because your computer connects to the ISDN line whenever a packet
is transferred from the printer.
• If there is more than one DHCP server, use the same setting for all servers. The machine operates using
data from the DHCP server that responds first.
• DHCP servers can operate in an IPv6 environment, but they cannot be configured to allocate IPv6 7
addresses or obtain host names.

Using AutoNet

If the printer IPv4 address is not automatically assigned by the DHCP server, a temporary IP address starting
with 169.254 and not used on the network can be automatically selected by the printer.

• The IP address assigned by the DHCP server is given priority over that selected by AutoNet.
• You can confirm the current IPv4 address on the configuration page.
• When AutoNet is running, the NetBIOS name is not registered on the WINS server.
• The machine cannot communicate with devices that do not have the AutoNet function. However, this
machine can communicate with Macintosh computers running Mac OS X 10.2.3. or higher.

363
7. Appendix

Configuring the WINS Server


This section explains configuring the WINS server.
The printer can be configured to register its NetBIOS name with a WINS server when the power is turned
on. This enables the NetBIOS name of the printer to be specified from SmartDeviceMonitor for Admin even
in a DHCP environment.

• The WINS server is supported with Windows 2000 Servers WINS Manager.
• For details about the WINS server settings, see Windows Help.
• If there is no reply from the WINS server, the NetBIOS name is registered by broadcast.
• The NetBIOS name can be entered using up to 13 alphanumeric characters.

Using Web Image Monitor

1. Start a Web browser.


2. Enter “http://(machine's IP address or host name) /” in the address bar to access the printer
whose settings you want to change.
7 Top Page of Web Image Monitor appears.
3. Click [Login].
The dialog box for entering the user name and password appears.
4. Enter the user name and password, and then click [Login].
Contact your administrator for information about the settings.
5. In the left area, click [Configuration].
6. Click [IPv4] in the "Network" area.
7. Check that [Active] is selected for [WINS] in the [Ethernet] or [Ethernet + Wireless LAN]
column, and then enter the WINS server IPv4 address in [Primary WINS Server] and
[Secondary WINS Server].
8. Click [OK].
9. Quit Web Image Monitor.

• p.117 "Using Web Image Monitor"

Using telnet

You can also use telnet to configure WINS.

364
Configuring the WINS Server

Use the “wins” command to make the setting with telnet.

• p.156 "Remote Maintenance by telnet"

365
7. Appendix

Using the Dynamic DNS Function


Dynamic DNS is a function which dynamically updates (registers and deletes) records (A record, AAAA
record, CNAME, and PTR record) managed by the DNS server. When a DNS server is part of the network
environment to which this printer, a DNS client, is connected, records can be dynamically updated using
this function.

Updating

Updating procedure varies depending on whether the printer IP address is static or acquired by DHCP.

• Dynamic update using message authentication (TSIG, SIG(0)) is not supported.


For a static IPv4 setting
If the IP address or host name is changed, the A and PTR records are updated. If the A record is
registered, CNAME is also registered. CNAMEs that can be registered are as follows:
• Ethernet and IEEE 802.11
RNPXXXXXX (XXXXXX represents the last 3 hexadecimal bytes of the MAC address)

7 However, if CNAME (PRNXXXXXX) overlaps with the host name, CNAME will not be registered.
For DHCPv4 settings
As a substitute for the printer, the DHCP server updates the record, and one of the following occurs:
• When the printer acquires the IP address from the DHCP server, the DHCP server updates the A
and PTR records.
• When the printer acquires the IP address from the DHCP server, the printer updates the A record,
and the DHCP server updates the PTR record.
If the A record is registered, CNAME is also registered. CNAMEs that can be registered are as follows:
• Ethernet and IEEE 802.11
RNPXXXXXX (XXXXXX represents the last 3 hexadecimal bytes of the MAC address)
For IPv6 settings
This machine updates the AAAA record and PTR record.
It also updates CNAME when the AAAA record is updated.
When a stateless address is newly set, it is automatically registered on the DNS server also.

• When the dynamic DNS function is not used, records managed by the DNS server must be updated
manually, if the printer's IP address is changed.
• To update the record using the printer, the DNS server has to have one of the following:

366
Using the Dynamic DNS Function

• No security settings made.


• If security settings are made, an IP-specified client (this printer) permits updating.

DNS Servers Targeted for Operation

For static IP setting


• Microsoft DNS servers with standard Windows 2000 Server/Windows Server 2003/2003
R2/2008 features
• BIND 8.2.3 or higher
For DHCP setup, when the printer updates the A record
• Microsoft DNS servers with standard Windows 2000 Server/Windows Server 2003/2003
R2/2008 features
• BIND 8.2.3 or higher
For DHCP setup, when the DHCP server updates records
• Microsoft DNS servers with standard Windows 2000 Server/Windows Server 2003/2003
R2/2008 features
• BIND 8.2.3 or higher
• DNS servers with standard NetWare 5 (or a higher version) features 7
For IPv6 setting
• Microsoft DNS servers with standard Windows Server 2003/2003 R2/2008 features
• BIND 9.2.3 or higher

DHCP Servers Targeted for Operation

As a substitute for the printer, DHCP servers capable of updating the A record and PTR record are as
follows:
• Microsoft DHCP servers with standard Windows 2000 Server (Service Pack 3 or higher versions)/
Windows Server 2003/2003 R2/2008 features
• ISC DHCP 3.0 or higher
• DHCP server with standard NetWare 5 features

Setting the Dynamic DNS Function

Make settings with telnet using the “dns” command.

367
7. Appendix

• For details, see “Remote Maintenance by telnet”.

• p.156 "Remote Maintenance by telnet"

368
Precautions

Precautions
Please pay attention to the following when using the network interface board. When configuration is
necessary, follow the appropriate procedures below.

Connecting a Dial-Up Router to a Network

When using NetWare (file server)


If the NetWare file server and printer are on opposite sides of a router, packets are sent back and forth
continuously, possibly incurring communications charges. Because packet transmission is a feature of
NetWare, you need to change the configuration of the router. If the network you are using does not allow
you to configure the router, configure the machine instead.
Configuring the router
Filter packets so they do not pass over the dial-up router.

• The MAC address of the filtering printer is printed on the printer configuration page.
• For more information about configuring the printer if the router cannot be configured, see the following 7
instructions.

Configuring the printer with NetWare

1. Following the setup method described earlier in this manual, configure the file server.
2. Set the frame type for NetWare environment.

• For more information about selecting a frame type, see “Interface Settings”.

• p.28 "Interface Settings"

Configuring the printer without NetWare

1. When not printing, the network interface board sends packets over the network. Set
NetWare to “inactive”.

• For more information about selecting a protocol, see “Interface Settings”.

• p.28 "Interface Settings"

369
7. Appendix

When using network utility


If the machine is connected to a network, observe the following points when setting up the machine or
changing settings:
For more details, see the operating instructions and Help for the ScanRouter delivery software and
DeskTopBinder.
When a dial-up router is connected in a network environment
The settings for the delivery server to be connected must be made appropriately for the machine with
the ScanRouter delivery software, Auto Document Link, or DeskTopBinder. In addition, set up
connected devices using the I/O settings of the ScanRouter delivery software administration utility.
If the network environment changes, make the necessary changes for the delivery server using the
machine, the administration utility of client computers, Auto Document Link, and DeskTopBinder. Also,
set the correct information for the connected devices using the I/O settings of the ScanRouter delivery
software administration utility.

• If the machine is set up to connect to the delivery server via a dial-up router, the router will dial and
go online whenever a connection to the delivery server is made. Telephone charges may be incurred.
When connected to a computer that uses dial-up access

7 • Do not install the ScanRouter delivery software on a computer which uses dial-up access.
• When using the ScanRouter delivery software, DeskTopBinder, Auto Document Link, or a TWAIN
driver on a computer with dial-up access, a dial-up connection may be performed when
connecting to the delivery server and other equipment, depending on the setup. If the computer
is set up to connect to the Internet automatically, the confirmation dialog box will not appear,
and telephone charges may be incurred without your being aware of it. To prevent unnecessary
connections, the computer should be set up so the confirmation dialog box always appears
before establishing a connection. Do not make unnecessary connections when using the above
listed software.

NetWare Printing

• IPv6 cannot be used on this function.

Form feed
You should not configure form feed on NetWare. Form feed is controlled by the printer driver on Windows.
If NetWare form feed is configured, the printer might not work properly. If you want to change form feed
settings, always configure them using Windows.

370
Precautions

• Under Windows 2000/XP and Windows Server 2003/2003 R2/2008, clear the [Form feed] check
box on the [NetWare Settings] tab in the printer properties dialog box.

Banner page
You should not configure a banner page on NetWare. If you want to change the banner page setting,
always configure it using Windows.
• Under Windows 2000/XP and Windows Server 2003/2003 R2/2008, clear the [Enable banner]
check box on the [NetWare Settings] tab in the printer properties dialog box.

Printing after resetting the machine


After resetting the remote printer, the connection from the print server will be cut off for about 30-40 seconds
before re-connecting. Depending on the NetWare specification, print jobs may be accepted, but they will
not be printed during this interval.
When using the machine as a remote printer, wait about two minutes after resetting before attempting to
print.

371
7. Appendix

When the IEEE 802.11 Interface Unit is Installed


Please pay attention to the following when using the IEEE 802.11 interface on the network.
When using the wireless LAN interface on the network, note the following:
When moving the machine
Detach the antennas when relocating the machine locally.
After moving the machine, reattach the antennas, ensuring that:
• The antennas are positioned clear of obstacles.
• There is 40 to 60 mm (1.6 to 2.4 inches) between the antennas, so that they do not touch.
• The exposure glass cover and the ADF do not knock the antennas.
If the network area provides poor radio environment
Where radio wave conditions are bad, the network may not function due to interrupted or failed
connections. When checking the wireless LAN signal and the access point, follow the procedure
below to improve the situation:
• Position the access point nearer to the machine.
• Clear the space between access point and machine of obstructions.
• Move radio wave generating appliances, such as microwaves, away from the machine and
7 access point.

• For more information about access point radio wave conditions, refer to the access point manual.

372
Configuring IEEE 802.1X

Configuring IEEE 802.1X


IEEE 802.1X can be configured using Web Image Monitor's administrator mode. You can select four types
of EAP authentication method: EAP-TLS, LEAP, EAP-TTLS and PEAP. Note that each EAP authentication
method has different configuration settings and authentication procedures.
Types and requirements of certificates are as follows:
If a certificate is required, configure all settings after installing the certificate.
EAP Types Requiring a “Site Certificate”
EAP-TLS, EAP-TTLS, PEAP (Necessary except LEAP)
EAP Types Requiring a “Site Certificate” and a “Device Certificate”
EAP-TLS, PEAP (Phase 2 is for TLS only)

• To set IEEE 802.1X, you must enable SSL. For details about setting SSL configuration, see “Protection
Using Encryption”, Security Reference.
• To set IEEE 802.1X, you must use Web Image Monitor.

Installing a Site Certificate


7
1. Access the authentication server and obtain the CA certificate.
Methods of obtaining certificates differ according to the operating system you are using.
2. Log on to Web Image Monitor in the administrator mode.
3. Click [Configuration].
4. [Site Certificate] in the “Security” area.
5. Click [Browse] on the “Site Certificate to Import” window, and then select the CA certificate
you obtained.
6. Click [Import].
7. Check that the imported certificate's [Status] shows “Trustworthy”.
If [Site Certificate Check] shows [Active], and the [Status] of the certificate shows [Untrustworthy],
communication might not be possible.
8. Click [OK].
9. Click [Logout].
10. Quit the Web Image Monitor.

373
7. Appendix

Installing Device Certificate

1. Log on to Web Image Monitor in the administrator mode.


2. Click [Configuration].
3. Click [Device Certificate] in “Security” area.
4. Click [Certificate 2] on the “Device Certificate” window, and then click [Request].
5. Enter appropriate “Common Name” and “Country Code” on “Certificate Information”
page, and then click [OK].
6. “Updating...” appears. Wait for about 2 minutes, and then click [OK].
7. Click [Details], shown in the “Device Certificate” window as the memo pad icon for
“Requesting”.
8. Select all, and then copy the entire “Text for Requested Certificate” text that is displayed in
the “Certificate Status” window.
9. Access the certificate authority server, and then obtain the CA signified certificate using the
text copied into “Text for Requested Certificate” windows.
Obtaining the certificate differs depending on the environment you want to use.
10. Click [Certificate 2] on “Device Certificate” window, and then click [Install].

7 11. Using a text editor, open the CA signified certificate downloaded in step 9, and then copy
over all the text.
12. In the [Install Certificate] window, paste all the text copied into the CA signified certificate.
13. Click [OK].
14. “Updating...” appears. Wait for about one or two minutes, and then click [OK].
15. Check that the “Device Certificate” shows “Installed”.
16. Click [Certificate 2] on “Certification”, and then click [OK].
17. Click [Logout].
18. Quit Web Image Monitor.

• If you request two certificates simultaneously, the certificate authority might not display either
certificate. Click [Cancel Request] to cancel the request.
• You can select [Certificate 1-4] in the “Device Certificate” window. Note that if you select [Certificate
1] in the “Device Certificate” window, you must select “Certificate 1” in the “IEEE 802.1X (WPA/
WPA2)” drop down menu in the “Certification” window.
• Click [Cancel Request] to cancel the request for the server certificate.
• If “Not found” appears after clicking [OK] in steps 6 and 14, wait one or two minutes, and then click
[Refresh].

374
Configuring IEEE 802.1X

Setting Items of IEEE 802.1X for Ethernet

1. Log on to Web Image Monitor in the administrator mode.


2. Click [Configuration].
3. Select [IEEE 802.1X (WPA/WPA2)] in “Security” area.
4. In “User Name”, enter the user name set in the RADIUS server.
5. Enter the domain name in “Domain Name”.
6. Select “EAP Type”. Configurations differ according to the EAP Type.
EAP-TLS
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.
• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.
• Enter the host name of the RADIUS server on “Server ID”.
LEAP
• Click Change in “Password”, and then enter the password set in the RADIUS server.
EAP-TTLS
• Click [Change] in “Password”, and then enter the password set in the RADIUS server.
7
• Click [Change] in “Phase 2 User Name”, and then enter the user name set in the RADIUS server.
• Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in “Phase 2 Method”.
• Certain methods might not be available, depending on the RADIUS server you want to use.
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.
• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.
• Enter the host name of the RADIUS server in “Server ID”.
PEAP
• Click [Change] in “Password”, and then enter the password set in the RADIUS server.
• Click [Change] on “Phase 2 User Name”, and then enter the user name set in the RADIUS server.
• Select [MSCHAPv2] or [TLS] in “Phase 2 Method”.
• When you select [TLS], you must install “IEEE 802.1X Client Certificate”.
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.
• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.
• Enter the host name of the RADIUS server on “Server ID”.

375
7. Appendix

7. Click [OK].
8. Click [Configuration], and then click [Interface Settings] in the “Interface” area.
9. Select [Active] in “Ethernet Security”.
10. Click [OK].
11. Click [Logout].
12. Quit the Web Image Monitor.

• If there is a problem with settings, you might not be able to communicate with the printer. To identify
the problem, print a network summary.
• If you cannot identify the problem, reset the printer interface to normal, and then repeat the procedure
from the beginning.

Setting Items of IEEE 802.1X for Wireless LAN

1. Log on to Web Image Monitor in the administrator mode.


2. Click [Configuration].
3. Select [IEEE 802.1X (WPA/WPA2)] in “Security” area.
7 4. In “User Name”, enter the user name set in the RADIUS server.
5. Enter the domain name in “Domain Name”.
6. Select “EAP Type”. Configurations differ according to the EAP Type.
EAP-TLS
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.
• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.
• Enter the host name of the RADIUS server on “Server ID”.
LEAP
• Click Change in “Password”, and then enter the password set in the RADIUS server.
EAP-TTLS
• Click [Change] in “Password”, and then enter the password set in the RADIUS server.
• Click [Change] in “Phase 2 User Name”, and then enter the user name set in the RADIUS server.
• Select [CHAP], [MSCHAP], [MSCHAPv2], [PAP], or [MD5] in “Phase 2 Method”.
• Certain methods might not be available, depending on the RADIUS server you want to use.
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.

376
Configuring IEEE 802.1X

• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.


• Enter the host name of the RADIUS server in “Server ID”.
PEAP
• Click [Change] in “Password”, and then enter the password set in the RADIUS server.
• Click [Change] on “Phase 2 User Name”, and then enter the user name set in the RADIUS server.
• Select [MSCHAPv2] or [TLS] in “Phase 2 Method”.
• When you select [TLS], you must install “IEEE 802.1X Client Certificate”.
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in “Authenticate Server Certificate”.
• Select [On] or [Off] in “Trust Intermediate Certificate Authority”.
• Enter the host name of the RADIUS server on “Server ID”.
7. Click [OK].
8. Click [Configuration], and then click [Wireless LAN Settings] in the “Interface” area.
9. Select [Wireless LAN] in “LAN Type”.
10. Select [Infrastructure Mode] in “Communication Mode”.
11. Enter the alphanumeric characters (a-z, A-Z, or 0-9) in [SSID] according to the access point
you want to use.
7
12. Select [WPA] in “Security Method”.
13. Select [TKIP] or [CCMP (AES)] in “WPA Encryption Method” according to the access point
you want to use.
14. Select [WPA] or [WPA2] in “WPA Authentication Method”.
15. Click [OK].
16. Click [Logout].
17. Quit the Web Image Monitor.

• If there is a problem with settings, you might not be able to communicate with the printer. To identify
the problem, print a network summary.
• If you cannot identify the problem, reset the printer interface to normal, and then repeat the procedure
from the beginning.

377
7. Appendix

Specifications
Interface 1000BASE-T, 100BASE-TX, 10BASE-T, IEEE
802.11 a/b/g

Frame type Ethernet II, IEEE 802.2, IEEE 802.3, SNAP

Printer (LAN-Fax) TCP/IP (IPv4/IPv6)

LPR

RSH

RCP

DIPRINT

FTP

IPP

IPP-SSL

7 RHPP

IPX/SPX (NetWare)

AppleTalk

SMB

WSD (Printer)

Internet Fax TCP/IP (IPv4/IPv6)

SMTP

SMTP-C

POP3

IMAP4

Network Scanner IPv4/IPv6

FTP

FTP-C

378
Specifications

SMTP

SMTP-C

POP3

SMB

NCP

WSD (Scanner)

Management Function TCP/IP (IPv4/IPv6)

RSH

RCP

FTP

FTP-C

SNMP

SNMP-C
7
HTTP

HTTPS

TELNET (mshell)

NBT

DHCP

DNS

DNS-C

LDAP

To use IPP and SMB, use the SmartDeviceMonitor for Client port.
To use IPP under Windows XP/Vista, Windows Server 2003/2003 R2/2008, use the Standard IPP port.
To use IPP under Windows 2000, use SmartDeviceMonitor for Client.
AppleTalk can be used when the PostScript 3 module is installed.
Under Windows Vista, or Windows Server 2008, WSD (Printer), WSD (Scanner), uses the WSD Port.
Only the rsh/rcp commands in Unix OS standard command set are supported.

379
7. Appendix

Copyrights
expat

• The software including controller, etc. (hereinafter "software") installed on this product uses the expat
under the conditions mentioned below.
• The product manufacturer provides warranty and support to the software of the product including the
expat, and the product manufacturer makes the initial developer and copyright holder of the expat,
free from these obligations.
• Information relating to the expat is available at:
http://expat.sourceforge.net/
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Centre, Ltd. and Clark Cooper.
Copyright (c) 2001, 2002 Expat maintainers.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software,
and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

7 The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

NetBSD

1. Copyright Notice of NetBSD


For all users to use this product:
This product contains NetBSD operating system:
For the most part, the software constituting the NetBSD operating system is not in the public domain; its
authors retain their copyright.
The following text shows the copyright notice used for many of the NetBSD source code. For exact copyright
notice applicable for each of the files/binaries, the source code tree must be consulted.
A full source code can be found at http://www.netbsd.org/.

380
Copyrights

Copyright (c) 1999, 2000 The NetBSD Foundation, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment:
This product includes software developed by The NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 7
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
2. Authors Name List
All product names mentioned herein are trademarks of their respective owners.
The following notices are required to satisfy the license terms of the software that we have mentioned in
this document:
• This product includes software developed by the University of California, Berkeley and its contributors.
• This product includes software developed by Jonathan R. Stone for the NetBSD Project.
• This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
• This product includes software developed by Manuel Bouyer.
• This product includes software developed by Charles Hannum.
• This product includes software developed by Charles M. Hannum.
• This product includes software developed by Christopher G. Demetriou.
• This product includes software developed by TooLs GmbH.
• This product includes software developed by Terrence R. Lambert.
• This product includes software developed by Adam Glass and Charles Hannum.
• This product includes software developed by Theo de Raadt.

381
7. Appendix

• This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD
Project.
• This product includes software developed by the University of California, Lawrence Berkeley
Laboratory and its contributors.
• This product includes software developed by Christos Zoulas.
• This product includes software developed by Christopher G. Demetriou for the NetBSD Project.
• This product includes software developed by Paul Kranenburg.
• This product includes software developed by Adam Glass.
• This product includes software developed by Jonathan Stone.
• This product includes software developed by Jonathan Stone for the NetBSD Project.
• This product includes software developed by Winning Strategies, Inc.
• This product includes software developed by Frank van der Linden for the NetBSD Project.
• This product includes software developed for the NetBSD Project by Frank van der Linden.
• This product includes software developed for the NetBSD Project by Jason R. Thorpe.
• The software was developed by the University of California, Berkeley.
• This product includes software developed by Chris Provenzano, the University of California, Berkeley,
and contributors.
7
Sablotron

Sablotron (Version 0.82) Copyright (c) 2000 Ginger Alliance Ltd. All Rights Reserved.
a) The application software installed on this product includes the Sablotron software Version 0.82
(hereinafter, "Sablotron 0.82"), with modifications made by the product manufacturer. The original code
of the Sablotron 0.82 is provided by Ginger Alliance Ltd., the initial developer, and the modified code of
the Sablotron 0.82 has been derived from such original code provided by Ginger Alliance Ltd.
b) The product manufacturer provides warranty and support to the application software of this product
including the Sablotron 0.82 as modified, and the product manufacturer makes Ginger Alliance Ltd., the
initial developer of the Sablotron 0.82, free from these obligations.
c) The Sablotron 0.82 and the modifications thereof are made available under the terms of Mozilla Public
License Version 1.1 (hereinafter, "MPL 1.1"), and the application software of this product constitutes the
"Larger Work" as defined in MPL 1.1. The application software of this product except for the Sablotron
0.82 as modified is licensed by the product manufacturer under separate agreement (s).
d) The source code of the modified code of the Sablotron 0.82 is available at: http://support-
download.com/services/device/sablot/notice082.html
e) The source code of the Sablotron software is available at: http://www.gingerall.com
f) MPL 1.1 is available at: http://www.mozilla.org/MPL/MPL-1.1.html

382
Copyrights

JPEG LIBRARY

The software installed on this product is based in part on the work of the Independent JPEG Group.

SASL

CMU libsasl
Tim Martin
Rob Earhart
Rob Siemborski
Copyright (c) 2001 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name "Carnegie Mellon University" must not be used to endorse or promote products derived
from this software without prior written permission.
7
For permission or any other legal details, please contact:
Office of Technology Transfer
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15213-3890
(412) 268-4387, fax: (412) 268-7395
tech-transfer@andrew.cmu.edu
4. Redistributions of any form whatsoever must retain the following acknowledgment: "This product
includes software developed by Computing Services at Carnegie Mellon University (http://
www.cmu.edu/computing/)."
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

383
7. Appendix

MD4

Copyright (c) 1990-2, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc.
MD4 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived
from the RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing
the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or
the suitability of this software for any particular purpose. It is provided "as is" without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.

MD5

Copyright (c) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc.
MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
7 License is also granted to make and use derivative works provided that such works are identified as "derived
from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing
the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or
the suitability of this software for any particular purpose. It is provided "as is" without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.

Samba(Ver 3.0.4)

For SMB transmission, this machine uses Samba ver 3.0.4 (hereinafter referred to as Samba 3.0.4).
Copyright (c) Andrew Tridgell 1994-1998.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675
Mass Ave, Cambridge, MA 02139, USA.

384
Copyrights

• The source code for SMB transmission by this machine can be downloaded from the following website:
• http://support-download.com/services/scbs

RSA BSAFE®

• This product includes RSA BSAFE(c) cryptographic or security protocol software from RSA Security
Inc.
• RSA and BSAFE are registered trademarks of RSA Security Inc. in the United States and/or other
countries. 7
• RSA Security Inc. All rights reserved.

Open SSL

Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved.


Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products
derived from this software without prior written permission. For written permission, please contact openssl-
core@openssl.org.

385
7. Appendix

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their
names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://
www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product
includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
7 This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation
was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared
to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc.,
code; not just the SSL code. The SSL documentation included with this distribution is covered by the same
copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If
this package is used in a product, Eric Young should be given attribution as the author of the parts of the
library used. This can be in the form of a textual message at program startup or in documentation (online
or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used
are not cryptographic related :-).

386
Copyrights

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application
code) you must include an acknowledgement: "This product includes software written by Tim Hudson
(tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and put under another distribution licence.
[including the GNU Public Licence.]

Open SSH

The licences which components of this software fall under are as follows. First, we will summarize and say 7
that all components are under a BSD licence, or a licence more free than that.
OpenSSH contains no GPL code.
1)
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland All rights reserved
As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any
derived versions of this software must be clearly marked as such, and if the derived work is incompatible
with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
[Tatu continues]
However, I am not implying to give any licenses to any patents or copyrights held by third parties, and the
software includes parts that are not under my direct control. As far as I know, all included source code is
used in accordance with the relevant license agreements and can be used freely for any purpose (the GNU
license being the most restrictive); see below for details.
[However, none of that term is relevant at this point in time. All of these restrictively licenced software
components which he talks about have been removed from OpenSSH, i.e.,
- RSA is no longer included, found in the OpenSSL library
- IDEA is no longer included, its use is deprecated
- DES is now external, in the OpenSSL library
- GMP is no longer used, and instead we call BN code from OpenSSL

387
7. Appendix

- Zlib is now external, in a library


- The make-ssh-known-hosts script is no longer included
- TSS has been removed
- MD5 is now external, in the OpenSSL library
- RC4 support has been replaced with ARC4 support from OpenSSL
- Blowfish is now external, in the OpenSSL library
[The licence continues]
Note that any information and cryptographic algorithms used in this software are publicly available on the
Internet and at any major bookstore, scientific library, and patent office worldwide. More information can
be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use only at
your own responsibility. You will be responsible for any legal consequences yourself; I am not making any
claims whether possessing or using this is legal or not in your country, and I am not taking any responsibility
on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
7 WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR
THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a
BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that this copyright notice is retained.

388
Copyrights

THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE
OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3)
One component of the ssh source code is under a 3-clause BSD license, held by the University of California,
since we pulled these parts from original Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission. 7
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
4)
Remaining components of the software are provided under a standard 2-term BSD licence with the
following names as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Kevin Steves

389
7. Appendix

Daniel Kouril
Wesley Griffin
Per Allansson
Jason Downs
Solar Designer
Todd C. Miller
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
7 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5)
Portable OpenSSH contains the following additional licenses:
c) Compatibility code (openbsd-compat)
Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/ subdirectory
are licensed as follows:
Some code is licensed under a 3-term BSD license, to the following copyright holders:
Todd C. Miller
Theo de Raadt
Damien Miller
Eric P. Allman
The Regents of the University of California
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.

390
Copyrights

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.

Open LDAP

The OpenLDAP Public License Version 2.8, 17 August 2003.


Redistribution and use of this software and associated documentation ("Software"), with or without
modification, are permitted provided that the following conditions are met: 7
1. Redistributions in source form must retain copyright statements and notices,
2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of
conditions, and the following disclaimer in the documentation and/or other materials provided with the
distribution, and
3. Redistributions must contain a verbatim copy of this document.
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a
version number. You may use this Software under terms of this license revision or under the terms of any
subsequent revision of the license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS "AS IS"
AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S) OR
OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

391
7. Appendix

The names of the authors and copyright holders must not be used in advertising or otherwise to promote
the sale, use or other dealing in this Software without specific, written prior permission. Title to copyright
in this Software shall at all times remain with copyright holders.
OpenLDAP is a registered trademark of the OpenLDAP Foundation.
Copyright (c) 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All Rights
Reserved. Permission to copy and distribute verbatim copies of this document is granted.

Heimdal

Copyright (c) 1997-2005 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm,
Sweden). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote
7 products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.

IPSTM print language emulations

Copyright (c) 1987-2006 Zoran Corporation. All rights reserved.

392
Trademarks

Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or countries.
Apple, AppleTalk, Bonjour, EtherTalk, Macintosh, Mac OS, Mac OS X, and TrueType are registered
trademarks of Apple Inc, registered in the U.S. and other countries.
Citrix® and MetaFrame® are registered trademarks of Citrix Systems, Inc.
IPS is a trademark or registered trademark of Zoran Corporation and/or its subsidiaries in the United States
or other countries.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Monotype is a registered trademark of Monotype Imaging Inc.
NetWare, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through, X/
Open Company Limited.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all right to those marks.
7
The proper names of the Windows operating systems are as follows:
*The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
*The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
*The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise

393
7. Appendix

*The product names of Windows Server 2003 are as follows:


Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
*The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
*The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

394
INDEX
A Deleting a fax destination...................................261
Deleting a group.................................................332
Account for e-mail notification...........................151
Deleting a group within another group.............328
Ad-hoc Channel....................................................33
Deleting a registered IP-Fax destination...........271
Adding a group to another group.....................322
Deleting a registered name................................233
Address book......................................................225
Deleting a user code...........................................241
Address Book
Deleting an e-mail destination...........................279
Print List...............................................................................41
Deleting an FTP folder.........................................304
Address Book Management.................................40
Deleting an NCP folder......................................316
Admin. E-mail Address..........................................38
Deleting an SMB registered folder....................293
Administrator Authentication Management........43
Delivery Option.....................................................36
Administrator mode............................................. 120
DHCP...................................................................363
Administrator Tools................................................40
DHCPv6...............................................................363
AOF........................................................................44
Dial-up router......................................................369
Authentication information..................................235
Direct printing......................................................355
Auto Logout Timer.................................................27
Display Contrast....................................................22
Auto Off Timer.......................................................26
Display panel.........................................................16
Auto Specify Sender Name..................................39
Display/Clear/Print Counter Per User................42
AutoNet................................................................363
Display/Print Counter...........................................42
B Displayed information.........................................204
Bidirectional Communication...............................32 Displaying names registered in a group...........324
Displaying the counter for each user.................244
C
DNS Configuration...............................................29
Changing a fax destination................................254 Domain Name.......................................................29
Changing a group name....................................330 Dynamic DNS......................................................366
Changing a Registered IP-Fax destination........266
E
Changing a registered name.............................231
Changing a user code........................................238 E-mail
ethernet...............................................................................76
Changing an e-mail destination.........................277
wireless LAN......................................................................77
Changing an FTP folder......................................300
E-mail Communication Port..................................38
Changing an NCP registered folder..................312
E-mail destination................................................274
Changing an SMB folder...................................289
E-mail Reception Interval......................................38
Clearing the number of prints.............................248
E-mail Storage in Server.......................................39
Communication Mode..........................................33
Effective Protocol...................................................29
Connecting the telephone line...........................101
Energy Saver Timer...............................................26
Connecting to the interfaces.................................61
Enhanced Ext. Charge Unit..................................43
Copier Auto Reset Timer.......................................26
etherconfig...........................................................168
Copy Count Display..............................................22
Ethernet interface...................................................62
Copyrights...........................................................380
Ethernet Speed......................................................30
D Extended Security..................................................43
DDNS Configuration.............................................29 External Charge Unit Mng....................................43
Default User Name/Password (send).................39 External telephone..............................................101
Delete All Logs.......................................................45

395
F IPsec........................................................................29
IPv4 Gateway Address.........................................28
Facsimile Auto Reset Timer...................................26
IPv6......................................................................172
Fax destination....................................................251
IPv6 Gateway Address.........................................28
Fax E-mail Account...............................................39
IPv6 Stateless Address Autoconfiguration...........28
Fax number..........................................................251
File Transfer............................................................36 K
Firmware Version...................................................44 Key Counter Management...................................43
Fixed USB Port.......................................................45 Key Repeat.............................................................23
Format of on-demand e-mail messages............154
L
ftp.......................................196, 202, 204, 216, 356
Function Priority.....................................................22 LAN Type...............................................................31
Function Reset Timer..............................................22 Laws and regulations............................................15
LDAP.......................................................................46
G changing............................................................................. 53
General Features...................................................21 deleting...............................................................................54
Gigabit ethernet interface.....................................63 programming.....................................................................46

Group LDAP authentication............................................344


registering names to group............................................320 LDAP Search..........................................................44
Guest mode.........................................................120 Legal prohibition.................................................... 15
Limitations.............................................................361
H
Line type...............................................................101
Host name............................................................355 Locating the NCP folder using browse network......
Host Name.............................................................31 ..............................................................................311
Locating the SMB folder manually............287, 311
I
Locating the SMB folder using Browse Network....
IEEE 1284 interface..............................................66 ..............................................................................287
IEEE 802.11 a/b/g interface Login
checking the signal............................................................68 administrator mode.........................................................122
connecting..........................................................................66 Web Image Monitor.......................................................120
setup procedure.................................................................67 lpr.................................................................196, 356
IEEE 802.11 interface........................................372
M
IEEE 802.1X........................................................373
device certificate.............................................................374 Machine IPv4 Address..........................................28
ethernet............................................................................375 Machine IPv6 Address..........................................28
site certificate...................................................................373 Machine Name.....................................................31
wireless LAN....................................................................376 Machine status....................................................148
IEEE 802.1X Authentication for Ethernet.............31 Managing names in the address book.............227
info...............................................................202, 204 Managing users and machine usage................228
Input Prime.............................................................32 Max. Reception E-mail Size.................................38
Interface Settings...................................................28 Measurement Unit.................................................23
Internet Fax Message..............................................................216
ethernet...............................................................................72
Monitoring printers..............................................147
wireless LAN......................................................................74
IP address...............................................................14
IPP.........................................................................171

396
N Permit SSL/TLS Communication...........................31
Ping Command......................................................31
Names of Major Items..........................................13
POP before SMTP..................................................37
NCP Delivery Protocol..........................................29
POP3/IMAP4 Settings.........................................37
NetWare..............................................................106
Preventing unauthorized user access to shared
banner page....................................................................371
folders from the machine....................................228
form feed..........................................................................370
Print I/F Setting List................................................34
printing.............................................................................370
Print job information
NetWare 3.x..............................................107, 111 ftp.....................................................................................204
NetWare 4.x..............................................108, 113 info...................................................................................204
NetWare 5......................................... 108, 109, 113 rcp....................................................................................204
NetWare 5.1.....................................108, 109, 113 rsh.....................................................................................204
NetWare 6......................................... 108, 109, 113 sftp....................................................................................204
NetWare 6.5.....................................108, 109, 113 Print log information
Network.................................................................28 ftp.....................................................................................204
prnlog...............................................................................204
Network delivery scanner
rcp....................................................................................204
ethernet...............................................................................83
rsh.....................................................................................204
wireless LAN......................................................................84
sftp....................................................................................204
Network interface board configuration............205
Print Priority............................................................22
Network Security Level...................................44, 45
Print server
Network settings
NetWare 4.x...................................................................108
file transfer..........................................................................98
NetWare 5......................................................................108
interface settings................................................................92
NetWare 5.1..................................................................108
Network TWAIN scanner NetWare 6......................................................................108
ethernet...............................................................................89
NetWare 6.5..................................................................108
wireless LAN......................................................................90
Print Server
Note.......................................................................13 NetWare 3.x...................................................................107
Notice..................................................................... 12 Printer Auto Reset Timer........................................27
NW Frame Type.................................................... 30 Printer Bypass Paper Size.....................................24
O Printer configuration
ftp.....................................................................................202
Optional handset................................................101
info...................................................................................202
P rcp....................................................................................202
rsh.....................................................................................202
Panel Key Sound...................................................22 sftp....................................................................................202
Paper Tray Priority
Printer server........................................................105
copier..................................................................................25
fax.......................................................................................25
Printer status
ftp.....................................................................................196
printer.................................................................................. 25
rcp....................................................................................196
Paper Type rsh.....................................................................................196
bypass tray.........................................................................24
sftp....................................................................................196
tray 1-3...............................................................................25
status................................................................................196
Parallel Communication Speed............................32
Printer Status
Parallel Interface....................................................32 lpr.....................................................................................196
Parallel Timing.......................................................32 Printer/LAN-Fax
Permit SNMPv3 Communication..........................31 ethernet...............................................................................69

397
wireless LAN......................................................................70 NetWare 4.x...................................................................113
Printing commands NetWare 5......................................................................113
ftp.....................................................................................356 NetWare 5.1..................................................................113
lpr.....................................................................................356 NetWare 6......................................................................113
rcp....................................................................................356 NetWare 6.5..................................................................113
sftp....................................................................................356 Removing a name from a group........................326
Printing the counter for all users.........................247 Restore Factory Defaults.......................................34
Printing the counter for each user.......................245 Restore IEEE 802.1X Authentication to Defaults.....
prnlog...................................................................204 ................................................................................31
Program/Change/Delete LDAP Server..............43 rsh...............................................196, 202, 204, 216
Program/Change/Delete Realm........................44 S
Program/Change/Delete User Text...................21
Scan to folder function
Pure IP environment ethernet...............................................................................80
NetWare 5......................................................................109
wireless LAN......................................................................81
NetWare 5.1..................................................................109
Scanner Auto Reset Timer.....................................27
NetWare 6......................................................................109
NetWare 6.5..................................................................109 Search
List.....................................................................................349
R Searching
e-mail address.................................................................352
rcp.....................................196, 202, 204, 216, 356
fax number.......................................................................351
Reading the display...............................................16
folder name.....................................................................353
Realm...................................................................... 56 name................................................................................348
changing............................................................................. 58
registration number.........................................................350
deleting...............................................................................58
user code.........................................................................351
programming.....................................................................56
Security Method....................................................33
Reception Protocol................................................37
Selection Signal Status..........................................32
Registering a fax destination..............................252
Sending e-mail by quick dial.............................228
Registering a Group............................................319
Sending fax by quick dial...................................227
Registering a protection code............................334
Sending scanned files to a shared folder directly...
Registering a protection code to a group user........ ..............................................................................228
..............................................................................337
Set Date..................................................................27
Registering a protection code to a single user........
..............................................................................334 Set Time..................................................................27
Registering a user code......................................235 sftp.....................................196, 202, 204, 216, 356
Registering an e-mail destination.......................274 Signal Control........................................................32
Registering an FTP folder....................................295 SmartDeviceMonitor for Admin.........................131
address information........................................................145
Registering an IP-Fax destination.......................264
comment..........................................................................143
Registering an NCP folder..................................306
Energy Saver Mode.......................................................141
Registering an SMB folder.................................282 exporting the information on about the number of pages
Registering folders...............................................282 printed..............................................................................137
Registering names...............................................230 fax journal........................................................................144
Registering names to a group............................319 installing...........................................................................132
locking the menus............................................................134
Remote maintenance..........................................156
machine status.................................................................142
Remote printer
name................................................................................143
NetWare 3.x...................................................................111
network interface board.................................................133

398
new users.........................................................................139 help..................................................................................168
number of sheets printed................................................136 hostname.........................................................................169
paper type.......................................................................135 ifconfig.............................................................................169
resetting the number of pages printed...........................137 info...................................................................................170
restricting functions..........................................................139 ipsec.................................................................................171
setting a password..........................................................141 logout...............................................................................172
spool print........................................................................145 lpr.....................................................................................172
User Information..............................................................135 netware............................................................................173
user management tool....................................................136 pathmtu............................................................................174
SmartDeviceMonitor for Client..........................147 prnlog...............................................................................175
IPP.....................................................................................148 rhpp..................................................................................175
machine status.................................................................148 route.................................................................................175
monitoring printers..........................................................147 set.....................................................................................177
SMB Computer Name..........................................30 show.................................................................................180
slp.....................................................................................180
SMB Work Group.................................................30
smb...................................................................................180
SMTP authentication...........................................341
snmp.................................................................................181
SMTP Authentication.............................................36 sntp...................................................................................184
SMTP Server..........................................................36 spoolsw............................................................................185
SNMP...................................................................195 ssdp..................................................................................186
SSID Setting...........................................................33 ssh.....................................................................................186
status.....................................................................196 status................................................................................187
Supported printer drivers....................................361 syslog...............................................................................187
upnp.................................................................................187
Symbol...................................................................13
web..................................................................................188
syslog...................................................................216
wiconfig...........................................................................189
System Auto Reset Timer.......................................26 wins..................................................................................192
System log information wsmfp...............................................................................193
ftp.....................................................................................216
Timer Settings.........................................................26
rcp....................................................................................216
To change the fax number..................................258
rsh.....................................................................................216
sftp....................................................................................216 To change the SEP code............................259, 270
syslog...............................................................................216 To change the SUB code...........................258, 269
To set label insertion...................................260, 270
T
To set the international TX mode........................260
telnet.....................................................................156 Top Page..............................................................118
8021x..............................................................................157 Trademarks..........................................................393
access..............................................................................158
Transfer Log Setting...............................................45
appletalk..........................................................................159
Tray Paper Settings................................................24
authfree............................................................................160
autonet.............................................................................160
Tray Paper Size.....................................................24
bonjour.............................................................................161 U
devicename.....................................................................163
dhcp.................................................................................163 USB interface.........................................................65
dhcp6...............................................................................164 User Authentication Management.......................42
diprint...............................................................................165 User tools...............................................................18
dns....................................................................................165 change the settings............................................................18
domainname...................................................................167 quit the settings...................................................................19
etherauth..........................................................................168 Using keys..............................................................16

399
V
Virtual printer.......................................................356
W
Warm-up Beeper..................................................22
Web Image Monitor...........................................117
administrator mode.........................................................120
auto e-mail notification...................................................153
e-mail notification............................................................150
guest mode......................................................................120
help..................................................................................129
log out..............................................................................120
login.................................................................................120
mail authentication..........................................................152
menu.................................................................................120
mode................................................................................120
on-demand e-mail notification.......................................154
setting items.....................................................................123
top page..........................................................................118
WINS Configuration.............................................29
WINS server........................................................364
telnet.................................................................................364
Web Image Monitor.......................................................364
Wireless LAN................................................33, 372
Wireless LAN interface
checking the signal............................................................68
connecting..........................................................................66
setup procedure.................................................................67
Wireless LAN Signal.............................................34
WSD scanner
ethernet...............................................................................86
wireless LAN......................................................................87

400 EN USA D069-6901


Copyright © 2008
Operating instructions Network and System Settings Guide

Type for 917/LD117/MP 171/Aficio MP 171


Type for 917F/LD117F/MP 171F/Aficio MP 171F
Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171 SPF

EN USA D069-6901
PostScript 3 Supplement

1 Windows Configuration
2 Mac OS Configuration
3 Using PostScript 3
4 Printer Utility for Mac
5 Appendix
6
7
8
9
10
11

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Note................................................................................................................................................................8
About IP Address............................................................................................................................................8
Laws and Regulations.........................................................................................................................................9
Legal Prohibition.............................................................................................................................................9
1. Windows Configuration
Using the DeskTop Binder-SmartDeviceMonitor for Client Port...................................................................11
Installing DeskTop Binder-SmartDeviceMonitor for Client.......................................................................11
Installing the PostScript 3 Printer Driver (Windows 2000 - TCP/IP).......................................................12
Installing the PostScript 3 Printer Driver (Windows 2000 - IPP)..............................................................13
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - TCP/IP)....
.......................................................................................................................................................................14
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2 - IPP)...........
.......................................................................................................................................................................16
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008 - TCP/IP)...............17
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008 - IPP).......................18
Changing the Port Settings DeskTop Binder-SmartDeviceMonitor for Client.........................................20
Using the Standard TCP/IP Port......................................................................................................................22
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................22
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............23
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................24
Using the LPR Port.............................................................................................................................................26
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................26
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............27
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................28
Using as the Windows Network Printer..........................................................................................................30
Installing the PostScript 3 Printer Driver (Windows 2000).......................................................................30
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............31
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................32
Using the WSD port.....................................................................................................................................33

1
Using as the NetWare Print Server / Remote Printer....................................................................................35
When using the PostScript 3 Printer Driver................................................................................................35
Installing the Printer Driver Using USB............................................................................................................36
Windows 2000 - USB.................................................................................................................................36
Windows XP, Windows Server 2003 / 2003 R2 - USB.........................................................................37
Windows Vista, Windows Server 2008 - USB.........................................................................................38
Troubleshooting for using USB...................................................................................................................39
Printing with Parallel Connection....................................................................................................................40
Installing the PostScript 3 printer driver (Windows 2000).......................................................................40
Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 2003 R2)...............41
Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)...............................42
If a Message Appears during Installation......................................................................................................44
Making Option Settings for the Printer...........................................................................................................46
Setting Up the Printer Driver............................................................................................................................47
Windows 2000 - Accessing the Printer.....................................................................................................47
Windows XP, Windows Server 2003 / 2003 R2 - Accessing the Printer Properties...........................48
Windows Vista, Windows Server 2008 - Accessing the Printer Properties............................................50
2. Mac OS Configuration
Mac OS............................................................................................................................................................53
Installing the PostScript 3 Printer Driver and PPD File...............................................................................53
Setting Up PPD Files.....................................................................................................................................54
Setting Up Options......................................................................................................................................54
Installing Adobe Type Manager................................................................................................................55
Installing Screen fonts..................................................................................................................................55
Changing to EtherTalk.................................................................................................................................56
Mac OS X.........................................................................................................................................................57
Installing the PPD Files.................................................................................................................................57
Setting Up the PPD File................................................................................................................................57
Setting Up Options......................................................................................................................................58
Using USB Interface.....................................................................................................................................58
Using Bonjour (Rendezvous).......................................................................................................................59
Changing to EtherTalk.................................................................................................................................59
Configuring the Printer.....................................................................................................................................61

2
3. Using PostScript 3
Setting Up Options...........................................................................................................................................63
Printing a Document.........................................................................................................................................64
Job Type.......................................................................................................................................................64
User Code....................................................................................................................................................77
Paper Size....................................................................................................................................................78
Reduce/Enlarge..........................................................................................................................................78
Scale.............................................................................................................................................................79
Print On.........................................................................................................................................................79
Fit to Paper....................................................................................................................................................80
Input Slot.......................................................................................................................................................80
Orientation...................................................................................................................................................81
Rotate by 180 degrees...............................................................................................................................81
Copies...........................................................................................................................................................81
Orientation Override...................................................................................................................................82
Layout/Booklet............................................................................................................................................82
Page Order..................................................................................................................................................83
Draw Border.................................................................................................................................................83
Duplex Printing.............................................................................................................................................83
Collate..........................................................................................................................................................85
Reverse Order Print......................................................................................................................................85
Paper Type...................................................................................................................................................86
Watermark...................................................................................................................................................86
Watermark Text...........................................................................................................................................86
Watermark Font...........................................................................................................................................87
Watermark Size...........................................................................................................................................87
Watermark Angle........................................................................................................................................87
Watermark Style..........................................................................................................................................88
Dithering.......................................................................................................................................................88
Image Smoothing.........................................................................................................................................89
Print Mode....................................................................................................................................................90
4. Printer Utility for Mac
Installing Printer Utility for Mac.......................................................................................................................91

3
Starting Printer Utility for Mac.........................................................................................................................92
Mac OS........................................................................................................................................................92
Mac OS X.....................................................................................................................................................92
Printer Utility for Mac Functions.......................................................................................................................93
Downloading PS Fonts................................................................................................................................94
Displaying Printer's Fonts.............................................................................................................................94
Deleting Fonts...............................................................................................................................................95
Initializing the Printer Disk...........................................................................................................................95
Page Setup...................................................................................................................................................96
Printing Fonts Catalog..................................................................................................................................96
Printing Fonts Sample...................................................................................................................................96
Renaming the Printer....................................................................................................................................96
Restarting the Printer....................................................................................................................................97
Downloading PostScript Files......................................................................................................................97
Selecting the Zone.......................................................................................................................................98
Displaying the Printer Status........................................................................................................................99
Launching the Dialogue Console................................................................................................................99
5. Appendix
Trademarks.....................................................................................................................................................101
INDEX...........................................................................................................................................................103

4
• Change the user name and password of the administrator using Web Image Monitor.
For details, see “Setting Up the Machine”, Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Printer Guide
• Quick Reference Fax Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For “UNIX Supplement”, please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.

6
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

7
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.

Note

Contents of this manual are subject to change without prior notice.


Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

About IP Address

In this manual, “IP address” covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.

8
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.

9
10
1. Windows Configuration

Using the DeskTop Binder-SmartDeviceMonitor 1


for Client Port
Installing DeskTop Binder-SmartDeviceMonitor for Client

• To install DeskTop Binder-SmartDeviceMonitor for Client under Windows 2000 / XP Professional /


Vista and Windows Server 2003 / 2003 R2 / 2008, you must have an account that has Manage
Printers permission. Log on as an Administrator.
• Install DeskTop Binder-SmartDeviceMonitor for Client before installing the printer driver when using
the DeskTop Binder-SmartDeviceMonitor for Client port.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
4. Click [DeskTopBinder SmartDeviceMonitor for Client].
5. Select an interface language, and then click [Next >].
6. The message to quit all other applications appears. Quit all applications, and then click [Next
>].
7. The software license agreement appears in the [License Agreement] dialog box. After
reading through its contents, click [Yes].
8. Click [Full install] or [Custom install].
[Full install] installs all required applications: DeskTopBinder Lite and SmartDeviceMonitor for
Client.
[Custom install] installs selected applications.
9. Follow the instructions on the display and click [Next >] to proceed to the next step.
10. After the installation is completed, select one of the options to restart the computer either
now or later, and click [Complete].
Restart the computer to complete installation.

11
1. Windows Configuration

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
1 the auto play program to run.
• To stop installation of the selected software, click [Cancel] before installation is complete.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows 2000 - TCP/IP)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer], and then click [Next >].
7. Click [Create a new port:].
8. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
9. Click [TCP/IP], and then click [Search].
A list of printers using TCP/IP appears.
10. Select the printer you want to use, and then click [OK].
Only printers that respond to a broadcast from the computer appear. To use a machine not listed
here, click [Specify Address], and then enter the IP address or host name of the machine.
11. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
12. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.

12
Using the DeskTop Binder-SmartDeviceMonitor for Client Port

13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
The printer driver installation starts. 1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows 2000 - IPP)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer attached to this computer], and then click [Next >].
7. Click [Create a new port:].
8. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
9. Click [IPP].
10. In the [Printer URL] box, enter “http://(machine's IP address or host name)/printer” as the
printer's address.
If the server authentication is issued, to enable SSL (a protocol for encrypted communication), enter
“https://(machine's IP address or host name)/printer” (Internet Explorer 5.01, or a higher version
must be installed).
(example IP address: 192.168.15.16)

13
1. Windows Configuration

http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter “http://machine's IP address or host name/ipp” as the printer's address.
1 If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
11. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
name of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
12. Click [Detailed Settings] to configure proxy server, the IPP user name and other settings.
Specify the necessary settings, and then click [OK].
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
13. Click [OK].
14. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
15. Change the printer name if you want, and then click [Next >].
16. Specify whether or not to share the printer, and then click [Next >].
17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2 - TCP/IP)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

14
Using the DeskTop Binder-SmartDeviceMonitor for Client Port

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK]. 1
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer attached to this computer.], and then click [Next >].
7. Click [Create a new port:].
8. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
9. Click [TCP/IP], and then click [Search].
A list of printers using TCP/IP appears.
10. Select the printer you want to use, and then click [OK].
Only printers that respond to a broadcast from the computer appear. To use a machine not listed
here, click [Specify Address], and then enter the IP address or host name of the machine.
11. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
12. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

15
1. Windows Configuration

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2 - IPP)

1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer attached to this computer.], and then click [Next >].
7. Click [Create a new port:].
8. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
9. Click [IPP].
10. In the [Printer URL] box, enter “http://(machine's IP address or host name)/printer” as the
printer's address.
If the server authentication is issued, to enable SSL (a protocol for encrypted communication), enter
“https://(machine's IP address or host name)/printer” (Internet Explorer 5.01, or a higher version
must be installed).
(example IP address: 192.168.15.16)
http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter “http://machine's IP address or host name/ipp” as the printer's address.
If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.

16
Using the DeskTop Binder-SmartDeviceMonitor for Client Port

11. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
one of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
12. Click [Detailed Settings] to make necessary settings.
1
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
13. Click [OK].
14. Check that the name of the printer driver you want to install is selected, and then click [Next
>].
15. Change the name of the printer if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
16. Specify whether or not to share the printer, and then click [Next >].
17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008
- TCP/IP)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• f your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.

17
1. Windows Configuration

3. Select an interface language, and then click [OK].


The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,

1 Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local printer attached to this computer.].
6. Click [Create a new port:].
7. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
8. Click [TCP/IP], and then click [Search].
A list of printers using TCP/IP appears.
9. Select the printer you want to use, and then click [OK].
Only printers that respond to a broadcast from the computer appear. To use a machine not listed
here, click [Specify Address], and then enter the IP address or host name of the machine.
10. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
11. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
12. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008
- IPP)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.

18
Using the DeskTop Binder-SmartDeviceMonitor for Client Port

• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.
1
1. Quit all applications currently running.
2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local printer attached to this computer.].
6. Click [Create a new port:].
7. Click [DeskTop Binder - SmartDeviceMonitor], and then click [Next >].
8. Click [IPP].
9. In the [Printer URL] box, enter “http://(machine's IP address or host name)/printer” as the
printer's address.
If the server authentication is issued, to enable SSL (a protocol for encrypted communication), enter
“https://(machine's IP address or host name)/printer” (Internet Explorer 5.01, or a higher version
must be installed).
(example IP address: 192.168.15.16)
http://192.168.15.16/printer
https://192.168.15.16/printer
You can enter “http://machine's IP address or host name/ipp” as the printer's address.
If the address is “192.168.001.010”, you must enter it as “192.168.1.10” to connect to the machine.
10. Enter a name for identifying the printer in [IPP Port Name]. Use a name different from the
one of any existing port.
If a name is not specified here, the address entered in the [Printer URL] box becomes the IPP port
name.
11. Click [Detailed Settings] to make necessary settings.
For information about the settings, see DeskTop Binder-SmartDeviceMonitor for Client Help.
12. Click [OK].

19
1. Windows Configuration

13. Check that the name of the printer driver you want to install is selected, and then click [Next
>].
14. Change the name of the printer if you want, and then click [Next >].

1 Select the [Yes] check box to configure the printer as default.


15. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Changing the Port Settings DeskTop Binder-SmartDeviceMonitor for Client

Follow the procedure below to change the DeskTop Binder-SmartDeviceMonitor for Client settings, such
as TCP/IP timeout, recovery/parallel printing, and printer groups.

Windows 2000:

1. Open the [Printers] window from the [Start] menu.


2. Click the icon of the printer you want to use. On the [File] menu, click [Properties].
The printer properties appears.
3. On the [Ports] tab, click [Configure Port].
The [Port Configuration] dialog box appears.

Windows XP, Windows Server 2003 / 2003 R2:

1. Open the [Printers and Faxes] window from the [Start] menu.
The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use. On the [File] menu, click [Properties].
The printer properties appears.
3. Click the [Port] tab, and then click [Configure Port].
The [Port Configuration] dialog box appears.

20
Using the DeskTop Binder-SmartDeviceMonitor for Client Port

• For TCP/IP, timeout setting can be configured.


• User, proxy, and timeout settings can be configured for IPP.

• For information about these settings, see DeskTop Binder-SmartDevice-Monitor for Client Help. 1
Windows Vista, Windows Server 2008:

1. Open the [Printers] window from [Control Panel] on the [Start] menu.
The [Printers] window appears.
2. Right - click the icon of the printer you want to use, and then click the [Properties].
The printer properties appear.
3. Click the [Port] tab, and then click [Configure Port].
The [Port Configuration] dialog box appears.
• For TCP/IP, timeout setting can be configured.
• User, proxy, and timeout settings can be configured for IPP.

• For information about these settings, see DeskTop Binder-SmartDevice-Monitor for Client Help.

How to enable Recovery/Parallel Printing


If no settings on the [Recovery/Parallel Printing] tab are available, follow the procedure below.

1. Start DeskTop Binder-SmartDeviceMonitor for Client, and then right-click the DeskTop
Binder-SmartDeviceMonitor for Client icon on the taskbar.
2. Click [Extended Features Settings], and then select the [Set Recovery/Parallel Printing for
each port] check box.
3. Click [OK] to close the [Extended Features Settings] dialog box.

21
1. Windows Configuration

Using the Standard TCP/IP Port

1 Installing the PostScript 3 Printer Driver (Windows 2000)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer], and then click [Next >].
7. Click [Create a new port:].
8. Click [Standard TCP/IP Port], and then click [Next >].
9. Click [Next >] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
10. Enter the printer name or IP address in the [Printer Name or IP Address] box.
The [Port Name] text box automatically obtains a port name. Change this name if necessary.
When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”.
11. Click [Next >].
12. Click [Finish] in the [Add Standard TCP/IP Printer Port Wizard-dialog box.
13. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
14. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
15. Click [Next >].
16. Specify whether or not to share the printer, and then click [Next >].

22
Using the Standard TCP/IP Port

17. Specify whether or not to print a test page, and then click [Next >].
18. Click [Finish].
The printer driver installation starts.
1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer attached to this printer], and then click [Next >].
7. Click [Create a new port:].
8. Click [Standard TCP/IP Port] in [Create a new port], and then click [Next >].

23
1. Windows Configuration

9. Click [Next >] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
10. Enter the printer name or IP address in the [Printer Name or IP Address] box.
The [Port Name] text box automatically obtains a port name. Change this name if necessary.
1 When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”.
11. Click [Next >].
12. Click [Finish] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
13. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
14. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
15. Specify whether or not to print a test page, and then click [Next >].
16. Click [Finish].
The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the Standard TCP/IP Port. Use the DeskTop Binder-
SmartDeviceMonitor port.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.

24
Using the Standard TCP/IP Port

5. Click [Local printer attached to this printer].


6. Click [Create a new port:].
7. Click [Standard TCP/IP Port] in [Create a new port], and then click [Next >].
8. Click [Next >] in the [Add Standard TCP/IP Printer Port Wizard] dialog box. 1
9. Enter the printer name or IP address in the [Printer Name or IP Address] box.
The [Port Name] text box automatically obtains a port name. Change this name if necessary.
When screen for Device selection appears, select “RICOH NetworkPrinter Driver C Model”.
10. Click [Next >].
11. Click [Finish] in the [Add Standard TCP/IP Printer Port Wizard] dialog box.
12. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
13. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
14. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

25
1. Windows Configuration

Using the LPR Port

1 Installing the PostScript 3 Printer Driver (Windows 2000)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce,
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer], and then click [Next >].
7. Click [Create a new port:].
8. Click [LPR Port], and then click [Next >].
9. Enter the printer's IP address in the [Name or address of server providing lpd] box.
10. Enter “Ip” in the [Name of printer or print queue on that server] box, and then click [OK].
11. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
12. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.
13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.

26
Using the LPR Port

• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 / 1
2003 R2)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the LPR Port. Use the DeskTop Binder-SmartDeviceMonitor
port.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Select [My Computer], and then click [Next >].
6. Click [Local Printer attached to this computer.], and then click [Next >].
7. Click [Create a new port:].
8. Click [LPR Port] in [Create a new port], and then click [Next >].
9. Enter the printer's IP address in the [Name or address of server providing lpd] box.
10. Enter “Ip” in the [Name of printer or print queue on that server box], and then click [OK].
11. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
12. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.

27
1. Windows Configuration

13. Specify whether or not to share the printer, and then click [Next >].
14. Specify whether or not to print a test page, and then click [Next >].
15. Click [Finish].
1 The printer driver installation starts.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• In an IPv6 environment, you cannot use the LPR Port. Use the DeskTop Binder-SmartDeviceMonitor
port.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local Printer attached to this computer.].
6. Click [Create a new port:].
7. Click [LPR Port] in [Create a new port], and then click [Next >].
8. Enter the printer's IP address in the [Name or address of server providing lpd] box.
9. Enter “Ip” in the [Name of printer or print queue on that server box], and then click [OK].
10. Check that the name of the machine whose driver you want to install is selected, and then
click [Next >].
11. Change the printer name if you want, and then click [Next >].
Select the [Yes] check box to configure the printer as default.

28
Using the LPR Port

12. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens, 1
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

29
1. Windows Configuration

Using as the Windows Network Printer

1 Installing the PostScript 3 Printer Driver (Windows 2000)

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Network printer], and then click [Next >].
7. Select the location method from the [Locate Your Printer] screen, and then click [Next >].
8. Double-click the computer name you want to use as a print server in the [Shared printers]
window.
9. Select the printer you want to use, and then click [Next >].
10. The printer driver installation starts.
11. Click [Next >].
Select the [Yes] check box to configure the printer as default.
12. Click [Finish].
Restart the computer to complete installation.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

30
Using as the Windows Network Printer

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)

1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
• If you print with a Windows XP or Windows Server 2003 / 2003 R2 print server, DeskTop Binder-
SmartDeviceMonitor notification functions may not be possible for the client.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [A network printer, or a printer attached to another computer] and then click [Next >].
7. Select [Browse for a printer], and then click [Next >].
8. Double-click the computer name you want to use as a print server in the [Shared printers]
window.
9. Select the printer you want to use, and then click [Next >].
10. The printer driver installation starts.
11. Click [Next >].
Select the [Yes] check box to configure the printer as default.
12. Click [Finish].
Restart the computer to complete installation.

31
1. Windows Configuration

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
1 • Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• If you print from a print server connected to the printer using the DeskTop Binder-
SmartDeviceMonitor port, the client cannot use Recovery Printing and Parallel Printing.
• If you print with a Windows Vista or Windows Server 2008 print server, DeskTop Binder-
SmartDeviceMonitor notification functions may not be possible for the client.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [A network printer, or a printer attached to another computer].
6. Select [Browse for a printer], and then click [Next >].
7. Double-click the computer name you want to use as a print server in the [Shared printers]
window.
8. Select the printer you want to use, and then click [Next >].
9. The printer driver installation starts.

32
Using as the Windows Network Printer

10. Click [Next >].


Select the [Yes] check box to configure the printer as default.
11. Click [Finish].
Restart the computer to complete installation. 1
• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

Using the WSD port

This section explains installation when using the WSD port.

• The WSD Port can be used under Windows Vista or Windows Server 2008.
• To install under Windows Vista or Windows Server 2008, you must have an account that has Manage
Printers permission. Log on as an Administrator.
• If the machine is connected using the WSD port, bi-directional communication is not possible. For
details about bi-directional communication, see "Making Option Settings for the Printer".
• You can connect to the machine only if both the machine and computer are on the same network
segment, or "Network discovery" is enabled. For details, see Windows Help.

1. Quit all applications currently running.


2. Click [Start], and then click [Network].
The [Network] window appears, and the device search begins automatically.
3. Using as the NetWare Print Server / Remote Printer
If the [User Account Control] dialog box appears, click [Continue].
The [Found New Hardware] dialog box appears.
4. Click [Locate and install driver software (Recommended)].
If the [User Account Control] dialog box appears, click [Continue].
The [Found New Hardware] window appears.
5. Click [Don't search online].
6. Click [Browse my computer for driver software (advanced)].

33
1. Windows Configuration

7. Insert the provided CD-ROM into the computer's CD-ROM drive.


If the [AutoPlay] dialog box appears, click the [close] button and then proceed to step 8.
8. Click [Browse...], and then specify a location for the printer driver.
1 If the CD-ROM drive letter is D, the printer driver's source files are stored in “D:\DRIVERS\PS\
(Language) \XP_VISTA\DISK1”.
9. Click [Next].
If the [Windows can't verify the publisher of this driver software] message appears, click [Install this
driver software anyway].
10. Click [Close].
If installation is successful, the icon of the printer connected to the "WSD" port is added to the [Printers]
window.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
• The port name that follows "WSD" uses random character strings. It cannot be changed freely.
• To stop the installation, click [Cancel] before the installation is complete. When re-installing the WSD
Port, right-click the machine's icon in the [Network] window, and then click [Uninstall].

• p.46 "Making Option Settings for the Printer"

34
Using as the NetWare Print Server / Remote Printer

Using as the NetWare Print Server / Remote


Printer
1
When using the PostScript 3 Printer Driver

• In an IPv6 environment, Netware servers cannot be used.


Follow the procedure below to set up the PostScript 3 printer driver.

1. In the [Printers] or [Printers and Faxes] window, open the printer properties.
2. Click the [Device Settings] tab.
3. Select a [No] on the [Send CTRL+D before job] and [Send CTRL+D after job], and then click
[OK].
4. Click [OK] to close the printer properties dialog box.

35
1. Windows Configuration

Installing the Printer Driver Using USB


This section explains how to install printer drivers using USB.
1
• Make sure that machine is connected to the computer's USB ports using the USB interface cable.
• Before installing, check that only the operating system is running on the computer and no print jobs
are in progress.
• The printer drivers can be installed from the CD-ROM provided with this machine.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Vista x64, or Windows Server
2003 / 2003 R2 / 2008 x64, you must download the printer driver from the manufacturer's Web
site. Select this printer and the operating system you are using, and then download it.

Windows 2000 - USB

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.

1. Connect the machine to the computer using the USB cable.


Connect the USB cable firmly.
2. In the Found New Hardware Wizard display, click [Search for a suitable driver for my device
[recommended]], and then click [Next >].
3. Select the [Specify location] check box, and then click [Next >].
4. Insert the CD-ROM into the CD-ROM drive.
5. When Auto Run starts, click [Exit].
To disable Auto Run, press the left [Shift] key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
6. Specify the location where the source files of the printer driver is stored.
If the CD-ROM drive is D, the source files of the printer driver are stored in the following location:
• PostScript 3

36
Installing the Printer Driver Using USB

D:\DRIVERS\PS\XP_VISTA\ (Language) \DISK1


7. Check the printer driver location, and then click [OK].
8. Click [Next >].
9. Click [Finish]. 1
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB001” port is added to the [Printers] window.

• When Auto Run starts, click [Exit].


• To disable Auto Run, press the left [Shift] key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
• The number after “USB” varies depending on the number of printers connected.

Windows XP, Windows Server 2003 / 2003 R2 - USB

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
The printer drivers can be installed from the CD-ROM provided with this machine.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
CD-ROM provided.

1. Connect the machine to the computer using the USB cable.


Connect the USB cable firmly.
2. In the Found New Hardware Wizard display, click Install the software automatically
(Recommended), and then click [Next >].
3. Insert the CD-ROM into the CD-ROM drive.
If Auto Run starts, click [Cancel], and then [Exit].
To disable Auto Run, press the left [Shift] key when inserting the CD-ROM into the drive and keep it
pressed until the computer finishes reading from the CD-ROM.
4. Select the [Include this location in the search] check box under [Search for the best driver in
these location], and then click [Browse] to select the printer driver location.
If the CD-ROM drive is D, the source files of the printer driver are stored in the following location:
• PostScript 3
D:\DRIVERS\PS\XP_VISTA\ (Language) \DISK1

37
1. Windows Configuration

5. Check the printer driver location, and then click [Next >].
6. Click [Continue].
7. Click [Finish].
1 If installation is successful, the icon of the printer connected to the “USB001” port is added to the
[Printers] window.

• If Auto Run starts, click [Cancel], and then [Exit].


• The number after “USB” varies depending on the number of printers connected.

Windows Vista, Windows Server 2008 - USB

• Installing a printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
If the printer driver has already been installed, plug and play is enabled, and the icon of the printer
connected to the “USB” port is added to the [Printers] window.
The printer drivers can be installed from the supplied CD-ROM provided with this machine.
If the printer driver is not installed, follow the plug-and-play instructions of the printer to install it from the
supplied CD-ROM.

1. Connect the machine to the computer using the USB cable.


Connect the USB cable firmly.
2. In the Found New Hardware display, select [Locate and install driver software
(Recommended)].
Click [Continue] if the [User Account Control] window appears.
3. When a message prompting insertion of the CD-ROM, insert the CD-ROM into the CD-ROM
drive.
Installation of the printer driver is automatically started.
If “Windows can't verify the publisher of this software” display appears in the installation, select the
[Install this driver software anyway].
4. Click [Exit].
If installation is successful, the icon of this printer is added to the [Printers] window.

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.

38
Installing the Printer Driver Using USB

• When a printer driver meeting this printer is found on a network, a message prompting insertion of
the CD-ROM is not displayed.
• The number after “USB” varies depending on the number of printers connected.

1
Troubleshooting for using USB

Problems Solutions

Turn off the power of the machine, reconnect the


The machine is not automatically recognized.
USB cable, and then turn it on again.

Open Windows' Device Manager, and then,


under [Universal Serial Bus controllers], remove
any conflicting devices. Conflicting devices have a
Windows has already configured the USB settings.
yellow [!] or [?] icon by them. Take care not to
accidentally remove required devices. For details,
see Windows Help.

• When using Windows 2000 / XP / Vista or Windows Server 2003 / 2003 R2 / 2008, an erroneous
device is displayed under [USB Controller] in the [Device Manager] dialog box.

39
1. Windows Configuration

Printing with Parallel Connection


To use a machine connected using a parallel interface, click [LPT1] when installing the printer driver.
1
Installing the PostScript 3 printer driver (Windows 2000)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer], and then click [Next >].
A dialog box for selecting the printer manufacturer and model name appears.
7. Select [LPT1] at the [Printer Port] dialog box, and then click [Next >].
8. Select whether or not to share the printer, and then click [Next >].
9. Select the name of the machine whose driver you want to install, and then click [Next >].
10. Select whether or not you want to print a test page, and then click [Finish].
The printer driver installation starts.
11. Restart the computer to complete installation if necessary.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

40
Printing with Parallel Connection

Installing the PostScript 3 Printer Driver (Windows XP, Windows Server 2003 /
2003 R2)

1
• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows XP Professional x64, Windows Server 2003 / 2003 R2 x64,
you must download the printer driver from the manufacturer's Web site. Select this printer and the
operating system you are using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Next >].
6. Click [Local printer attached to this computer], and then click [Next >].
7. Select the port you want to use, and then click [Next >].
A dialog box for selecting the printer manufacturer and model name appears.
8. Select the name of the machine whose driver you want to install, and then click [Next >].
9. Click [Close] to close the [Printer Port] dialog box.
10. Click [Next >].
11. Change the printer name if you want, and then click [Next >].
12. Select whether or not to share the printer, and then click [Next >].
13. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.
14. Restart the computer to complete installation.

• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.

41
1. Windows Configuration

• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

1 Installing the PostScript 3 Printer Driver (Windows Vista, Windows Server 2008)

• Installing this printer driver requires Administrators permission. Log on using an account that has
Administrators permission.
• You can install the printer driver from the CD-ROM provided with this machine or download it from
the supplier's Web site.
• If your operating system is Windows Vista x64, Windows Server 2008 x64, you must download the
printer driver from the manufacturer's Web site. Select this printer and the operating system you are
using, and then download it.

1. Quit all applications currently running.


2. Insert the CD-ROM into the CD-ROM drive.
The installer starts.
3. Select an interface language, and then click [OK].
The printer driver with the selected language will be installed. The English printer driver is installed
when the following language is selected: Suomi, Magyar, Cestina, Polski, Portugues, Russian,
Catala, Turkce.
4. Click [PostScript 3 Printer Driver].
Add Printer Wizard starts.
5. Click [Local printer attached to this computer].
6. Select the port you want to use, and then click [Next >].
A dialog box for selecting the printer manufacturer and model name appears.
7. Select the name of the machine whose driver you want to install, and then click [Next >].
8. Click [Close] to close the [Printer Port] dialog box.
9. Click [Next >].
10. Change the printer name if you want, and then click [Next >].
11. Specify whether or not to print a test page, and then click [Finish].
The printer driver installation starts.
12. Restart the computer to complete installation.

42
Printing with Parallel Connection

• Depending on the environment you are using, the [AutoPlay] dialog box may appear. If this happens,
click [Run SETUP.EXE]. If the [User Account Control] dialog box appears, click [Continue] to allow
the auto play program to run.
1
• A user code can be set after the printer driver installation. For information about user code, see the
printer driver Help.
• Auto Run may not work with certain operating system settings. In that case, launch “Setup.exe” on
the CD-ROM root directory.

43
1. Windows Configuration

If a Message Appears during Installation


Message number 58 or 34 indicates the printer driver cannot be installed using Auto Run. Install the printer
1 driver using [Add Printer] or [Install Printer].

For Windows 2000:

1. On the [Start] menu, point to [Settings], and then click [Printers].


2. Double-click the Add Printer icon.
3. Follow the instructions in Add Printer Wizard.

• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.

For Windows XP Professional and Windows Server 2003 / 2003 R2:

1. On the [Start] menu, click [Printers and Faxes].


2. Click [Add a printer].
3. Follow the instructions in Add Printer Wizard.

• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.

For Windows XP Home Editions:

1. On the [Start] menu, click [Control Panel].


2. Click [Printers and Other Hardware].
3. Click [Printers and Faxes].
4. Click [Install Printer].
5. Follow the instructions in Add Printer Wizard.

• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.

44
If a Message Appears during Installation

For Windows Vista and Windows Server 2008:

1. On the [Start] menu, click [Control Panel].


The [Control Panel] window appears.
2. Click [Printer] in “Hardware and Sound”. 1
3. Click [Install Printer].
4. Follow the instructions in Add Printer Wizard.

• If the printer driver is on a CD-ROM, the location of the PostScript 3 printer driver is D:\DRIVERS\PS
\XP_VISTA\(Language)\DISK1.
• If the installer starts, click [Cancel] to quit.

45
1. Windows Configuration

Making Option Settings for the Printer


Make option settings for the machine using the printer driver when bidirectional communication is disabled.
1 Set up option settings when bidirectional communications are disabled.

• Under Windows 2000 / XP / Vista and Windows Server 2003 / 2003 R2 / 2008, Manage Printers
permission is required to change the printer properties in the [Printers] folder. Log on as an
Administrators or Power Users group member.

1. On the [Start] menu, click [Printers and Faxes] or [Printers].


The [Printers and Faxes] or [Printers] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Properties].
Under Windows Vista, Windows Server 2008, Right - click the icon of the printer you want to use,
and then click the [Properties].
4. Click the [Device Settings] tab.
5. Select options installed from the [Install Options] area, and then make the necessary settings.
6. Click [Apply], and then click [OK] to close the printer properties dialog box.

• For details about making option settings for the printer, see Setting Up Options.

46
Setting Up the Printer Driver

Setting Up the Printer Driver


Windows 2000 - Accessing the Printer 1
Making printer default settings - the printer properties

• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, point to [Settings], and then click [Printers].


The [Printers] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Properties].
The printer properties dialog box appears.
4. Make the necessary settings, and then click [OK].

• Settings you make here are used as the default settings for all applications.
• Do not make a setting for [Form to Tray Assignment].
• For details, see the printer driver Help.

Making printer default settings - Printing Preferences

• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, point to [Settings], and then click [Printers].


The [Printers] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Printing Preferences...].
The [Printing Preferences] dialog box appears.
4. Make the necessary settings, and then click [OK].

47
1. Windows Configuration

• Settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.
1
Making printer settings from an application
You can make printer settings for a specific application.
To make printer settings for a specific application, open the [Printing Preferences] dialog box from that
application. The following explains how to make settings for the WordPad application provided with
Windows 2000.

1. On the [File] menu, click [Print...].


The [Print] dialog box appears.
2. Select the printer you want to use in the [Select Printer] list, and then click the tab for the
settings you want to change.
3. Make the necessary settings, and then click [OK].

• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use.
• Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.

Windows XP, Windows Server 2003 / 2003 R2 - Accessing the Printer Properties

Making printer default settings - the printer properties

• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.

48
Setting Up the Printer Driver

2. Click the icon of the printer you want to use.


3. On the [File] menu, click [Properties].
The printer properties dialog box appears.
4. Make the necessary settings, and then click [OK]. 1
• Settings you make here are used as the default settings for all applications.
• Do not make a setting for [Form to Tray Assignment].
• For details, see the printer driver Help.

Making printer default settings - Printing Preferences

• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, click [Printers and Faxes].


The [Printers and Faxes] window appears.
2. Click the icon of the printer you want to use.
3. On the [File] menu, click [Printing Preferences...].
The [Printing Preferences] dialog box appears.
4. Make the necessary settings, and then click [OK].

• Settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.

Making printer settings from an application


You can make printer settings for a specific application.
To make printer settings for a specific application, open the [Printing Preferences] dialog box from that
application. The following explains how to make settings for the WordPad application provided with
Windows XP.

1. On the [File] menu, click [Print...].


The [Print] dialog box appears.
2. Select the printer you want to use in the [Select Printer] list, and then click [Preferences].
3. Make the necessary settings, and then click [OK].

49
1. Windows Configuration

• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use
1 • Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.

Windows Vista, Windows Server 2008 - Accessing the Printer Properties

Making printer default settings - the printer properties

• To change the printer default settings including option configuration settings, log on using an account
that has Manage Printers permission. Members of the Administrators and Power Users groups have
Manage Printers permission by default.
• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, click [Control Panel].


The [Control Panel] window appears.
2. Click [Printer] in “Hardware and Sound”.
3. Right - click the icon of the printer you want to use, and then click the [Properties].
4. Make the necessary settings, and then click [OK].

• Settings you make here are used as the default settings for all applications.
• Do not make a setting for [Form to Tray Assignment].
• For details, see the printer driver Help.

Making printer default settings - Printing Preferences

• You cannot change the printer default settings for each user. Settings made in the printer properties
dialog box are applied to all users.

1. On the [Start] menu, click [Control Panel].


The [Control Panel] window appears.

50
Setting Up the Printer Driver

2. Click [Printer] in “Hardware and Sound”.


3. Right - click the icon of the printer you want to use, and then click the [Printing Preferences...].
The [Printing Preferences] dialog box appears.
4. Make the necessary settings, and then click [OK]. 1
• Settings you make here are used as the default settings for all applications.
• For details, see the printer driver Help.

Making printer settings from an application


You can make printer settings for a specific application.
To make printer settings for a specific application, open the [Printing Preferences] dialog box from that
application. The following explains how to make settings for the WordPad application provided with
Windows XP.

1. On the [File] menu, click [Print...].


The [Print] dialog box appears.
2. Select the printer you want to use in the [Select Printer] list, and then click [Preferences].
3. Make the necessary settings, and then click [OK].

• The procedure to open the [Printing Preferences] dialog box may vary depending on the application.
For details, see the manuals provided with the application you use
• Any settings you make in the following procedure are valid for the current application only.
• General users can change the properties displayed in the [Print] dialog box of an application. Settings
made here are used as defaults when printing from this application.
• For details, see the printer driver Help.

51
1. Windows Configuration

52
2. Mac OS Configuration

Mac OS
This section explains how to configure a Mac OS to use EtherTalk and USB.
The following explains how to configure Mac OS 9.1. If you are not using Mac OS 9.1, see the manual 2
of the Mac OS you are using for details.

• For Mac OS 8.6 and higher. (Mac OS X Classic environment is supported.)

• The PostScript 3 printer driver is stored in the following folder on the CD-ROM.
Mac OS 8 and 9:PS Driver:(language):Disk1

Installing the PostScript 3 Printer Driver and PPD File

It is necessary to install a printer driver and PostScript Printer Description (PPD) files to print from a Mac
OS.
Follow the procedure below to install a printer driver and a PPD file into a Mac OS using Mac OS 8.6 and
higher.

PostScript 3 Printer Driver

1. Insert the CD-ROM into the CD-ROM drive.


2. Double-click the CD-ROM drive icon.
3. Double-click the [Mac OS 8 and 9] folder.
4. Double-click the [PS Driver] folder.
5. Double-click the folder of the language you use.
6. Open [Disk1], and then double-click the installer icon.
7. Follow the instructions on the screen.

PPD Files

1. Double-click the CD-ROM drive icon.


2. Double-click the [Mac OS 8 and 9] folder.
3. Double-click the [Printer Descriptions] folder.
4. Double-click the folder of the language you are using.
5. Open the [DISK1] folder.

53
2. Mac OS Configuration

6. Drag the PPD file and the plugin file into [Printer Descriptions] in [Extensions] under [System
Folder].
7. Restart the Mac OS.

Setting Up PPD Files


2
• Make sure that the printers are connected to an AppleTalk network before performing the following
procedure.

1. On the [Apple] menu, click [Chooser].


2. Click the Adobe PS icon.
3. In the [Select a PostScript Printer:] list, click the name of the printer you want to use.
4. Click [Create].
5. Click the printer you want to use, and then click [Setup].
A PPD file is set up and the Adobe PS icon appears at the left of the printer name in the list. Follow the
procedure on Setting Up Options to make option settings; otherwise close the [Chooser] dialog box.

Setting Up Options

1. On the [Apple] menu, click [Chooser].


2. Click the Adobe PS icon.
3. In the [Select a PostScript Printer:] list, click the name of the printer you want to use, and
then click [Setup].
4. Click [Configure].
A list of options appears.
5. Select the option you want to set up, and then select an appropriate setting for it.
6. Click [OK].
The list of options closes.
7. Click [OK].
The [Chooser] dialog box appears.
8. Close the [Chooser] dialog box.

• If the option you want to select is not displayed, PPD files may not be set up correctly. To complete
the setup, check the name of the PPD file displayed in the dialog box.

54
Mac OS

Installing Adobe Type Manager

• Quit all applications currently running before installation. Install ATM after you restart the computer.

1. Start a Mac OS.


2. Insert the CD-ROM into the CD-ROM drive. 2
3. Double-click the CD-ROM drive con.
4. Double-click the [Mac OS 8 and 9] folder.
5. Double-click the [ATM] folder.
6. Double-click the ATM 4.6.2 installer icon.
7. Follow the instructions on the screen.
8. When the procedure is complete, restart the computer. ATM will be completely installed only
after restarting.
9. On the [Apple] menu, open [Control Panel], and then click [~ATM].
10. The ATM control panel opens.

• For details about installation, see the operating instructions in the ATM folder.

Installing Screen fonts

Follow the procedure below to install screen fonts.


The screen fonts described below can be found in the [Fonts] folder on the CD-ROM.

1. Start a Mac OS.


2. Insert the CD-ROM into the CD-ROM drive.
The CD-ROM drive icon appears.
3. Double-click the CD-ROM drive icon.
The contents of the CD-ROM appear.
4. Double-click the [Mac OS 8 and 9] folder.
5. Double-click the [Fonts] folder.
6. Double-click the [Screen font] folder.
7. Double-click the [TrueType] or [Type1] folder.
Select the font type you want to use.

55
2. Mac OS Configuration

8. Copy the fonts you want to install in [System Folder].


A confirmation message appears.
9. Click [OK].
The fonts are installed.
10. Restart the Mac OS.

2
Changing to EtherTalk

Follow the procedure below to configure to a Mac OS to use EtherTalk.

1. Open [Control Panel], and then double-click the AppleTalk icon.


2. On the [Connect via:] pop-up menu, click [Ethernet].
3. If you change zones, select a name on the [Current zone:] pop-up menu.
4. Close the AppleTalk control panel.
5. Restart the computer.

• The procedures used to configure Mac OS may vary depending on the Mac OS version. The following
describes how to configure Mac OS 9.1. If you are using a different version of Mac OS, use the
following procedures as a reference and see the manuals for your Mac OS version.
• Confirm the Connection to the Printer with TCP/IP.
• For information about installing applications required for EtherTalk, see the Mac OS manuals.

56
Mac OS X

Mac OS X
This section explains how to configure a Mac OS X to use EtherTalk, USB and TCP/IP.
Follow the procedure below to configure Mac OS X 10.3.8. If you are not using Mac OS X 10.3.8, see
the manual of the Mac OS X you are using for details.

2
• For Mac OS X 10.1 or higher.

• The PPD files are stored in the following folder on the CD-ROM.
Mac OS X: MacOSX PPD Installer

Installing the PPD Files

Follow the procedure below to install a PPD file to print from Mac OS X.

• You need an administrator name and a password (phrase). For details, consult your network
administrator.

1. Insert the CD-ROM into the CD-ROM drive.


2. Double-click the CD-ROM drive icon.
3. Double-click the [Mac OS X] folder.
4. Double-click the [MacOSX PPD Installer] folder.
5. Double-click the installer icon.
6. Follow the instructions on the screen.

Setting Up the PPD File

1. Start Printer Setup Utility.


2. Click [Add].
Mac OS X 10.4 or later
Click a printer that has “AppleTalk” indicated in the “Connection” column.
If the zone is set, click [More Printers...], and then select the zone from the second pop-up menu.
Other Mac OS X
Click [AppleTalk] on the first pop-up menu.
If the zone is set, select the zone from the second pop-up menu.

57
2. Mac OS Configuration

3. Select the printer, and then select its manufacturer from the [Printer Model:] pop-up menu.
Under Mac OS X 10.4 or later, you are using from the [Print Using] popup menu.
A list of printer types appears.
4. Select the PPD file for the model you are using, and then click [Add].
5. Quit Printer Setup Utility.

2
Setting Up Options

1. Start System Preferences.


2. Click [Print& Fax].
3. In the [Printer] list, click the name of the printer you want to use, and then click [Printer
Setup...].
4. Select the option you want to set up, and then select an appropriate setting for it.
5. Click [Apply Changes].

• If the option you want to select is not displayed, PPD files may not be set up correctly. To complete
the setup, check the name of the PPD file displayed in the dialog box.

Using USB Interface

Follow the procedure below to set up USB connection.

1. Start Printer Setup Utility.


2. Click [Add].
Mac OS X 10.4 or later
Click a printer that has “USB” indicated in the “Connection” column.
Other Mac OS X
Click [USB] on the pop-up menu.
The connected printer appears.
3. Select the printer, and then select its manufacturer from the [Printer Model:] pop-up menu.
Under Mac OS X 10.4 or later, you are using from the [Print Using] pop-up menu.
A list of printer types appears.
4. Select the connected printer from the list of printer models, and then click [Add].
5. Quit Printer Setup Utility.

58
Mac OS X

• When printing with a USB connection to a Macintosh computer, printer language does not change
automatically. Use the control panel on this printer to change printer language to [Auto Detect] or
[PS] before printing.
• USB2.0 can be used only with Mac OS X 10.3.3 or higher.

2
Using Bonjour (Rendezvous)

Follow the procedure below to print using Bonjour (Rendezvous) under Mac OS X 10.2.3 or higher.
Ethernet and wireless LAN connections can also be used.

1. Start Printer Setup Utility.


2. Click [Add].
Mac OS X 10.4 or later
Click a printer that has “Bonjour” indicated in the “Connection” column.
If the zone is set, click [More Printers...], and then select the zone from the second pop-up menu.
Other Mac OS X
Click [Rendezvous] on the pop-up menu.
If the zone is set, select the zone from the second pop-up menu.
3. Select the name of the connected printer from the list of printer models, and then click [Add].
Under Mac OS X 10.4 or later, Installable Options window appears. Select the option you want to
set up, and then select an appropriate setting for it, and then [Continue].
4. Quit Printer Setup Utility.

• When printing with a Rendezvous connection to a Macintosh computer, printer language does not
change automatically. Use the control panel on this printer to change printer language to [Auto Detect]
or [PS] before printing.

Changing to EtherTalk

Follow the procedure below to configure a Mac OS X to use EtherTalk.

• You need an administrator name and a password (phrase). For details, consult your network
administrator.

1. Open [System Preferences], and then click the Network icon.


2. Click [Built-in Ethernet] in the [Show:] list box.

59
2. Mac OS Configuration

3. Click the [AppleTalk] tab.


4. Select the [Make AppleTalk Active] check box.
5. To change AppleTalk zones, select a name from the [AppleTalk Zone:] pop-up menu.
6. When the settings are made, click [Apply Now].

2 • For information about installing applications required for EtherTalk, see the Mac OS manuals.

60
Configuring the Printer

Configuring the Printer


Use the control panel to enable AppleTalk. (The default is active.)

61
2. Mac OS Configuration

62
3. Using PostScript 3

Setting Up Options
To use installed options correctly, first set up the printer driver. If the options are not recognized, you cannot
use them, even though they are physically installed. The procedure to set up a printer driver varies
depending on the operating system.
Windows
3
• If your system is Windows 2000, Windows XP Professional, Windows Vista, or Windows Server
2003 / 2003 R2 / 2008, changing printer driver settings requires Manage Printers permission.
Members of Administrators and Power Users groups have Manage Printers permission by
default. When you change printer driver settings, log on with an account that has Manage Printers
permission.
• If you are using Adobe PageMaker 6.0, 6.5, or 7.0, you have to set up options in the Adobe
PageMaker's print dialog box.
You can set up any of the options using the following tabs:

Windows 2000 / XP / Vista, Windows Server [Installable Options] on the [Device Settings]
2003 / 2003 R2 / 2008 tab.

For Ethernet, [Chooser] on the Apple Menu. For


Mac OS USB, [Change Setup] from the [Printing] menu to
open the Desktop printer.

[Printer Setup...] in [Print & Fax] to open the


Mac OS X
System Preferences.

• To set up options, access the printer driver from Windows. You cannot set up options if you
access the printer driver from an application.
Mac OS

• If you are using Mac OS X, this functions cannot be used.


You can set up all options using the [Chooser] dialog box.

• See, Making Option Settings for the Printer, Setting Up Options or Setting Up Options for the
installation method appropriate to your printing environment.

63
3. Using PostScript 3

Printing a Document
This documentation describes the specific printer functions and menus that are added by installing the PPD
file.

• On a Macintosh, Mac OS 8.6 or higher (Mac OS X Classic environment is supported.), or Mac OS


X 10.1 or higher is required.
• If you are using Mac OS X 10.1.x, the following functions cannot be used:
3 • Sample Print
• Locked Print
• Hold Print
• Stored Print
• Store and Print
• Applications, such as PageMaker, that have their own drivers do not support the following functions:
• Sample Print
• Locked Print
• Hold Print
• Stored Print
• Store and Print

• If you are using Mac OS X 10.2.x or higher, the Job Type function can be used.
• “Mac OS X” in the tables below refers to Mac OS X 10.2.3. Depending on the version, [Features x]
is displayed as [Set x] (x is a number). Make adjustments according to the version you use.
• Under Windows 2000 / XP / Vista and Windows Server 2003 / 2003 R2 / 2008, all the tab
names explained here indicate the icons displayed in the [Menu] area on the [Detailed Settings] tab.
• Some of the settings made on the [Detailed Settings] tab can be registered to One Click Preset List.
The settings registered in One Click Preset List can be modified from the [One Click Presets] tab also.
• For details about One Click Presets, see the printer driver Help.

Job Type

Use this to select the type of print job.


The following table shows the tabs or menus where you can select this function.

64
Printing a Document

Windows 2000 / XP / Vista, Windows Server [Job Type:] on the [Job Setup] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

Mac OS [Job Type:] on [Job Log] in the print dialog box.

Mac OS X [Job Type:] on [Job Log] in the print dialog box.

You can select the following items:


Normal Print
Select this for normal printing. The print job starts immediately after the print command is given. 3
Sample Print
Use this function to print only one set of a multiple print jobs.
The other sets are saved in the machine. The saved job can be printed from the machine's control
panel. You can also delete the saved job.

• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters.


• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Sample Print, see Job Type.
Locked Print
Use this function to save documents in the machine memory with a password, and then edit and print
them as you want.

• The “User ID” can contain to eight alphanumeric (a-z, A-Z, 0-9) characters. The “Password”
must be 4-8 digits.
• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Locked Print, see Job Type.
Hold Print
Use this function to temporarily hold a file in the machine, and print it from the computer or the machine's
control panel later.

• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters.


• The “File Name” can contain to 16 alphanumeric (a-z, A-Z, 0-9) characters.
• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Hold Print, see Job Type.

65
3. Using PostScript 3

Stored Print
Use this function to store a file in the machine, and then print it from the computer or the machine's
control panel later.

• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters. The “Password”
must be 4-8 digits.
• The File Name can contain to 16 alphanumeric (a-z, A-Z, 0-9) characters.
• You can assign a password to a saved document, but password assignment is not mandatory.
3 • Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Stored Print, see Job Type.
Store and Print
Use this function to print the file at once and also store the file in the printer.

• The “User ID” can contain up to eight alphanumeric (a- z, A- Z, 0- 9) characters. The “Password”
must be 4-8 digits.
• The “File Name” can contain to 16 alphanumeric (a-z, A-Z, 0-9) characters.
• You can assign a password to a saved document, but password assignment is not mandatory.
• Entering the “User ID” helps you distinguish your print job from others.
• For details about how to use Stored Print, see Job Type.

How to Use Sample Print


Follow the procedure below to print a document using the Sample Print function.

Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008

1. In the application, on the [File] menu, click [Print].


The [Print] dialog box appears.
If you are using Windows 2000, select the printer, and then perform the following steps.
If you are using Windows XP / Vista or Windows Server 2003 / 2003 R2 / 2008, select the printer,
and then click [Preferences].
2. Click the [Detailed Settings] tab.
3. Click the [Job Setup] tab on the [Menu:].
4. In the Job Type: list, click Sample Print.
5. Click the [Details...].

66
Printing a Document

6. In the User ID: box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9) characters.
The user ID associates the user with his / her jobs.
7. Click [OK] to close the [Job Type Details] dialog box.
8. Click [OK] to close the printer properties dialog box.
If you are using Windows 2000, perform the following steps.
9. Set the number of copies to two or more, and then start the printing from the application's
[Print] dialog box.
The sample print job is sent to the machine, and one set is printed.
10. Check the printed output to make sure the settings are correct.
3
If the settings are correct, perform the following steps to print the remaining sets.
If you want to delete a saved job, see Job Type.
11. On the machine's control panel, press the [Printer] key to display the printer screen.
12. Press [Prt.Jobs].
13. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
14. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A list of print files stored in the machine appears.
15. Enter the new number of sets using the number keys, and then press [Print].
If you do not want to change the set quantity, perform the following steps.
You can enter up to 999 sets.
Press [Escape] key to correct any entry mistakes.
When multiple files are selected without setting a quantity, 1 page less than the minimum number of
all settings is applied.

• When printing finishes, the stored file is deleted.


• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• If there is a print job outstanding, this will be printed before the sample print job.
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collates Sample Print jobs by default. If the collate option is selected in
the application's [Print] dialog box, there may be more prints than required.

67
3. Using PostScript 3

Mac OS / Mac OS X

1. In the application, on the [File] menu, click [Print].


The [Print] dialog box appears.
2. Set the number of copies to two or more.
The sample print job is sent to the machine, and one set is printed.
3. In the pop-up menu, click [Job Log].
4. On the [Job Type:] pop-up menu, select [Sample Print].
3 5. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters.
The user ID associates the user with his / her jobs.
6. Check the printed output to make sure the settings are correct.
If the settings are correct, perform the following steps to print the remaining sets.
If you want to delete a saved job, see Job Type.
7. On the machine's control panel, press the [Printer] key to display the printer screen.
8. Press [Prt.Jobs].
9. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
10. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A list of print files stored in the machine appears.
11. Press [Print] to change the number of sets to be printed.
12. Enter the new number of sets using the number keys, and then press [Print].
If you do not want to change the set quantity, perform the following steps.
You can enter up to 999 sets.
Press [Escape] key to correct any entry mistakes.
When multiple files are selected without setting a quantity, 1 page less than the minimum number of
all settings is applied.

• When printing finishes, the stored file is deleted.


• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• If there is a print job outstanding, this is printed before the sample print job.

68
Printing a Document

Deleting a Sample Print File


If a printed document is not as required, you can delete the Sample Print file.

1. On the machine's control panel, press the [Printer] key to display the printer screen.
2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Sample Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete]. 3
A confirmation screen appears.
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

How to Use Locked Print


Follow the procedure below to print a document using the Locked Print function.

Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008

1. In the application, on the [File] menu, click [Print].


The [Print] dialog box appears.
If you are using Windows 2000, select the printer, and then perform the following steps.
If you are using Windows XP or Windows Server 2003 / 2003 R2 / 2008, select the printer, and
then click [Preferences].
2. Click the [Detailed Settings] tab.
3. Click the [Job Setup] tab on the [Menu:].
4. In the [Job Type:] list, click [Locked Print].
5. Click the [Details...].
6. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters, and then enter a 4-8 digit password in the [Password:] box.
The user ID associates user with his / her jobs.
7. Click [OK] to close the [Job Type Details] dialog box.
8. Click [OK] to close the printer properties dialog box.
If you are using Windows 2000, perform the following steps.

69
3. Using PostScript 3

9. Start the printing from the application's [Print] dialog box.


The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
10. On the machine's control panel, press the [Printer] key to display the printer screen.
11. Press [Prt.Jobs].
A list of print files stored in the machine appears.

3 12. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of locked print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
13. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
The password screen appears.
14. Enter the password using the number keys, and then press [OK] key.
The print confirmation screen appears.
A confirmation screen will appear if the password is not entered correctly. Press [Clear] to enter the
password again.
If you forget your password, contact your administrator for help.
15. Press [Print].
The locked file is printed.

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collates Locked Print jobs by default. If the collate option is selected in the
application's [Print] dialog box, there may be more prints than required.

Mac OS / Mac OS X

1. In the application, click [Print] on the [File] menu.


The [Print] dialog box appears.
2. In the pop-up menu, click [Job Log].
3. On the [Job Type:] pop-up menu, click [Locked Print].
4. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters, and then enter a 4-8 digit password in the [Password:] box.
The user ID associates the user with his / her jobs.

70
Printing a Document

5. After making the necessary settings, click [Print].


The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
6. On the machine's control panel, press the [Printer] key to display the printer screen.
7. Press [Prt.Jobs].
A list of print files stored in the machine appears.
8. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
3
A list of locked print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
9. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
The password screen appears.
10. Enter the password using the number keys, and then press [OK] key.
The print confirmation screen appears.
A confirmation screen will appear if the password is not entered correctly. Press [Clear] to enter the
password again.
If you forget your password, contact your administrator for help.
11. Press [Print].
The locked file is printed.

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.

Deleting a Locked Print File


If a printed document is not as required, you can delete the Locked Print file.

1. On the machine's control panel, press the [Printer] key to display the printer screen.
2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Locked Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.

71
3. Using PostScript 3

5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

How to Use Hold Print


Follow the procedure below to print a document using the Hold Print function.

Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008


3 1. In the application, on the [File] menu, click [Print].
The [Print] dialog box appears.
If you are using Windows 2000, select the printer, and then perform the following steps.
If you are using Windows XP or Windows Server 2003 / 2003 R2 / 2008, select the printer, and
then click [Preferences].
2. Click the [Detailed Settings] tab.
3. Click the [Job Setup] tab on the [Menu:].
4. In the [Job Type:] list, click [Hold Print].
5. Click the [Details...].
6. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters. [File Name] can also be set.
The user ID associates the user with his / her jobs.
7. Click [OK] to close the [Job Type Details] dialog box.
8. Click [OK] to close the printer properties dialog box.
If you are using Windows 2000, perform the following steps.
9. Start the printing from the application's [Print] dialog box.
The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see JobType.
10. On the machine's control panel, press the [Printer] key to display the printer screen.
11. Press [Prt.Jobs].
A list of print files stored in the machine appears.
12. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of hold print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].

72
Printing a Document

13. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
14. Press [Print].
The hold print file is printed.

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• When printing finishes, the stored file is deleted.
• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collates Hold Print files by default. If a collate option is selected from the
3
application's Print dialog box, there may be more prints than required.

Mac OS / Mac OS X

1. From an application, on the [File] menu, click [Print].


The [Print] dialog box appears.
2. In the pop-up menu, click [Job Log].
3. On the [Job Type:] pop-up menu, click [Hold Print].
4. In the [User ID:] box, enter the user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters. [File Name] can also be set.
The user ID associates the user with his / her jobs.
5. After making the necessary settings, click [Print].
The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
6. On the machine's control panel, press the [Printer] key to display the printer screen.
7. Press [Prt.Jobs].
A list of print files stored in the machine appears.
8. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of hold print files stored in the machine appears.
Depending on the security settings, certain print jobs may not be displayed.
You can print files also by pressing [User ID].
9. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
10. Press [Print].
The hold print file is printed.

73
3. Using PostScript 3

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• When printing is completed, the stored file is deleted.

Deleting a Hold Print File


If a printed document is not as required, you can delete the Hold Print file.

1. On the machine's control panel, press the [Printer] key to display the printer screen.
3 2. Press [Prt.Jobs].
A list of print files stored in the machine appears.
3. Select [Hold Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
4. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.
5. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

How to Use Stored Print/Store and Print


Follow the procedure below to print a document using the Stored Print function.

Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008

1. In the application, on the [File] menu, click [Print].


The [Print] dialog box appears.
If you are using Windows 2000, select the printer, and then perform the following steps.
If you are using Windows XP or Windows Server 2003 / 2003 R2 / 2008, select the printer, and
then click [Preferences].
2. Click the [Detailed Settings] tab.
3. Click the [Job Setup] tab on the [Menu:].
4. In the [Job Type:] list, click [Stored Print] or [Store and Normal Print].
• [Stored Print]
Stores the file in the printer and print it later using the control panel.
• [Store and Print]
Prints the file at once and also stores the file in the printer.

74
Printing a Document

5. Click the [Details...].


6. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters, and then enter a 4-8 digit password in the [Password:] box. [File Name] can
also be set.
The user ID associates the user with his / her job.
You can assign a password to a saved document, but password assignment is not mandatory.
The same password must be entered when printing or deleting.
7. Click [OK] to close the [Job Type Details] dialog box.
8. Click [OK] to close the printer properties dialog box. 3
If you are using Windows 2000, perform the following steps.
9. Start the printing from the application's [Print] dialog box.
The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
10. On the machine's control panel, press the [Printer] key to display the printer screen.
11. Press [Prt.Jobs].
A list of print files stored in the machine appears.
12. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of stored print files stored in the machine appears.
You can print files also by pressing [User ID].
13. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
If you have already set a password, proceed to the following step.
14. Enter a password using the number keys on the password screen, and then press [OK].
A confirmation screen will appear if the password is not entered correctly. Press [OK] to enter the
password again.
If you have not set the password, proceed to the following step.
15. Enter the number of copies to print, and then press [Print].
The stored file is printed.

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• Stored Print files sent to the machine are not deleted unless you delete them in the machine or select
[Auto Delete Stored Jobs] (see “System”, Printer Reference). Foe details, see Job Type.

75
3. Using PostScript 3

• If the application has a collate option, make sure it is not selected before sending a print job. The
printer driver automatically collate Stored Print files by default. If a collate option is selected from the
application's Print dialog box, there may be more prints than required.

Mac OS / Mac OS X

1. In the application, on the [File] menu, click [Print].


The [Print] dialog box appears.
2. In the pop-up menu, click [Job Log].

3 3. On the [Job Type:] pop-up menu, click [Stored Print] or [Store and Print].
• [Stored Print]
Stores the file in the printer and print it later using the control panel.
• [Store and Print]
Prints the file at once and also stores the file in the printer.
4. In the [User ID:] box, enter a user ID using up to eight alphanumeric (a-z, A-Z, 0-9)
characters, and then enter a 4-8 digit password in the [Password:] box. [File Name] can
also be set.
The user ID associates the user with his / her jobs.
You can assign a password to a saved document, but password assignment is not mandatory.
The password must be entered when printing or deleting.
5. After making the necessary settings, click [Print].
The document file is saved in the machine.
To print the document, perform the following steps.
To delete the document, see Job Type.
6. On the machine's control panel, press the [Printer] key to display the printer screen.
7. Press [Prt.Jobs].
A list of print files stored in the machine appears.
8. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of stored print files stored in the machine appears.
You can print files also by pressing [User ID].
9. Select the file you want to print using the [ ] or [ ] key, and then press [Print].
A confirmation screen appears.
If you have already set a password, proceed to the following step.
10. Enter a password using the number keys on the password screen, and then press [OK].
A confirmation screen will appear if the password is not entered correctly. Press [OK] to enter the
password again.

76
Printing a Document

If you have not set the password, proceed to the following step.
11. Enter the number of copies to print, and then press [Print].
The stored file is printed.

• To cancel printing, press [Cancel]. Then, press [JobReset]. After it has started, the file is deleted.
• Stored Print files sent to the machine is not deleted unless you delete them in the machine or select
[Auto Delete Stored Jobs] (see “System”, Printer Reference). For details, see Job Type.

3
Deleting a Stored Print File
If a printed document is not as required, you can delete the Stored Print file.

1. On the machine's control panel, press the [Printer] key to display the printer screen.

1. Press [Prt.Jobs].
A list of print files stored in the machine appears.
2. Select [Stored Print Jobs] using the [ ] or [ ] key, and then press [Job List].
A list of sample print files stored in the machine appears.
3. Select the file you want to print using the [ ] or [ ] key, and then press [Delete].
A confirmation screen appears.
4. Press [Delete].
The selected file is deleted.
If you do not want to delete the file, press [Cancel].

• If you have already set a password in the printer driver, enter it to delete.

User Code

Set a user code for print logging.


Enter a user code using up to eight digits. A user code identifies a group of users and allows you to check
the number of sheets printed under each code with SmartDeviceMonitor for Admin.
The following table shows the tabs or menus where you can select this function.

Enter a user code in the [User Code:] box on the


Windows 2000 / XP / Vista, Windows Server
[Job Setup] tab in the Printing Preferences dialog
2003 / 2003 R2 / 2008
box.

77
3. Using PostScript 3

Select the [Enable User Code] check box, and then


Mac OS enter a user code in the [User Code] box on [Job
Log] in the print dialog box.

Select the [Enable User Code] check box, and then


Mac OS X enter a user code in the [User Code] box on [Job
Log] in the print dialog box.

3 • For details about using SmartDeviceMonitor for Admin, see Help.

Paper Size

Select the size of paper you want to use.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Paper Size:] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.

[Paper:] on the [Page Attributes] tab in the Page


Mac OS
Setup dialog box.

Mac OS X [Paper Size:] in the Page Setup dialog box.

• For details about the paper sizes supported by this machine, see General Setting Guide.

Reduce/Enlarge

Specify a scaling mode to reduce or enlarge the print size of documents.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Reduce/Enlarge] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

You can select the following items:


Full Size
Print document in its original magnification.

78
Printing a Document

Scale
Print document by scaling with a specified magnification ratio.
Scale To Fit
Print document by scaling to fit on a specified paper size.

• Under Mac OS and Mac OS X, this item cannot be specified.

Scale 3
Specify the ratio to reduce/enlarge the print size of document.
The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Scale] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.

[Scaling:] on the [Page Attributes] tab in the Page


Mac OS
Setup dialog box.

Mac OS X [Scale:] in the Page Setup dialog box.

• Under Windows 2000 / XP / Vista or Windows Server 2003 / 2003 R2 / 2008, [Zoom] must be
selected for [Reduce/Enlarge] to specify this item.

Print On

Specify the paper size to reduce/enlarge the print size of document.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Print On] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.

• Under Mac OS and Mac OS X, this item cannot be specified.

79
3. Using PostScript 3

Fit to Paper

When the size of the document and paper size differ, set whether or not to print according to paper size.

Windows 2000 / XP / Vista, Windows Server [Fit to Paper] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Fit to Paper] on [Printer Specific Options] in the


Mac OS
print dialog box.

3 Mac OS X
[Fit to Paper] on the [Features x] tab on [Printer
Features] in the print dialog box.

Prompt User
Print is performed with the size of document to be printed unchanged.
Nearest Size and Scale
If the paper size is smaller than the selected paper size, the driver reduces the print size.
If the paper size is larger than the size of document to be printed, print is not to fit the paper size.
Nearest Size and Crop
When the paper size is smaller than the size of document to be printed, print is adjusted to meet the
paper size.

Input Slot

Select the paper sources.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Input Tray:] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.

[Paper Source] on [General] in the print dialog


Mac OS
box.

[All Pages from:] on [Paper Feed] in the print dialog


Mac OS X
box.

• For details about the paper sources, see Printer Reference.

80
Printing a Document

Orientation

Set the paper orientation.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Orientation:] on [Basic] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Orientation:] on the [Page Attributes] tab in the


Mac OS
Page Setup dialog box. 3
Mac OS X [Orientation:] in the Page Setup dialog box.

You can select the following items:


• Landscape
• Portrait
• Rotated Landscape

• If you are using a Mac OS or Mac OS X, click to select the button that means “Landscape” or “Portrait”.
• Under Mac OS, "Rotated Landscape" cannot be selected.

Rotate by 180 degrees

Rotate the print image by 180 degrees.


The following table shows where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Rotate by 180 degrees] on [Basic] tab in the
2003 / 2003 R2 / 2008 Printing Preference dialog box.

[Rotate by 180 degrees] in [Printer Specific


Mac OS
Options] in the print dialog box.

[Rotate by 180 degrees] on the [Features x] tab in


Mac OS X
[Printer Features] in the print dialog box.

Copies

Enter the number of copies to print.


The following table shows the tabs or menus where you can select this function.

81
3. Using PostScript 3

Windows 2000 / XP / Vista, Windows Server [Copies:] on [Basic] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.

Mac OS [Copies:] on [General] in the print dialog box.

[Copies:] on [Copies & Pages] in the print dialog


Mac OS X
box..

3 Orientation Override

Set the paper orientation.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Orientation Override] on [Finishing] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.

[Orientation Override] on [Printer Specific


Mac OS
Options] in the print dialog box.

[Orientation Override] on the [Features x] tab on


Mac OS X
[Printer Features] in the print dialog box.

You can select the following items:


• Off
• Landscape
• Portrait

Layout/Booklet

Specify the number of pages to print on a single sheet.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Pages per Sheet:] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Pages per Sheet:] on [Layout] in the print dialog


Mac OS
box.

[Pages per Sheet:] on [Layout] in the print dialog


Mac OS X
box.

82
Printing a Document

Page Order

Specify the layout to print multiple pages on a single sheet.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Pages per sheet layout:] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Layout Direction:] on [Layout] in the print dialog


Mac OS
box. 3
[Layout Direction:] on [Layout] in the print dialog
Mac OS X
box.

• If you are using a Mac OS or Mac OS X, click to select the button.

Draw Border

Select whether to draw a page boundary for each page.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Draw Border] on [Edit] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

Mac OS [Border:] on [Layout] in the print dialog box.

Mac OS X [Border:] on [Layout] in the print dialog box.

Duplex Printing

Select whether to enable duplex printing.

• To use this function, the optional duplex unit must be installed on the machine.
The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Duplex] on the [Edit] tab in the Printing Preferences
2003 / 2003 R2 / 2008 dialog box.

83
3. Using PostScript 3

[Print on Both Sides] on [Layout] in the print dialog


Mac OS
box.

• 10.3 or higher
The [Two Sided Printing] check box on
[Layout] in the print dialog box.
Mac OS X
• Other Mac OS X
The [Print on both Sides] check box on

3 [Duplex] in the print dialog box.

The following items may vary depending on the operating system you are using.

Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008, Mac OS


Off
Disables Duplex Printing.
Long Edge
Prints output so that you can open it to the long edge when bound along the long edge.
Short Edge
Prints output so that you can open it to the short edge when bound along the short edge.

• If you are using a Mac OS, click to select the button that means “Flip on Long Edge” or “Flip on Short
Edge”.

Mac OS X
The following functions are selectable under Mac OS X 10.3 or higher (for Mac OS X 10.2 or earlier, see
Windows 2000 / XP, Windows Server 2003 / 2003 R2, Mac OS in Duplex Printing)
Off
Disables Duplex Printing.
Long-Edge Binding
Prints output so that you can open it to the long edge when bound along the long edge.
Short-Edge Binding
Prints output so that you can open it to the short edge when bound along the short edge.

84
Printing a Document

Collate

Select whether to enable collation. With this feature, the machine can efficiently print collated sets of
multiple-page documents.

• To use this function, a memory unit of at least 192 MB or hard disk drive must be installed on the
machine.
• If you are using Mac OS or Mac OS X, make sure that the following check boxes have not been
selected. 3
• Mac OS
The [Collate] check box in the print dialog box.
• Mac OS X
The [Collate] check box on [Copies & Pages] in the printer dialog box.
The following table shows the tabs or menus where you can select this function.

Set the number of copies to two or more, and then


Windows 2000 / XP / Vista, Windows Server
click the [Collate] on the [Finishing] tab in the
2003 / 2003 R2 / 2008
Printing Preference dialog box.

[Collate:] on [Printer Specific Options] in the print


Mac OS
dialog box.

[Collate:] on the [Features x] tab on [Printer


Mac OS X
Feature] in the printer dialog box.

Reverse Order Print

Specify the order of pages to print.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Page Output Order] on [Finishing] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.

[Reverse Page Order:] on [General] in the print


Mac OS
dialog box.

[Reverse Page Order:] on [Paper Handling] in the


Mac OS X
print dialog box.

85
3. Using PostScript 3

Paper Type

Select the paper type.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Paper Type] on [Paper] tab in the Printing
2003 / 2003 R2 / 2008 Preference dialog box.

[Paper Type] on [Printer Specific Options] in the


Mac OS
3 print dialog box.

[Paper Type] on the [Features x] tab on [Printer


Mac OS X
Features] in the print dialog box.

• For details about the media type supported by this machine, see General Setting Guide.

Watermark

Set the Watermark function.

Windows 2000 / XP / Vista, Windows Server [Watermark] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Watermark] on the [Features x] tab in the Print


Mac OS X
dialog box.

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Watermark Text

Select the Watermark Text type.

Windows 2000 / XP / Vista, Windows Server [Watermark Text] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Watermark Text] on the [Features x] tab in the Print


Mac OS X
dialog box.

86
Printing a Document

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Watermark Font

Select the Watermark Font type.

Windows 2000 / XP / Vista, Windows Server


2003 / 2003 R2 / 2008
[Watermark Font] on the [Effects] tab in the Printing
Preferences dialog box.
3
[Watermark Font] on the [Features x] tab in the Print
Mac OS X
dialog box.

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Watermark Size

Select the Watermark size.

Windows 2000 / XP / Vista, Windows Server [Watermark Size] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Watermark Size] on the [Features x] tab in the Print


Mac OS X
dialog box.

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Watermark Angle

Select the Watermark angle.

Windows 2000 / XP / Vista, Windows Server [Watermark Angle] on the [Effects] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.

87
3. Using PostScript 3

[Watermark Angle] on the [Features x] tab in the


Mac OS X
Print dialog box.

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Watermark Style
3
Select the Watermark style.

Windows 2000 / XP / Vista, Windows Server [Watermark Style] on the [Effects] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Watermark Style] on the [Features x] tab in the


Mac OS X
Print dialog box.

• When using this function under Mac OS, see the printer driver Help. The following explains the
procedure for Windows 2000 / XP / Vista, Windows Server 2003 / 2003 R2 / 2008.

Dithering

Set the Image Rendering mode.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Dithering] on [Print Quality] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Dithering:] on [Printer Specific Options] in the print


Mac OS
dialog box.

[Dithering:] on the [Features x] tab on [Printer


Mac OS X
Features] in the print dialog box.

You can select the following items:


Auto
Use this setting to configure the best dithering method automatically depending on the appearance
of the document to be printed.

88
Printing a Document

Photographic
Performs dithering using an appropriate pattern for photographs.
Text
Performs dithering using an appropriate pattern for text.
User Setting
Use this setting to print images set in half tone in your application.

Image Smoothing 3
Select the image smoothing type.
The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Image Smoothing] on [Print Quality] tab in the
2003 / 2003 R2 / 2008 Printing Preferences dialog box.

[Image Smoothing:] on [Printer Specific Options] in


Mac OS
the print dialog box.

[Image Smoothing:] on the [Features x] tab on


Mac OS X
[Printer Features] in the print dialog box.

You can select the following items:


Off
Disables image smoothing.
On
Performs image smoothing unconditionally.
Auto
Performs image smoothing automatically for images that have a resolution less than 25% of supported
printer resolution.
Less than 90 ppi - Less than 300 ppi
Performs image smoothing only when the image has an image resolution (pixels per inch) less than
the respective value you have selected in the list.

• When [Auto] is selected, data processing may take a long time.


• When Image Smoothing is used for a mask image, this function may have an undesired effect on the
print result.

89
3. Using PostScript 3

Print Mode

Select the print mode.


The following table shows the tabs or menus where you can select this function.

Windows 2000 / XP / Vista, Windows Server [Print Mode:] on [Print Quality] tab in the Printing
2003 / 2003 R2 / 2008 Preferences dialog box.

[Print Mode:] on [Printer Specific Options] in the


3 Mac OS
print dialog box.

[Print Mode:] on the [Features x] tab on


Mac OS X
[Printer Features] in the print dialog box.

You can select the following items:


Off
Disables print mode.
Edge Smoothing
Smoothes jagged lines in text and graphics to produce a finer image.
Toner Saving
Reduces the amount of toner used when printing.

90
4. Printer Utility for Mac

Installing Printer Utility for Mac


Follow these steps to install Printer Utility for Mac on the machine.

• If a Macintosh and printer are connected by USB, you cannot use Printer Utility for Mac.

1. Start the Mac OS.


2. Insert the CD-ROM into the CD-ROM drive.
The CD-ROM icon appears. 4
3. Double-click the CD-ROM icon.
The contents of the CD-ROM appear.
4. Double-click the [Mac OS] folder.
Under Mac OS X, double-click the [Mac OS X] folder.
5. Double-click the [PS Utility] folder on the CD-ROM, and then drag the [Printer Utility for
Mac] file, and then drop it into the Macintosh hard disk.
6. Drag the CD-ROM icon and drop it into [Trash] to eject the CD-ROM.
Printer Utility for Mac is installed.

• Printer Utility for Mac is included on the CD-ROM labeled “Printer Drivers and Utilities”.
• Printer Utility for Mac requires Mac OS 8.1 or higher. (Mac OS X Classic environment is supported.)
• Printer Utility for Mac cannot use Mac OS X (native mode).

91
4. Printer Utility for Mac

Starting Printer Utility for Mac


The following instructions describe how to start Printer Utility for Mac.

Mac OS

• Before starting Printer Utility for Mac, make sure the printer is selected in [Chooser] on the Apple
menu.

1. Double-click the Printer Utility for Mac icon.


4 The [Printer Utility for Mac] dialog box appears.
2. Click [OK].
Printer Utility for Mac will take a few seconds to start.

Mac OS X

1. Double-click the Printer Utility for Mac icon.


The [Printer Utility for Mac] dialog box appears.
2. Click [OK].
3. In the [Available Printers:] box, select the printer you want to use.
If you change zones, select a name from [Available Network Zones:].
Click [Choose Printer...] on the Printer Utility for Mac menu if you want to change the printer.
4. Select the printer you want to use.
Printer Utility for Mac will take a few seconds to start.
5. Click [Choose].

92
Printer Utility for Mac Functions

Printer Utility for Mac Functions


Printer Utility for Mac functions are described below.
File menu
• [Download PS Fonts...]
Download fonts (PostScript Type 1) to the printer. See Downloading PS Fonts.
• [Display Printer's Fonts...]
Display and delete the fonts in printer memory and the printer's hard disk drive.
See Displaying Printer's Fonts.
• [Initialize Printer's Disk...]
Initialize the printer's hard disk drive. See Initializing the Printer Disk.
4
• [Page Setup...]
Set up the paper size to print “Printer Font Catalog” and “Printer Font Sample”.
See Page Setup.
• [Print Fonts Catalog...]
Print the names of available fonts. See Printing Fonts Catalog.
• [Print Fonts Sample...]
Print a sample of fonts. See Printing Fonts Sample.
• [Rename Printer...]
Change the printer's name when viewed via AppleTalk. See Renaming the Printer.
• [Restart Printer]
Restart the printer. See Restarting the Printer.
Utility menu
• [Download PostScript File...]
Download a PostScript file. See Downloading PostScript Files.
• [Select Zone...]
Change the zone to which the printer belongs to via AppleTalk. See Selecting the Zone.
• [Display Printer Status...]
Display the status of the printer. See Displaying the Printer Status.
• [Launch Dialogue Console...]
Create and edit a PostScript file, and then download it to the printer. See Launching the Dialogue
Console.

93
4. Printer Utility for Mac

Downloading PS Fonts

You can download the PS fonts to the printer's memory or hard disk drive.

• The following procedures to download the fonts assume that you are a system administrator. If you
are not, be sure to consult your system administrator.
• If the printer restarts, all the printer settings return to their defaults.
• Confirm that a Mac OS and the printer are connected with AppleTalk.
• During the download, do not turn off the power switch, operate the panel or open or close the cover.

1. Select [Download PS Fonts...] on the [File] menu.


4 2. Click [Add to list].
The dialog box to select fonts appears.
3. Click to select the desired font files, and then click [Open].
The list of selectable font names appears.
4. After adding all the fonts you want to download, click [OK].
The dialog box of selected fonts to download appears.
5. Click [Download].
The fonts begin to download, and the download status is shown.
6. When the completion message appears, click [OK].
7. Click [Cancel].

• Some fonts cannot be downloaded.


• Before downloading, read the documentation about the fonts you want to use.

Displaying Printer's Fonts

You can display the available fonts currently downloaded to the printer. Fonts in the printer's memory and
hard disk drive can be displayed.

1. Select [Display Printer's Fonts...] on the [File] menu.


A dialog box appears.
2. Select [Printer's memory] or [Printer's disk].
3. Click [OK].

94
Printer Utility for Mac Functions

• The fonts displayed in italics are the default fonts.

Deleting Fonts

You can delete fonts from the printer's memory or hard disk drive.

• You cannot delete the fonts displayed in italic.

1. Select [Display Printer's fonts] on the [File] menu.


A dialog box appears.
4
2. Select [Printer's memory] or [Printer's disk].
3. Select the fonts you want to delete.
4. Click [Delete].
A confirmation message appears.
5. Confirm the fonts you want to delete and the printer name from which you want to delete
the fonts.
6. Click [Continue], and then click [OK].
7. Click [OK].

Initializing the Printer Disk

When initializing the printer's hard disk drive, all the fonts downloaded to the printer's hard disk drive are
deleted. Before initializing, be sure to check the fonts on the hard disk drive.

• When initializing the printer's hard disk drive from the operation panel, all of the data on the printer's
hard disk drive is deleted. Before initializing, be sure to check the data on the hard disk drive.
• Do not turn off the power switch until initializing is completed, otherwise the hard disk drive might be
damaged.

1. Select [Initialize Printer's Disk...] on the [File] menu.


The confirmation message appears.
To cancel initialization, click [Cancel].
2. Click [Execute].
Initializing starts.
3. When the completion message appears, click [OK].

95
4. Printer Utility for Mac

Page Setup

You can set the paper size on which to print “Print Fonts Catalogue” and “Prints Fonts Sample”.

1. Select [Page Setup...] on the [File] menu.


2. Choose the paper size.

Printing Fonts Catalog

Print the names of fonts available on the printer.

1. Select [Print Fonts Catalogue] on the [File] menu.


4 2. Click [Print].

• The paper selected under [Page Setup] is used.

Printing Fonts Sample

You can print samples of fonts downloaded to the hard disk drive or memory.

1. Select [Print Fonts Sample...] on the [File] menu.


2. Click [Print].

• Print by using the paper selected on [Page Setup].

Renaming the Printer

You can change the printer name displayed under AppleTalk. If you connect several printers on the network,
assign different names so you can identify them. If several printers have the same name, a digit appears
next to the printer name in [Chooser].

• You can enter up to 31 digits and letters.


• Do not use symbols, for example “*”, “:”, “=”, “@”, “~”.

Mac OS

1. On the [File] menu, click [Rename Printer...].


2. In the [New Name:] filed enter a new name.

96
Printer Utility for Mac Functions

3. Click [Rename].
The printer name is changed.
4. Click [OK].
5. On the Apple menu, click [Chooser].
6. Click the [AdobePS] icon.
7. Select the printer whose name you changed, and then close the [Chooser] dialog box.
If there are several AppleTalk zones, select the zone the machine belongs to.

Mac OS X

1. On the [File] menu, click [Rename Printer...].


2. In the [New Name:] filed enter a new name. 4
3. Click [Rename].
The printer name is changed.
4. Click [OK].
5. On the Printer Utility for Mac menu, click [Choose Printer...].
6. In the [Available Network Zones:] list, select the zone for the Macintosh in use.
7. In the [Available Printers:] list, select the printer whose name you changed, and then click
[Choose].

Restarting the Printer

You can restart the printer.

1. Select [Restart Printer] on the [File] menu.


2. Confirm the message that appears on the screen, and then click [Restart].
The printer restarts.
The fonts that you downloaded in the printer's memory will be deleted.
If the printer restarts, all the printer settings return to their defaults.

Downloading PostScript Files

You can download a Postscript file to the printer.

1. Select [Download PostScript File...] on the [Utility] menu.


2. Select the file name to download and click the file name, and then click [Open].

97
4. Printer Utility for Mac

3. Type the log file name, and then click [Save...].


The selected file is downloaded.
Errors are recorded in the log file.

Selecting the Zone

You can change the zone to which the printer belongs under AppleTalk.

• Confirm that a Macintosh and printer are connected with AppleTalk.

4 Mac OS

1. On the [Utility] menu, click [Select Zone...].


The zone to which the printer belongs and the available zone list appear.
2. Select the zone in which you want to locate the printer, and then click [Change].
A confirmation message appears.
3. Click [Continue].
A confirmation message appears.
4. Click [OK].
5. On the Apple menu, click [Chooser].
6. Click the [AdobePS] icon.
7. In the [AppleTalk zone:] list, select the zone you changed.
8. In the [Select a PostScript Printer:] list, select the printer you want to use.
9. Close the [Chooser] dialog box.

Mac OS X

1. On the [Utility] menu, click [Select Zone...].


The zone to which the printer belongs and the available zone list appear.
2. Select the zone which you want to locate the printer in, and then click [Change].
A confirmation message appears.
3. Click [Continue].
A confirmation message appears.
4. Click [OK].
5. On the [Printer Utility for Mac] menu, click [Choose Printer...].
6. In the [Available Network Zones:] list, select the zone you changed.

98
Printer Utility for Mac Functions

7. In the [Available Printers:] list, select the model of printer in use, and then click [Choose].

Displaying the Printer Status

You can display and confirm the current status of the printer.

1. Select [Display Printer Status...] on the [Utility] menu.


The current status of the printer appears.
2. Confirm the current status of the printer.
You can confirm the memory capacity, the VM (Virtual Memory) space, the hard disk drive status and
available space on the hard disk drive. You can also confirm the zone to which the printer belongs
to. 4
3. Click [OK].

Launching the Dialogue Console

You can create and edit a PostScript file for printing, and then download it to the printer.

• “Launch Dialogue Console” is recommended for users with an understanding of PostScript.


• Do not download any file other than PostScript files to the printer.
• “Launch Dialogue Console” must be used at your own responsibility.

1. Select [Launch Dialogue Console...] on the [Utility] menu.


Open the editing screen. The Dialogue Console menu bar appears.
2. Type the PostScript command in the editor screen.
To edit a PostScript file, select [Open] on the [File] menu to open it.
You can search or replace a character string by using the [Search] menu.
3. After editing the PostScript file, select [Download Top Window] on [Console] menu to start
printing.
The PostScript file is sent to the printer.
The [Reply from Printer] box opens, depending on the PostScript file you sent.
4. Select [Return To Main Menu] on the [Console] menu to close the PostScript file.

99
4. Printer Utility for Mac

100
5. Appendix

Trademarks
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, Adobe Type Manager, PageMaker, PostScript, and Reader are either
registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other
countries.
Apple, AppleTalk, Bonjour, EtherTalk, Macintosh, Mac OS, and TrueType are registered trademarks of
Apple Inc., registered in the United States and other countries.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows: 5
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows® Vista Ultimate
Microsoft® Windows® Vista Business
Microsoft® Windows® Vista Home Premium
Microsoft® Windows® Vista Home Basic
Microsoft® Windows® Vista Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition

101
5. Appendix

• The product names of Windows Server 2003 R2 are as follows:


Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
• The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

102
INDEX
A Windows network printer..................................................30
WSD...................................................................................33
About This Machine.................................................5 Installing Adobe Type Manager
Add printer.............................................................44 Mac OS..............................................................................55

C Installing screen fonts


Mac OS..............................................................................55
Changing the port settings....................................20
Installing the PostScript 3 printer driver and PPD file
Changing to EtherTalk...........................................59 Mac OS..............................................................................53
Mac OS..............................................................................56
Installing the PPD files
Collate....................................................................85 Mac OS X...........................................................................57
Configuring............................................................61 Installing the Printer Driver Using USB
Copies....................................................................81 Windows 2000.................................................................36
Copy Reference.......................................................5 IP address.................................................................8
D J
Deleting fonts.........................................................95 Job type..................................................................64
Displaying printer's fonts.......................................94
L
Displaying the printer status..................................99
Dithering.................................................................88 Launching the dialogue console..........................99
Downloading PostScript files................................97 Laws and regulations...............................................9
Downloading PS fonts...........................................94 Layout/booklet......................................................82
Draw border..........................................................83 Legal prohibition......................................................9
Duplex printing......................................................83 Locked print............................................................69

F M

Facsimile Reference.................................................5 Making option settings..........................................46


Fit to paper.............................................................80 N
H NetWare................................................................35
Hold print...............................................................72 Network and System Settings Guide.....................5
How to read this manual.........................................8 Note..........................................................................8
Notice.......................................................................7
I
O
Image smoothing...................................................89
Important..................................................................7 Orientation.............................................................81
Initializing printer disk...........................................95 Orientation override.............................................. 82
Input slot.................................................................80 Other manuals.........................................................5
Install P
DeskTop Binder-SmartDeviceMonitor for Client port...........
.............................................................................................11 Page order.............................................................83
IPP.......................................................................................11 Page setup.............................................................96
LPR.......................................................................................26 Paper size...............................................................78
Parallel................................................................................40
Paper type..............................................................86
Standard TCP/IP...............................................................22
PostScript 3 Supplement.........................................5
TCP/IP................................................................................11
USB.....................................................................................36
Print mode..............................................................90
Print on....................................................................79

103
Printer Reference......................................................5 Watermark angle..................................................87
Printer Utility for Mac...............................91, 96, 98 Watermark font.....................................................87
Functions.............................................................................93 Watermark size.....................................................87
Installing..............................................................................91 Watermark style....................................................88
Starting................................................................................92
Watermark text......................................................86
Printing fonts catalog.............................................96 Windows 2000
Printing fonts sample..............................................96 printer properties, PostScript 3.........................................47
R Windows Server 2003
printer properties, PostScript 3.........................................48
Reduce/enlarge....................................................78
Windows Vista
Renaming the printer.............................................96 printer properties, PostScript 3.........................................50
Restarting the printer.............................................97 Windows XP
Reverse order print................................................85 printer properties, PostScript 3.........................................48
Rotate by 180 degrees.........................................81
S
Sample print...........................................................66
Scale.......................................................................79
Scanner Reference..................................................5
Security Reference...................................................5
Selecting the zone.................................................98
Setting up options..................................................63
Mac OS..............................................................................54
Mac OS X...........................................................................58
Setting up PPD files
Mac OS..............................................................................54
Setting up the PPD file
Mac OS X...........................................................................57
Store and print.......................................................74
Stored print............................................................74
Symbols....................................................................8
T
Trademarks..........................................................101
Trouble Shooting.....................................................5
Troubleshooting for using USB.............................39
U
User code...............................................................77
Using bonjour
Mac OS X...........................................................................59
Using USB interface
Mac OS X...........................................................................58

W
Watermark.............................................................86

104 GB GB EN USA AE AE D468


Copyright © 2008
PostScript 3 Supplement

D468-6800
USA
AE
GB
GB

AE
EN
Operating Instructions
Security Reference

1 Getting Started
2 Configuring Administrator Authentication
3 Configuring User Authentication
4 Protecting Data from Information Leaks
5 Securing Information Sent over the Network or Stored on Hard Disk
6 Managing Access to the Machine
7 Enhanced Network Security
8 Specifying the Extended Security Functions
9 Troubleshooting
10 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................7
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Display..........................................................................................................................................................10
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
1. Getting Started
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................20
Enhancing Network Security......................................................................................................................20
2. Configuring Administrator Authentication
Administrators...................................................................................................................................................21
User Administrator.......................................................................................................................................21
Machine Administrator................................................................................................................................22
Network Administrator................................................................................................................................22
File Administrator.........................................................................................................................................22
Supervisor.....................................................................................................................................................22
About Administrator Authentication................................................................................................................23
Enabling Administrator Authentication...........................................................................................................25
Specifying Administrator Privileges............................................................................................................25
Registering the Administrator......................................................................................................................27
Logging on Using Administrator Authentication........................................................................................32
Logging off Using Administrator Authentication........................................................................................33

1
Changing the Administrator........................................................................................................................33
Using Web Image Monitor to Configure Administrator Authentication..................................................35
3. Configuring User Authentication
Users..................................................................................................................................................................37
About User Authentication...............................................................................................................................38
Configuring User Authentication.....................................................................................................................39
Enabling User Authentication..........................................................................................................................41
User Code Authentication...............................................................................................................................42
Specifying User Code Authentication........................................................................................................42
Basic Authentication.........................................................................................................................................48
Specifying Basic Authentication..................................................................................................................48
Authentication Information Stored in the Address Book...........................................................................53
Specifying Login User Names and Passwords..........................................................................................53
Specifying Login Details..............................................................................................................................56
Windows Authentication.................................................................................................................................60
Specifying Windows Authentication..........................................................................................................61
Installing Internet Information Services (IIS) and Certificate Services......................................................67
Creating the Server Certificate...................................................................................................................67
If the fax number cannot be obtained........................................................................................................68
Installing the Device Certificate (Issued by a Certificate Authority).........................................................68
LDAP Authentication.........................................................................................................................................70
Specifying LDAP Authentication.................................................................................................................71
Integration Server Authentication....................................................................................................................78
Specifying Integration Server Authentication............................................................................................78
Printer Job Authentication................................................................................................................................87
If User Authentication is Specified..................................................................................................................90
If User Code Authentication is Specified....................................................................................................90
If Basic, Windows, LDAP or Integration Server Authentication is Specified...........................................91
User Lockout Function..................................................................................................................................93
Auto Logout..................................................................................................................................................95
Authentication Using an External Device.......................................................................................................97
4. Protecting Data from Information Leaks
Printing a Confidential Document...................................................................................................................99

2
Specifying Locked Print File.........................................................................................................................99
Printing a Locked Print File........................................................................................................................100
Deleting Locked Print Files........................................................................................................................101
Changing the Password of a Locked Print File........................................................................................102
Unlocking a Locked Print File....................................................................................................................104
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission........................................................107
Restricting Destinations..............................................................................................................................107
Using S/MIME to Protect E-mail Transmission............................................................................................110
E-mail Encryption.......................................................................................................................................110
Attaching an Electronic Signature............................................................................................................112
Protecting the Address Book.........................................................................................................................118
Configuring Address Book Access Permissions......................................................................................118
Encrypting Data in the Address Book......................................................................................................120
Encrypting Data on the Hard Disk................................................................................................................124
Enabling the Encryption Settings..............................................................................................................124
Printing the Encryption Key.......................................................................................................................126
Updating the Encryption Key....................................................................................................................127
Canceling Data Encryption......................................................................................................................129
Deleting Data on the Hard Disk....................................................................................................................132
Auto Erase Memory..................................................................................................................................132
Erase All Memory......................................................................................................................................136
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................141
Menu Protect..................................................................................................................................................143
Specifying Menu Protect...........................................................................................................................143
Limiting Available Functions..........................................................................................................................147
Specifying Which Functions are Available.............................................................................................147
Managing Log Files.......................................................................................................................................150
Using the Control Panel to Specify Log File Settings..............................................................................150
Using Web SmartDeviceMonitor to Manage Log Files.........................................................................153
Using Web Image Monitor to Manage Log Files...................................................................................153
Logs that can be Managed Using Web Image Monitor........................................................................157

3
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................163
Access Control...........................................................................................................................................163
Enabling and Disabling Protocols............................................................................................................164
Specifying Network Security Level..........................................................................................................172
Encrypting Transmitted Passwords...............................................................................................................176
Specifying a Driver Encryption Key.........................................................................................................176
Specifying a Group Password for PDF Files............................................................................................178
Specifying an IPP Authentication Password............................................................................................179
Protection Using Encryption..........................................................................................................................181
SSL (Secure Sockets Layer) Encryption....................................................................................................181
User Settings for SSL (Secure Sockets Layer)..........................................................................................186
Setting the SSL/TLS Encryption Mode.....................................................................................................186
SNMPv3 Encryption.................................................................................................................................188
Transmission Using IPsec...............................................................................................................................190
Encryption and Authentication by IPsec..................................................................................................190
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................191
IPsec Settings.............................................................................................................................................192
Encryption Key Auto Exchange Settings Configuration Flow................................................................200
Encryption Key Manual Settings Configuration Flow.............................................................................205
telnet Setting Commands..........................................................................................................................206
Authentication by telnet.................................................................................................................................214
"authfree" Command.................................................................................................................................214
Authentication by IEEE802.1X.....................................................................................................................215
8. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................217
Changing the Extended Security Functions.............................................................................................217
Extended Security Settings........................................................................................................................218
Other Security Functions...............................................................................................................................223
Fax Function...............................................................................................................................................223
Scanner Function.......................................................................................................................................224
Limiting Machine Operations to Customers Only.......................................................................................225
Settings.......................................................................................................................................................225

4
Additional Information for Enhanced Security............................................................................................228
Settings you can Configure Using the Control Panel..............................................................................228
Settings you can Configure Using Web Image Monitor........................................................................230
Settings you can Configure when IPsec is Available/Unavailable......................................................231
9. Troubleshooting
If Authentication Fails.....................................................................................................................................235
If a Message is Displayed........................................................................................................................235
If the Machine Cannot Be Operated.......................................................................................................237
10. Appendix
Supervisor Operations..................................................................................................................................241
Logging on as the Supervisor...................................................................................................................241
Logging off as the Supervisor...................................................................................................................242
Changing the Supervisor..........................................................................................................................242
Resetting the Administrator's Password....................................................................................................245
Machine Administrator Settings....................................................................................................................248
System Settings..........................................................................................................................................248
Copier Features.........................................................................................................................................250
Fax Features...............................................................................................................................................250
Printer Features..........................................................................................................................................251
Scanner Features.......................................................................................................................................252
Settings via Web Image Monitor.............................................................................................................253
Settings via SmartDeviceMonitor for Admin...........................................................................................257
Network Administrator Settings....................................................................................................................258
System Settings..........................................................................................................................................258
Fax Features...............................................................................................................................................259
Printer Features..........................................................................................................................................259
Scanner Features.......................................................................................................................................259
Settings via Web Image Monitor.............................................................................................................260
Settings via SmartDeviceMonitor for Admin...........................................................................................262
File Administrator Settings.............................................................................................................................263
System Settings..........................................................................................................................................263
Fax Features...............................................................................................................................................263
Printer Features..........................................................................................................................................263

5
Settings via Web Image Monitor.............................................................................................................264
User Administrator Settings...........................................................................................................................265
System Settings..........................................................................................................................................265
Settings via Web Image Monitor.............................................................................................................265
Settings via SmartDeviceMonitor for Admin...........................................................................................266
The Privilege for User Account Settings in the Address Book.....................................................................267
User Settings - Control Panel Settings..........................................................................................................270
Copier Features..............................................................................................................................................271
Printer Features...............................................................................................................................................272
Scanner Features...........................................................................................................................................276
Fax Features...................................................................................................................................................278
System Settings...............................................................................................................................................281
User Settings - Web Image Monitor Settings..............................................................................................287
Device Settings...............................................................................................................................................288
Printer..............................................................................................................................................................294
Scanner...........................................................................................................................................................300
Fax..................................................................................................................................................................302
Interface..........................................................................................................................................................305
Network..........................................................................................................................................................307
Webpage.......................................................................................................................................................311
Functions That Require Options....................................................................................................................312
Trademarks.....................................................................................................................................................313
INDEX...........................................................................................................................................................315

6
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. Be sure to read
this manual when setting the enhanced security functions, or user and administrator authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• Unix Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For "UNIX Supplement", please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product name General name

DeskTopBinder Lite and DeskTopBinder


DeskTopBinder
Professional*1

ScanRouter EX Professional*1 and ScanRouter EX


the ScanRouter delivery software
Enterprise*1

Web SmartDeviceMonitor Professional IS*1 and


Web SmartDeviceMonitor
Web SmartDeviceMonitor Standard*1

*1 Optional

8
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

9
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.

[]
Indicates the names of keys that appear on the machine's display panel.

[]
Indicates the names of keys on the machine's control panel.

Display

The display panel shows machine status, error messages, and function menus.
When you select or specify an item on the display panel, it is highlighted like .
The copy display is set as the default screen when the machine is turned on.

10
Reading the Display and Using Keys

1 2 3 BRE001S

1. Selection keys
Correspond to items at the bottom line on the display.
• When the instruction "press [IP Add.]" appears in this manual, press the left selection key.
• When the instruction "press [Subnet M]" appears in this manual, press the center selection key.
• When the instruction "press [Mac Add.]" appears in this manual, press the right selection key.
2. [Escape] key
Press to cancel an operation or return to the previous display.
3. [OK] key
Press to set a selected item or entered numeric value.
4. Scroll keys
Press to move the cursor to each direction one by one.
When [ ][ ][ ], or [ ] key appears in this manual, press the scroll key of the same direction.

IP Address

In this manual, "IP address" covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.

Note

Contents of this manual are subject to change without prior notice.


Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

11
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.

12
1. Getting Started
This chapter describes the machine's security features and how to specify initial security settings.

1
Before Using the Security Functions

• If the security settings are not specified, the machine may be damaged by malicious attackers.
1. To prevent this machine being stolen or willfully damaged, etc., install it in a secure location.
2. Purchasers of this machine must make sure that people who use it do so appropriately, in accordance
with operations determined by the machine administrator and supervisor. If the administrator or
supervisor does not make the required security settings, there is a risk of security breaches by users.
3. Before setting this machine's security features and to ensure appropriate operation by users,
administrators must read the Security Reference completely and thoroughly, paying particular
attention to the section entitled "Before Using the Security Functions".
4. Administrators must inform users regarding proper usage of the security functions.
5. Administrators should routinely examine the machine's logs to check for irregular and unusual events.
6. If this machine is connected to a network, its environment must be protected by a firewall or similar.
7. For protection of data during the communication stage, apply the machine's communication security
functions and connect it to devices that support security functions such as encrypted communication.

13
1. Getting Started

Setting Up the Machine


This section explains how to enable encryption of transmitted data and configure the administrator account.
1 If you want higher security, make the following setting before using the machine.

1. Turn the machine on.


2. Press the [User Tools/Counter] key.

BQP002S

3. Press [System Settings] using [ ] or [ ], and then press the [OK] key.

4. Press [Interface Settings] using [ ] or [ ], and then press the [OK] key.

5. Select [Network] using [ ] or [ ], and then press the [OK] key.

6. Specify IPv4 Address.


For details on how to specify the IPv4 address, see "Interface Settings", Network and System Settings
Guide.
7. Connect the machine to the network.

14
Setting Up the Machine

8. Start Web Image Monitor, and then log on to the machine as the administrator.
For details about logging on to Web Image Monitor as an administrator, see "Using Web Image
Monitor to Configure Administrator Authentication".
9. Install the device certificate. 1
For information on how to install the device certificate, see "Protection Using Encryption".
10. Enable secure sockets layer (SSL).
11. Enter the administrator's user name and password.
For details about specifying the administrator user name and password, see "Registering the
Administrator".
The administrator's default account (user name: "admin"; password: blank) is unencrypted between
steps 7 to 10. If acquired during this time, this account information could be used to gain unauthorized
access to the machine over the network.
If you consider this risky, we recommend that you specify a temporary administrator password for
accessing Web Image Monitor for the first time, before connecting to the network in step 7.
We recommend you change the supervisor's password also. For details about changing the
supervisor's user name and password, see "Changing the Supervisor".

• p.35 "Using Web Image Monitor to Configure Administrator Authentication"


• p.181 "Protection Using Encryption"
• p.27 "Registering the Administrator"
• p.242 "Changing the Supervisor"

15
1. Getting Started

Enhanced Security
This machine's security functions can be enhanced by managing the machine and its users using the
1 improved authentication functions.
By specifying access limits for the machine's functions and the documents and data stored in the machine,
information leaks and unauthorized access can be prevented.
Data encryption also prevents unauthorized data access and tampering via the network.
The machine also automatically checks the configuration and supplier of the firmware each time the main
power is switched on and whenever firmware is installed.
Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To enable authentication,
information about both administrators and users must be registered in order to authenticate users via
their login user names and passwords.
Four types of administrators manage specific areas of machine usage, such as settings and user
registration.
Access limits for each user are specified by the administrator responsible for user access to machine
functions and documents and data stored in the machine.
For details about the administrator, see "Administrators".
For details about the user, see "Users".
Encryption Technology
This machine can establish secure communication paths by encrypting transmitted data and
passwords.

• p.21 "Administrators"
• p.37 "Users"

16
Glossary

Glossary
Administrator
There are four types of administrators according to administrative function: machine administrator, 1
network administrator, file administrator, and user administrator. We recommend a different person
for each administrator role.
In this way, you can spread the workload and limit unauthorized operation by a single administrator.
Basically, administrators make machine settings and manage the machine; but they cannot perform
normal operations, such as copying and printing.
User
A user performs normal operations on the machine, such as copying and printing.
Registered User
Users with personal information registered in the Address Book who have a login password and user
name.
Administrator Authentication
Administrators are authenticated by their login user name and login password, supplied by the
administrator, when specifying the machine's settings or accessing the machine over the network.
User Authentication
Users are authenticated by a login user name and login password, supplied by the user, when
specifying the machine's settings or accessing the machine over the network.
The user's login user name and password, as well as such personal information items as facsimile
number and e-mail address, are stored in the machine's Address Book. Personal information can be
obtained from the Windows domain controller (Windows authentication), LDAP Server (LDAP
authentication), or Integration Server (Integration Server authentication) connected to the machine
via the network. The "Integration Server" is the computer on which Authentication Manager is installed.
Login
This action is required for administrator authentication and user authentication. Enter your login user
name and login password on the machine's control panel. A login user name and login password
may also be required when accessing the machine over the network or using such utilities as Web
Image Monitor and SmartDeviceMonitor for Admin.
Logout
This action is required with administrator and user authentication. This action is required when you
have finished using the machine or changing the settings.

17
1. Getting Started

Security Measures Provided by this Machine

1 Using Authentication and Managing Users

Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see "Configuring
User Authentication".
Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log on, see "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see "Limiting Available Functions".

• p.39 "Configuring User Authentication"


• p.48 "Basic Authentication"
• p.147 "Limiting Available Functions"

Ensuring Information Security

Printing Confidential files


Using the printer's Locked Print, you can store files in the machine as confidential files and then print
them. You can print a file using the machine's control panel and collect it on the spot to prevent others
from seeing it. For details about printing confidential files, see "Printing a Confidential Document".
Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the Address Book which users are allowed to send files using the scanner or fax
function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book. For details about preventing data leaks due to unauthorized
transmission, see "Preventing Information Leakage Due to Unauthorized Transmission".

18
Security Measures Provided by this Machine

Using S/MIME to Protect E-mail Transmission


When sending mail from the scanner to a user registered in the Address Book, you can use S/MIME
to protect its contents from interception and alteration, and attach an electronic signature to guarantee
the sender's identity. For details about using S/MIME to protect e-mail transmission, see "Using S/
MIME to Protect E-mail Transmission".
1
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see "Protecting the Address
Book".
Managing Log Files
The logs record failed access attempts and the names of users who accessed the machine successfully.
You can use this information to help prevent data leaks.
To transfer the log data, Web SmartDeviceMonitor is required. For details about managing log files,
see "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. The HDD Encryption Unit is
required for hard disk data encryption. For details, see "Encrypting Data on the Hard Disk".
Overwriting the Data on the Hard Disk
To prevent data leaks, you can set the machine to automatically overwrite temporary data. We
recommend that before disposing of the machine, you overwrite all the data on the hard disk. To
overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required. For details about
overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".

• p.99 "Printing a Confidential Document"


• p.107 "Preventing Information Leakage Due to Unauthorized Transmission"
• p.110 "Using S/MIME to Protect E-mail Transmission"
• p.118 "Protecting the Address Book"
• p.150 "Managing Log Files"
• p.124 "Encrypting Data on the Hard Disk"
• p.132 "Deleting Data on the Hard Disk"

19
1. Getting Started

Limiting and Controlling Access

Preventing Modification of Machine Settings

1 The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see "Preventing Changes to Machine Settings".
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machine's
functions. For details about limiting available functions for users and groups, see "Limiting Available
Functions".

• p.141 "Preventing Changes to Machine Settings"


• p.147 "Limiting Available Functions"

Enhancing Network Security

Preventing Unauthorized Access


You can limit IP addresses or disable ports to prevent unauthorized access over the network and
protect the Address Book, and default settings. For details about preventing unauthorized access, see
"Preventing Unauthorized Access".
Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentication passwords from being
revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user authentication. For details
about encrypting transmitted passwords, see "Encrypting Transmitted Passwords".
Safer Communication Using SSL, SNMPv3 and IPsec
You can encrypt this machine's transmissions using SSL, SNMPv3, and IPsec. By encrypting transmitted
data and safeguarding the transmission route, you can prevent sent data from being intercepted,
analyzed, and tampered with. For details about safer communication using SSL, SNMPv3 and IPsec,
see "Protection Using Encryption" and "Transmission Using IPsec".

• p.163 "Preventing Unauthorized Access"


• p.176 "Encrypting Transmitted Passwords"
• p.181 "Protection Using Encryption"
• p.190 "Transmission Using IPsec"

20
2. Configuring Administrator
Authentication
This chapter explains what an administrator can do, how to register an administrator, how to specify
administrator authentication, and how to log on to and off from the machine as an administrator.

2
Administrators
Administrators manage user access to the machine and various other important functions and settings.
When an administrator controls access limitations and other settings, first select the machine's administrator
and enable the authentication function before using the machine. When the authentication function is
enabled, the login user name and login password are required in order to use the machine. There are four
types of administrators: machine administrator, network administrator, file administrator and user
administrator. Sharing administrator tasks eases the burden on individual administrators while also limiting
unauthorized operation by administrators. One person can act as more than one type of administrator.
You can also specify a supervisor who can change each administrator's password. Administrators cannot
use functions such as copying and printing. To use these functions, the administrator must be authenticated
as the user.
For instructions on registering the administrator, see "Registering the Administrator", and for instructions on
changing the administrator's password, see "Supervisor Operations". For details on Users, see "Users".

• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.

• p.27 "Registering the Administrator"


• p.241 "Supervisor Operations"
• p.37 "Users"

User Administrator

This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal information.
Users registered in the Address Book can also change and delete their own information.
If any of the users forget their password, the user administrator can delete it and create a new one, allowing
the user to access the machine again.

21
2. Configuring Administrator Authentication

Machine Administrator

This is the administrator who mainly manages the machine's default settings. You can set the machine so
that the default for each function can only be specified by the machine administrator. By making this setting,
you can prevent unauthorized people from changing the settings and allow the machine to be used securely
by its many users.
2
Network Administrator

This is the administrator who manages the network settings. You can set the machine so that network settings
such as the IP address and settings for sending and receiving e-mail can only be specified by the network
administrator.
By making this setting, you can prevent unauthorized users from changing the settings and disabling the
machine, and thus ensure correct network operation.

File Administrator

This is the administrator who manages files. The file administrator can carry out such tasks as deleting Locked
Print files and changing passwords.

Supervisor

The supervisor can delete an administrator's password and specify a new one. The supervisor cannot
specify defaults or use normal functions. However, if any of the administrators forget their password and
cannot access the machine, the supervisor can provide support.

22
About Administrator Authentication

About Administrator Authentication


There are four types of administrators: user administrator, machine administrator, network administrator,
and file administrator.
For details about each administrator, see "Administrators".

BBC005S

1. User Administrator
This administrator manages personal information in the Address Book. You can register/delete users in the
Address Book or change users' personal information.
2. Machine Administrator
This administrator manages the machine's default settings. It is possible to enable only the machine administrator
to set log deletion and other defaults.
3. Network Administrator
This administrator manages the network settings. You can set the machine so that network settings such as the IP
address and settings for sending and receiving e-mail can be specified by the network administrator only.
4. File Administrator
This is the administrator who manages files. The file administrator can carry out such tasks as deleting Locked
Print files and changing passwords.
5. Authentication
Administrators must enter their login user name and password to be authenticated.
6. This machine
7. Administrators manage the machine's settings and access limits.

23
2. Configuring Administrator Authentication

• p.21 "Administrators"

24
Enabling Administrator Authentication

Enabling Administrator Authentication


To control administrators' access to the machine, perform administrator authentication using login user
names and passwords. When registering an administrator, you cannot use a login user name already
registered in the Address Book. Administrators are handled differently from the users registered in the
Address Book. Windows Authentication, LDAP Authentication and Integration Server Authentication are
not performed for an administrator, so an administrator can log on even if the server is unreachable due 2
to a network problem. Each administrator is identified by a login user name. One person can act as more
than one type of administrator if multiple administrator authorities are granted to a single login user name.
For instructions on registering the administrator, see "Registering the Administrator".
You can specify the login user name, login password, and encryption password for each administrator.
The encryption password is a password for performing encryption when specifying settings using Web
Image Monitor or SmartDeviceMonitor for Admin. The password registered in the machine must be entered
when using applications such as SmartDeviceMonitor for Admin. Administrators are limited to managing
the machine's settings and controlling user access, so they cannot use functions such as copying and printing.
To use these functions, the administrator must register as a user in the Address Book and then be
authenticated as the user. Specify administrator authentication, and then specify user authentication. For
details about specifying authentication, see "Configuring User Authentication".

• Administrator authentication can also be specified via Web Image Monitor. For details, see Web
Image Monitor Help.
• You can specify User Code Authentication without specifying administrator authentication.

• p.27 "Registering the Administrator"


• p.39 "Configuring User Authentication"

Specifying Administrator Privileges

To specify administrator authentication, set Administrator Authentication Management to [On]. In addition,


if enabled in the settings, you can choose how the initial settings are divided among the administrators as
controlled items.
To log on as an administrator, use the default login user name and login password.
The defaults are "admin" for the login name and blank for the password. For details about changing the
administrator password using the supervisor's authority, see "Supervisor Operations".
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

25
2. Configuring Administrator Authentication

• If you have enabled Administrator Authentication Management, make sure not to forget the
administrator login user name and login password. If an administrator login user name or login
password is forgotten, a new password must be specified using the supervisor's authority. For
instructions on registering the supervisor, see "Supervisor Operations".
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
2 service representative will have to return the machine to its default state. This will result in all data in
the machine being lost. Charges may also apply to the service call.

1. Press the [User Tools/Counter] key.


2. Press [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Press [Admin. Auth. Management] using [ ] or [ ], and then press the [OK] key.

5. Select [User Management], [Machine Management], [Network Management], or [File


Management] using [ ] or [ ], and then press the [OK] key.

26
Enabling Administrator Authentication

6. Select [On] using [ ] or [ ], and then press the [OK] key.

[Items] appears. 2
7. Select the settings to manage from [Items] using [ ], and then press the [OK] key.

The selected settings will be unavailable to users.


[Items] varies depending on the administrator.
For details about "Items", see "Limiting Available Functions".
The box next to a selected item is checked. To deselect the item, press [ ].
To specify administrator authentication for more than one category, repeat steps 5 to 7.
8. Press the [User Tools/Counter] key.

• p.241 "Supervisor Operations"


• p.32 "Logging on Using Administrator Authentication"
• p.33 "Logging off Using Administrator Authentication"
• p.147 "Limiting Available Functions"

Registering the Administrator

If administrator authentication has been specified, we recommend only one person take each administrator
role.
The sharing of administrator tasks eases the burden on individual administrators while also limiting
unauthorized operation by a single administrator. You can register up to four login user names
(Administrators 1-4) to which you can grant administrator privileges.
Administrator authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
If administrator authentication has already been specified, log on using a registered administrator name
and password.

27
2. Configuring Administrator Authentication

For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.

5. Select [Permissions] using [ ] or [ ], and then press the [OK] key.

6. Select the administrator, and then press the [OK] key.

28
Enabling Administrator Authentication

7. Select [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4] using


[ ] or [ ], and then press the [ ] key.

2
The box next to a selected item is checked. To deselect the item, press [ ].
8. Press the [OK] key.

9. Press [Exit].

10. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.

11. Select the setting you want to specify, and then press the [OK] key.

12. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.

29
2. Configuring Administrator Authentication

13. Enter the login user name, and then press the [OK] key.

2 14. Select [Login Password] using [ ] or [ ], and then press the [OK] key.

15. Enter the login password, and then press the [OK] key.

Follow the password policy to make the login password more secure.
For details about the password policy and how to specify it, see "Specifying the Extended Security
Functions".
16. If a password reentry screen appears, enter the login password, and then press the [OK]
key.

17. Select [Encryption Password] using [ ] or [ ], and then press the [OK] key.

30
Enabling Administrator Authentication

18. Enter the encryption password, and then press the [OK] key.

19. If a password reentry screen appears, enter the encryption password, and then press the 2
[OK] key.

20. Press [Exit] three times.

You will be automatically logged off.


21. Press the [User Tools/Counter] key.

• You can use up to 32 alphanumeric characters and symbols when registering login user names and
login passwords. Keep in mind that passwords are case-sensitive.
• User names cannot contain numbers only, a space, colon (:), or quotation mark ("), nor can they be
left blank.
• Do not use Japanese, Traditional Chinese, Simplified Chinese, or Hangul double-byte characters
when entering the login user name or password. If you use multi-byte characters when entering the
login user name or password, you cannot authenticate using Web Image Monitor.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.217 "Specifying the Extended Security Functions"

31
2. Configuring Administrator Authentication

Logging on Using Administrator Authentication

If administrator authentication has been specified, log on using an administrator's user name and password.
This section describes how to log on. When you log on with a user name that has multiple administrator
authorities, one of the authorities associated with that name is displayed.

1. Press the [User Tools/Counter] key.


2 2. Press [Login].

3. Enter the login user name, and then press the [OK] key.

When you log on to the machine for the first time as the administrator, enter "admin".
4. Enter the login password, and then press the [OK] key.

If assigning the administrator for the first time, press the [OK] key without entering login password.
"Authenticating... Please wait." appears, followed by the screen for specifying the default. To log on
as an administrator, enter the administrator's login user name and login password.

• If you try to log on from an operating screen, "Privileges are required. Administrator-login is limited
to setting changes only." appears. Press the [User Tools/Counter] key to change the default.
• If user authentication has already been specified, a screen for authentication appears.
• If you log on using administrator authority, the name of the administrator logging on appears.
• If you log on using a login user name with the authority of more than one administrator, "Administrator"
appears.

32
Enabling Administrator Authentication

Logging off Using Administrator Authentication

If administrator authentication has been specified, be sure to log off after completing settings. This section
explains how to log off after completing settings.

1. Press [Logout].

2. Press [Yes].

Changing the Administrator

Change the administrator's login user name and login password. You can also assign administrator
authority to the login user names [Administrator 1] to [Administrator 4]. To combine the authorities of multiple
administrators, assign multiple administrators to a single administrator.
For example, to assign machine administrator authority and user administrator authority to [Administrator
1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

33
2. Configuring Administrator Authentication

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

2 4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.

5. Select [Permissions] using [ ] or [ ], and then press the [OK] key.

6. Select the administrator, and then press the [OK] key.

7. Select [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4] using


[ ] or [ ], and then press the [ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].
8. Press the [OK] key.

34
Enabling Administrator Authentication

9. Press [Exit].

10. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key. 2

11. Select the administrator you want to change settings using [ ] or [ ], and then press the
[OK] key, and re-enter the setting.

12. Press [Exit] three times.


You are logged off automatically.
13. Press the [User Tools/Counter] key.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Using Web Image Monitor to Configure Administrator Authentication

Using Web Image Monitor, you can log on to the machine and change the administrator settings. This
section describes how to access Web Image Monitor.
For details about Web Image Monitor, see Web Image Monitor Help.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].

35
2. Configuring Administrator Authentication

4. Enter the login name and password of an administrator, and then click [Login].
5. Make settings as desired.

• When logging on as an administrator use the login name and password of an administrator set in the
machine. The default login name is "admin" and the password is blank.

36
3. Configuring User Authentication
This chapter explains what a user can do, how to specify user authentication, and how to log on to and
off from the machine as a used.

Users
A user performs normal operations on the machine, such as copying and printing. Users are managed
using the personal information in the machine's Address Book, and can use only the functions they are
permitted to access by administrators. By enabling user authentication, you can allow only people 3
registered in the Address Book to use the machine. Users can be managed in the Address Book by the user
administrator. For details about administrator, see "Administrators". For details about registering users in
the Address Book, see "Administrator Tools", Network and System Settings Guide, SmartDeviceMonitor
for Admin Help, or Web Image Monitor Help.

• If user authentication is not possible because of a problem with the hard disk or network, you can use
the machine by accessing it using administrator authentication and disabling user authentication. Do
this if, for instance, you need to use the machine urgently.

• p.21 "Administrators"

37
3. Configuring User Authentication

About User Authentication


This machine has an authentication function to prevent unauthorized access.
By using login user name and login password, you can specify access limits for individual users and groups
of users.

BBC004S

1. User
A user performs normal operations on the machine, such as copying and printing.
2. Group
A group performs normal operations on the machine, such as copying and printing.
3. Unauthorized User
4. Authentication
Using a login user name and password, user authentication is performed.
5. This Machine
6. Access Limit
Using authentication, unauthorized users are prevented from accessing the machine.
7. Authorized users and groups can use only those functions permitted by the administrator.

38
Configuring User Authentication

Configuring User Authentication


Specify administrator authentication and user authentication according to the following chart:

Administrator Authentication Specifying Administrator Privileges


See "Enabling Administrator Authentication". See "Specifying Administrator Privileges".
Registering the Administrator
See "Registering the Administrator".

User Authentication Specifying User Authentication


3
See "Enabling User Authentication". Authentication that requires only the machine:
• User Code Authentication
See "User Code Authentication".
• Basic Authentication
See "Basic Authentication".
Authentication that requires external devices:
• Windows Authentication
See "Windows Authentication".
• LDAP Authentication
See "LDAP Authentication".
• Integration Server Authentication
See "Integration Server Authentication".

• To specify Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server


Authentication, you must first enable user administrator privileges in Administrator Authentication
Management.
• You can specify User Code Authentication without specifying administrator authentication.

• p.25 "Enabling Administrator Authentication"


• p.41 "Enabling User Authentication"
• p.25 "Specifying Administrator Privileges"
• p.27 "Registering the Administrator"
• p.42 "User Code Authentication"
• p.48 "Basic Authentication"

39
3. Configuring User Authentication

• p.60 "Windows Authentication"


• p.70 "LDAP Authentication"
• p.78 "Integration Server Authentication"

40
Enabling User Authentication

Enabling User Authentication


To control users' access to the machine, perform user authentication using login user names and passwords.
There are five types of user authentication methods: User Code authentication, Basic authentication,
Windows authentication, LDAP authentication, and Integration Server authentication. To use user
authentication, select an authentication method on the control panel, and then make the required settings
for the authentication. The settings depend on the authentication method. Specify administrator
authentication, and then specify user authentication.

3
• User Code authentication is used for authenticating on the basis of a user code, and Basic
authentication, Windows authentication, LDAP authentication, and Integration Server authentication
are used for authenticating individual users.
• You can specify User Code authentication without specifying administrator authentication.
• A user code account, that has no more than eight digits and is used for User Code authentication,
can be carried over and used as a login user name even after the authentication method has switched
from User Code authentication to Basic authentication, Windows authentication, LDAP authentication,
or Integration Server authentication. In this case, since the User Code authentication does not have
a password, the login password is set as blank.
• When authentication switches to an external authentication method (Windows authentication, LDAP
authentication, or Integration Server authentication), authentication will not occur, unless the external
authentication device has the carried over user code account previously registered. However, the
user code account will remain in the Address Book of the machine despite an authentication failure.
From a security perspective, when switching from User Code authentication to another authentication
method, we recommend that you delete accounts you are not going to use, or set up a login password.
For details about deleting accounts, see "Deleting a Registered Name", Network and System Settings
Guide. For details about changing passwords, see "Specifying Login User Names and Passwords".
• You cannot use more than one authentication method at the same time.
• User authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.

• p.53 "Specifying Login User Names and Passwords"

41
3. Configuring User Authentication

User Code Authentication


This is an authentication method for limiting access to functions according to a user code. The same user
code can be used by more than one user. For details about specifying user codes, see "Authentication
Information", Network and System Settings Guide.
For details about specifying the user code for the printer driver, see Printer Reference or the printer driver
Help.
For details about specifying the TWAIN driver user code, see the TWAIN driver Help.
3
• To control the use of DeskTopBinder for the delivery of files stored in the machine, select Basic
Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authentication.

Specifying User Code Authentication

This can be specified by the machine administrator.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.

42
User Code Authentication

5. Select [User Code Auth.] using [ ] or [ ], and then press [Details].

If you do not want to use user authentication management, select [Off].


6. Select [Restrict Functions] using [ ] or [ ], and then press the [OK] key.

7. Select which of the machine's functions you want to limit using [ ] or [ ], and then press the
[ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].
The selected settings will be unavailable to users.
For details about limiting available functions for individuals or groups, see "Limiting Available
Functions".
8. Press the [OK] key.

9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.

10. Select the "Printer Job Authentication" level.


If you select [Entire] or [Simple(All)], proceed to "Selecting Entire or Simple (All)".

43
3. Configuring User Authentication

If you select [Simple(Limitation)], proceed to "Selecting Simple (Limitation)".


For a description of the printer job authentication levels, see "Printer Job Authentication".

• p.147 "Limiting Available Functions"


• p.44 "Selecting Entire or Simple (All)"
• p.45 "Selecting Simple (Limitation)"
• p.87 "Printer Job Authentication"

3
Selecting Entire or Simple (All)
If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print under an environment that does not support authentication, select [Simple(All)] or [Simple
(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.

2. Press [Exit].

3. Press the [OK] key.

4. Press the [User Tools/Counter] key.

44
User Code Authentication

Selecting Simple (Limitation)


If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required.
Specify [Parallel Interface(Sim.)], [USB(Sim.)] and the clients' IPv4 address range in which printer job
authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers
or without any printer driver. Authentication is required for printing with non-specified devices.
If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
3
1. Select [Simple(Limitation)] using [ ] or [ ], and then press [Range].

Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.


If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.

3. Enter the Start IPv4 Address, and then press the [OK] key.

You can specify the IPv4 address range to which this setting is applied.

45
3. Configuring User Authentication

4. Enter the End IPv4 Address, and then press the [OK] key.

Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.

6. Select [Apply] using [ ] or [ ], and then press the [OK] key.

7. Select [USB(Sim.)] using [ ] or [ ], and then press the [OK] key.

8. Select [Apply] using [ ] or [ ], and then press the [OK] key.

9. Press [Exit].

46
User Code Authentication

10. Press the [OK] key.

11. Press the [User Tools/Counter] key.

47
3. Configuring User Authentication

Basic Authentication
Specify this authentication method when using the machine's Address Book to authenticate each user. Using
Basic authentication, you can not only manage the machine's available functions but also limit access to
the personal data in the Address Book. Under Basic authentication, the administrator must specify the
functions available to each user registered in the Address Book.

Specifying Basic Authentication


3
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.

48
Basic Authentication

5. Select [Basic Auth.] using [ ] or [ ], and then press [Details].

If you do not want to use user authentication management, select [Off].


6. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.

7. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].
The functions you select here become the default Basic Authentication settings that will be assigned
to all new users of the Address Book.
For details about specifying available functions for individuals or groups, see "Limiting Available
Functions".
8. Press the [OK] key.

9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.

10. Select the "Printer Job Authentication" level.


If you select [Entire] or [Simple(All)], proceed to "Selecting Entire or Simple (All)".

49
3. Configuring User Authentication

If you select [Simple(Limitation)], proceed to "Selecting Simple (Limitation)".


For a description of the printer job authentication levels, see "Printer Job Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.147 "Limiting Available Functions"
• p.50 "Selecting Entire or Simple (All)"

3 • p.51 "Selecting Simple (Limitation)"


• p.87 "Printer Job Authentication"

Selecting Entire or Simple (All)


If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print under an environment that does not support authentication, select [Simple(All)] or [Simple
(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.

2. Press [Exit].

3. Press the [OK] key.

4. Press the [User Tools/Counter] key.

50
Basic Authentication

Selecting Simple (Limitation)


If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required.
Specify [Parallel Interface(Sim.)], [USB(Sim.)] and the clients' IPv4 address range in which printer job
authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers
or without any printer driver. Authentication is required for printing with non-specified devices.
If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
3
1. Select [Simple(Limitation)] using [ ] or [ ], and then press [Range].

Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.


If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.

3. Enter the Start IPv4 Address, and then press the [OK] key.

You can specify the IPv4 address range to which this setting is applied.

51
3. Configuring User Authentication

4. Enter the End IPv4 Address, and then press the [OK] key.

Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.

6. Select [Apply] using [ ] or [ ], and then press the [OK] key.

7. Select [USB(Sim.)] using [ ] or [ ], and then press the [OK] key.

8. Select [Apply] using [ ] or [ ], and then press the [OK] key.

9. Press [Exit].

52
Basic Authentication

10. Press the [OK] key.

11. Press the [User Tools/Counter] key.

Authentication Information Stored in the Address Book 3


This can be specified by the user administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
If you have specified User Authentication, you can specify access limits for individual users and groups of
users. Specify the setting in the Address Book for each user.
Users must have a registered account in the Address Book in order to use the machine when User
Authentication is specified. For details about user registration, see "Registering Names", Network and
System Settings Guide.
User authentication can also be specified via SmartDeviceMonitor for Admin or Web Image Monitor.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Specifying Login User Names and Passwords

In [Address Book Management], specify the login user name and login password to be used for User
Authentication Management.
Login user names can contain up to 32 characters; passwords can contain up to 128 characters. Both user
names and passwords can contain alphanumeric characters and symbols. User names cannot contain
spaces, colons, or quotation marks, and cannot be blank.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

53
3. Configuring User Authentication

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.

8. Press [Details].

54
Basic Authentication

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [Login Authent.Info] using [ ] or [ ], and then press the [OK] key.

11. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.

12. Enter the login name, and then press the [OK] key.

13. Select [Login Password] using [ ] or [ ], and then press the [OK] key.

14. Enter the login password, and then press the [OK] key.

55
3. Configuring User Authentication

15. Re-enter the login password, and then press the [OK] key.

16. Press the [Escape] key two times.


17. Press [End].

18. Press the [OK] key.

19. Press the [User Tools/Counter] key.

Specifying Login Details

The login user name and password specified in [Address Book Management] can be used as the login
information for "SMTP Authentication", "Folder Authentication" and "LDAP Authentication".
If you do not want to use the login user name and password specified in [Address Book Management] for
"SMTP Authentication", "Folder Authentication", or "LDAP Authentication", see "Address Book", Network
and System Settings Guide.
For details about specifying login user name and login password, see "Specifying Login User Names and
Passwords".

• When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Authentication" or "LDAP
Authentication", a user name other than "other", "admin", "supervisor" or "HIDE***" must be
specified. The symbol "***" represents any character.
• To use "Use Auth. Info at Login" for "SMTP Authentication", a login password up to 128 characters
in length must be specified.

1. Press the [User Tools/Counter] key.

56
Basic Authentication

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.

57
3. Configuring User Authentication

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [LDAP Authentication] using [ ] or [ ], and then press the [OK] key.

11. Select [Use Auth. Info at Login] using [ ] or [ ], and then press the [OK] key.

For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication".
For SMTP authentication, select [Use Auth. Info at Login] in "SMTP Authentication".
12. Press the [Escape] key.

13. Press [End].

58
Basic Authentication

14. Press the [OK] key.

15. Press the [User Tools/Counter] key.

• p.53 "Specifying Login User Names and Passwords" 3

59
3. Configuring User Authentication

Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their
accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the
directory server. Under Windows authentication, you can specify the access limit for each group registered
in the directory server. The Address Book stored in the directory server can be registered to the machine,
enabling user authentication without first using the machine to register individual settings in the Address
Book. If you can obtain user information, the sender's address (From:) is fixed to prevent unauthorized
access when sending e-mails under the scanner function and forwarding received e-mails.
3 Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational Requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine only supports NTLMv1 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information when
running Active Directory, use LDAP. If SSL is being used, a version of Windows that supports TLS
v1, SSL v2, or SSL v3 is required.
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008
Operational Requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must be able to support KDC (Key Distribution Center). To obtain user
information when running Active Directory, use LDAP. If SSL is being used, a version of Windows
that supports TLSv1, SSLv2, or SSLv3 is required. Compatible operating systems are listed below.
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008

• During Windows Authentication, data registered in the directory server, such as the user's e-mail
address, is automatically registered in the machine. If user information on the server is changed,
information registered in the machine may be overwritten when authentication is performed.
• Users managed in other domains are subject to user authentication, but they cannot obtain items such
as e-mail addresses.

60
Windows Authentication

• If you have created a new user in the domain controller and selected "User must change password
at next logon", log on to the machine from the computer to change the password before logging on
from the machine's control panel.
• If the authenticating server only supports NTLM when Kerberos authentication is selected on the
machine, the authenticating method will automatically switch to NTLM.
• If Kerberos authentication and SSL encryption are set at the same time, e-mail addresses cannot be
obtained.

• Enter the login password correctly; keeping in mind that it is case-sensitive. 3


• The first time you access the machine, you can use the functions available to your group. If you are
not registered in a group, you can use the functions available under "*Default Group". To limit which
functions are available to which users, first make settings in advance in the Address Book.
• When accessing the machine subsequently, you can use all the functions available to your group and
to you as an individual user.
• Users who are registered in multiple groups can use all the functions available to those groups.
• Under Windows Authentication, you can select whether or not to use secure sockets layer (SSL)
authentication.
• If the "Guest" account on the Windows server is enabled, even users not registered in the domain
controller can be authenticated. When this account is enabled, users are registered in the Address
Book and can use the functions available under "*Default Group".

Specifying Windows Authentication

Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

61
3. Configuring User Authentication

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Windows Auth.] using [ ] or [ ], and then press [Details].

If you do not want to use user authentication management, select [Off].


6. Select [Kerberos Authentication] using [ ] or [ ], and then press the [OK] key.

If you want to use NTLM authentication, proceed to step 10.


7. Select [On] using [ ] or [ ], and then press the [OK] key.

8. Select [Realm Name] using [ ] or [ ], and then press the [OK] key.

62
Windows Authentication

9. Select the realm using [ ] or [ ], and then press the [OK] key.

10. Select [Domain Name] using [ ] or [ ], and then press the [OK] key.

To display [Domain Name], set [Kerberos Authentication] to [Off].


11. Enter the name of the domain controller to be authenticated, and then press the [OK] key.

12. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.

13. Select the "Printer Job Authentication" level.


If you select [Entire] or [Simple(All)], proceed to "Selecting Entire or Simple (All)".
If you select [Simple(Limitation)], proceed to "Selecting Simple (Limitation)".
For a description of the printer job authentication levels, see "Printer Job Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.64 "Selecting Entire or Simple (All)"
• p.64 "Selecting Simple (Limitation)"
• p.87 "Printer Job Authentication"

63
3. Configuring User Authentication

Selecting Entire or Simple (All)


If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print in an environment that does not support authentication, select [Simple(All)] or [Simple(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.
3

2. Press [Exit].

3. Press the [OK] key.

4. Press the [User Tools/Counter] key.

• To automatically register user information such as fax numbers and e-mail addresses under Windows
authentication, it is recommended that communication between the machine and domain controller
be encrypted using SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers and e-mail addresses using SSL.

Selecting Simple (Limitation)


If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required.
Specify [Parallel Interface(Sim.)], [USB(Sim.)] and the clients' IPv4 address range in which printer job
authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers
or without any printer driver. Authentication is required for printing with non-specified devices.

64
Windows Authentication

If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Simple(Limitation)] using [ ] or [ ], and then press [Range].

3
Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.

3. Enter the Start IPv4 Address, and then press the [OK] key.

You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.

Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.

65
3. Configuring User Authentication

5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.

6. Select [Apply] using [ ] or [ ], and then press the [OK] key.

7. Select [USB(Sim.)] using [ ] or [ ], and then press the [OK] key.

8. Select [Apply] using [ ] or [ ], and then press the [OK] key.

9. Press [Exit].

10. Press the [OK] key.

11. Press the [User Tools/Counter] key.

66
Windows Authentication

• To automatically register user information such as fax numbers and e-mail addresses under Windows
authentication, it is recommended that communication between the machine and domain controller
be encrypted using SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers and e-mail addresses using SSL.

Installing Internet Information Services (IIS) and Certificate Services


3
Specify this setting if you want the machine to automatically obtain e-mail addresses registered in Active
Directory.
We recommend you install Internet Information Services (IIS) and Certificate services as the Windows
components.
Install the components, and then create the server certificate.
If they are not installed, install them as follows:

1. Select [Add/Remove Programs] on the Control Panel.


2. Select [Add/Remove Windows Components].
3. Select the "Internet Information Services (IIS)" check box.
4. Select the "Certificate Services" check box, and then click [Next].
5. Installation of the selected Windows components starts, and a warning message appears.
6. Click [Yes].
7. Click [Next].
8. Select the "Certificate Authority", and then click [Next].
On the displayed screen, "Enterprise root CA" is selected.
9. Enter the Certificate Authority name (optional) in "CA Identifying Information", and then
click [Next].
10. Leave "Data Storage Location" at its default, and then click [Next].
Internet Information Services and Certificate services are installed.

Creating the Server Certificate

After installing Internet Information Services (IIS) and Certificate services Windows components, create the
Server Certificate as follows:

1. Start Internet Services Manager.


2. Right-click [Default Web Site], and then click [Properties].

67
3. Configuring User Authentication

3. On the "Directory Security" tab, click [Server Certificate].


Web Server Certificate Wizard starts.
4. Click [Next].
5. Select [Create a new certificate], and then click [Next].
6. Select [Prepare the request now, but send it later], and then click [Next].
7. Enter the required information according to the instructions given by Web Server Certificate
Wizard.
8. Check the specified data, which appears as "Request File Summary", and then click [Next].
3 The server certificate is created.

If the fax number cannot be obtained

If the fax number cannot be obtained during authentication, specify the setting as follows:

1. Start C:\WINNT\SYSTEM32\adminpak.
Setup Wizard starts.
2. Select [Install all of the Administrator Tools], and then click [Next].
3. On the "Start" menu, select [Run].
4. Enter "mmc", and then click [OK].
5. On the "Console", select [Add/Remove Snap-in].
6. Click [Add].
7. Select [Active Directory Schema], and then click [Add].
8. Select [Facsimile Telephone Number].
9. Right-click, and then click [Properties].
10. Select "Replicate this attribute", and then click [Apply].

Installing the Device Certificate (Issued by a Certificate Authority)

Install the device certificate using Web Image Monitor.


This section explains the use of a certificate issued by a certificate authority as the device certificate.
Enter the device certificate contents issued by the certificate authority.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.

68
Windows Authentication

The top page of Web Image Monitor appears.


3. Click [Login].
The network administrator can log on.
Enter the login user name and password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
The Device Certificate page appears.
5. Check the radio button next to the number of the certificate you want to install.
6. Click [Install].
3
7. Enter the contents of the device certificate.
8. In the "Certificate Request" box, enter the contents of the device certificate received from
the certificate authority.
9. Click [OK].
"Installed" appears under "Certificate Status" to show that a device certificate for the machine has
been installed.
10. Click [Logout].

69
3. Configuring User Authentication

LDAP Authentication
Specify this authentication method when using the LDAP server to authenticate users who have their accounts
on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server.
The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication
without first using the machine to register individual settings in the Address Book. When using LDAP
authentication, to prevent the password information being sent over the network unencrypted, it is
recommended that communication between the machine and LDAP server be encrypted using SSL. You
can specify on the LDAP server whether or not to enable SSL. To do this, you must create a server certificate
3 for the LDAP server.
Using Web Image Monitor, you can specify whether or not to check the reliability of the connecting SSL
server. For details about specifying LDAP authentication using Web Image Monitor, see Web Image
Monitor Help.

• During LDAP authentication, the data registered in the LDAP server is automatically registered in the
machine. If user information on the server is changed, information registered in the machine may be
overwritten when authentication is performed.
• Under LDAP authentication, you cannot specify access limits for groups registered in the LDAP server.
• Enter the user's login user name using up to 32 characters and login password using up to 128
characters.
• Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or Hangul characters
when entering the login user name or password. If you use double-byte characters, you cannot
authenticate using Web Image Monitor.
Operational Requirements for LDAP Authentication
To specify LDAP authentication, the following requirements must be met:
• The network configuration must allow the machine to detect the presence of the LDAP server.
• When SSL is being used, TLSv1, SSLv2, or SSLv3 can function on the LDAP server.
• The LDAP server must be registered in the machine.
• When registering the LDAP server, the following setting must be specified.
• Server Name
• Search Base
• Port Number
• SSL Communication
• Authentication
Select either Kerberos, DIGEST, or Cleartext authentication.
• User Name

70
LDAP Authentication

You do not have to enter the user name if the LDAP server supports "Anonymous
Authentication".
• Password
You do not have to enter the password if the LDAP server supports "Anonymous
Authentication".

• When you select Cleartext authentication, LDAP Simplified authentication is enabled. Simplified
authentication can be performed with a user attribute (such as cn, or uid), instead of the DN.
• You can also prohibit blank passwords at login for simplified authentication. For details about LDAP 3
Simplified authentication, contact your sales representative.
• Under LDAP Authentication, if "Anonymous Authentication" in the LDAP server's settings is not set to
Prohibit, users who do not have an LDAP server account might still be able to gain access.
• If the LDAP server is configured using Windows Active Directory, "Anonymous Authentication" might
be available. If Windows authentication is available, we recommend you use it.
• The first time an unregistered user accesses the machine after LDAP authentication has been specified,
the user is registered in the machine and can use the functions available under "Available Functions"
during LDAP Authentication. To limit the available functions for each user, register each user and
corresponding "Available Functions" setting in the Address Book, or specify "Available Functions" for
each registered user. The "Available Functions" setting becomes effective when the user accesses the
machine subsequently.
• To enable Kerberos for LDAP authentication, a realm must be registered beforehand. The realm must
be programmed in capital letters. For details about registering a realm, see the "Programming the
LDAP Server", or "Programming the Realm", Network and System Settings Guide.
• The reference function is not available for SSL servers when a search for LDAP is in progress.

Specifying LDAP Authentication

Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.

71
3. Configuring User Authentication

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.

5. Select [LDAP Auth.] using [ ] or [ ], and then press [Details].

If you do not want to use user authentication management, select [Off].


6. Select [Select LDAP Server] using [ ] or [ ], and then press the [OK] key.

7. Select the LDAP server to be used for LDAP authentication using [ ] or [ ], and then press
the [ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].

72
LDAP Authentication

8. Press the [OK] key.

9. Select [Login Name Attribute] using [ ] or [ ], and then press the [OK] key.

10. Enter the login name attribute, and then press the [OK] key.

You can use the Login Name Attribute as a search criterion to obtain information about an
authenticated user. You can create a search filter based on the Login Name Attribute, select a user,
and then retrieve the user information from the LDAP server so it is transferred to the machine's address
book. The method for selecting the user name depends on the server environment. Check the server
environment and enter the user name accordingly.
11. Select [Unique Attribute] using [ ] or [ ], and then press the [OK] key.

12. Enter the unique attribute, and then press the [OK] key.

Specify Unique Attribute on the machine to match the user information in the LDAP server with that in
the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that
of a user registered in the machine, the two instances are treated as referring to the same user. You
can enter an attribute such as "serialNumber" or "uid". Additionally, you can enter "cn" or

73
3. Configuring User Authentication

"employeeNumber", provided it is unique. If you do not specify the Unique Attribute, an account with
the same user information but with a different login user name will be created in the machine.
13. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.

14. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
3 the [ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].
LDAP Authentication will be applied to the selected functions. Users can use the selected functions
only.
15. Press the [OK] key.

16. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.

17. Select the "Printer Job Authentication" level.


If you select [Entire] or [Simple(All)], proceed to "Selecting Entire or Simple (All)".
If you select [Simple(Limitation)], proceed to "Selecting Simple (Limitation)".
For a description of the printer job authentication levels, see "Printer Job Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.75 "Selecting Entire or Simple (All)"

74
LDAP Authentication

• p.75 "Selecting Simple (Limitation)"


• p.87 "Printer Job Authentication"

Selecting Entire or Simple (All)


If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print under an environment that does not support authentication, select [Simple(All)] or [Simple
(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you 3
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.

2. Press [Exit].

3. Press the [OK] key.

4. Press the [User Tools/Counter] key.

Selecting Simple (Limitation)


If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required.
Specify [Parallel Interface(Sim.)], [USB(Sim.)] and the clients' IPv4 address range in which printer job
authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers
or without any printer driver. Authentication is required for printing with non-specified devices.

75
3. Configuring User Authentication

If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Simple(Limitation)] using [ ] or [ ], and then press [Range].

3
Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.

3. Enter the Start IPv4 Address, and then press the [OK] key.

You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.

Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.

76
LDAP Authentication

5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.

6. Select [Apply] using [ ] or [ ], and then press the [OK] key.

7. Select [USB(Sim.)] using [ ] or [ ], and then press the [OK] key.

8. Select [Apply] using [ ] or [ ], and then press the [OK] key.

9. Press [Exit].

10. Press the [OK] key.

11. Press the [User Tools/Counter] key.

77
3. Configuring User Authentication

Integration Server Authentication


To use Integration Server authentication, you need a server on which ScanRouter software that supports
authentication is installed.
For external authentication, the Integration Server authentication collectively authenticates users accessing
the server over the network, providing a server-independent, centralized user authentication system that is
safe and convenient.
For example, if the delivery server and the machine share the same Integration Server authentication, single
3 sign-on is possible using DeskTopBinder.
To use Integration Server authentication, access to a server on which ScanRouter System or Web
SmartDeviceMonitor and Authentication Manager are installed, other than the machine, is required. For
details about the software, contact your sales representative.
Using Web Image Monitor, you can specify that the server reliability and site certificate are checked every
time you access the SSL server. For details about specifying SSL using Web Image Monitor, see Web Image
Monitor Help.

• During Integration Server Authentication, the data registered in the server is automatically registered
in the machine.
• If user information on the server is changed, information registered in the machine may be overwritten
when authentication is performed.

• The default administrator name for ScanRouter System or Web SmartDeviceMonitor, "Admin," differs
from the server, "admin".

Specifying Integration Server Authentication

Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Admin. Auth. Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.

78
Integration Server Authentication

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Integration Svr. Auth.] using [ ] or [ ], and then press [Details].

If you do not want to use User Authentication Management, select [Off].


6. Select [Server Name] using [ ] or [ ], and then press the [OK] key.

Specify the name of the server for external authentication.


7. Enter the server name, and then press the [OK] key.

Enter the IPv4 address or host name.

79
3. Configuring User Authentication

8. Select [Authentication Type] using [ ] or [ ], and then press the [OK] key.

9. Select the authentication system for external authentication using [ ] or [ ], and then press
the [OK] key.

Select an available authentication system.


10. Select [Domain Name] using [ ] or [ ], and then press the [OK] key.

11. Enter the domain name, and then press the [OK] key.

You cannot specify a domain name under an authentication system that does not support domain
login.
12. Select [Obtain URL] using [ ] or [ ], and then press the [OK] key.

The machine obtains the URL of the server specified in "Server Name".
If "Server Name" or the setting for enabling SSL is changed after obtaining the URL, the "URL" will be
not obtained.
If you set "Authentication Type" to "Windows", you can use the global group.
If you set "Authentication Type" to "Notes", you can use the Notes group.

80
Integration Server Authentication

If you set "Authentication Type" to "Basic (Integration Server)", you can use the groups created using
the Authentication Manager.
13. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.

14. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.
3

15. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.

16. Enter the group name, and then press the [OK] key.

17. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.

The box next to a selected item is checked. To deselect the item, press [ ].
Authentication will be applied to the selected functions.
Users can use the selected functions only.
For details about specifying available functions for individuals or groups, see "Limiting Available
Functions".

81
3. Configuring User Authentication

18. Press the [OK] key, and then press the [Escape] key twice.

19. Select [SSL] using [ ] or [ ], and then press the [OK] key.

20. Select [On] using [ ] or [ ], and then press the [OK] key.

To not use secure sockets layer (SSL) for authentication, press [Off].
21. Press [Exit].

22. Select [Integration Svr. Auth.] using [ ] or [ ], and then press [Details].

23. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.

24. Select the "Printer Job Authentication" level.


If you select [Entire] or [Simple(All)], proceed to "Selecting Entire or Simple (All)".

82
Integration Server Authentication

If you select [Simple(Limitation)], proceed to "Selecting Simple (Limitation)".


For a description of the printer job authentication levels, see "Printer Job Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.147 "Limiting Available Functions"
• p.83 "Selecting Entire or Simple (All)"
• p.84 "Selecting Simple (Limitation)" 3
• p.87 "Printer Job Authentication"

Selecting Entire or Simple (All)


If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print in an environment that does not support authentication, select [Simple(All)] or [Simple(Limitation)].
If you select [Simple(All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.

1. Select [Entire] or [Simple(All)] using [ ] or [ ], and then press the [OK] key.

2. Press [Exit].

3. Press the [OK] key.

4. Press the [User Tools/Counter] key.

83
3. Configuring User Authentication

Selecting Simple (Limitation)


If you select [Simple(Limitation)], you can specify clients for which printer job authentication is not required.
Specify [Parallel Interface(Sim.)], [USB(Sim.)] and the clients' IPv4 address range in which printer job
authentication is not required. Specify this setting if you want to print using unauthenticated printer drivers
or without any printer driver. Authentication is required for printing with non-specified devices.
If you select [Simple(Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require

3 authentication in this case, it may be used by unauthorized users.

1. Select [Simple(Limitation)] using [ ] or [ ], and then press [Range].

Specify the range in which [Simple(Limitation)] is applied to Printer Job Authentication.


If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface(Sim.)], proceed to step 5.
If you specify [USB(Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.

3. Enter the Start IPv4 Address, and then press the [OK] key.

You can specify the IPv4 address range to which this setting is applied.

84
Integration Server Authentication

4. Enter the End IPv4 Address, and then press the [OK] key.

Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface(Sim.)] using [ ] or [ ], and then press the [OK] key.

6. Select [Apply] using [ ] or [ ], and then press the [OK] key.

7. Select [USB(Sim.)] using [ ] or [ ], and then press the [OK] key.

8. Select [Apply] using [ ] or [ ], and then press the [OK] key.

9. Press [Exit].

85
3. Configuring User Authentication

10. Press the [OK] key.

11. Press the [User Tools/Counter] key.

86
Printer Job Authentication

Printer Job Authentication


This section explains Printer Job Authentication.
Printer Job Authentication Levels and Printer Job Types
This section explains the relationship between printer job authentication levels and printer job types.
Depending on the combination of printer job authentication level and printer job type, the machine
may not print properly. Set an appropriate combination according to the operating environment.
User authentication is supported by the PCL printer driver.
When User Authentication is set to Off, printing is possible for all job types.
3
A: Printing is possible regardless of user authentication.
B: Printing is possible if user authentication is successful. If user authentication fails, the print job is
reset.
C: Printing is possible if user authentication is successful and [Driver Encryption Key] for the printer
driver and machine match.
X: Printing is not possible regardless of user authentication, and the print job is reset.

[User Auth. Management] Specified Specified Specified Specified

[Simple [Simple
[Printer Job Authentication] [Entire] [Entire]
(All)] (All)]

[Simple Encryption] [Off] [On] [Off] [On]

Printer Job Type 1 C C C C

Printer Job Type 2 B X B X

Printer Job Type 3 X X X X

Printer Job Type 4 A A B B

Printer Job Type 5 A A X X

Printer Job Type 6 A A X X

Printer Job Type 7 B B B B

Printer Job Authentication


• [Entire]
The machine authenticates all printer jobs and remote settings, and cancels jobs and settings
that fail authentication.
Printer Jobs: Job Reset

87
3. Configuring User Authentication

Settings: Disabled
• [Simple(All)]
The machine authenticates printer jobs and remote settings that have authentication information,
and cancels the jobs and settings that fail authentication.
Printer jobs and settings without authentication information are performed without being
authenticated.
• [Simple(Limitation)]
You can specify the range to apply [Simple(Limitation)] to by specifying [Parallel Interface(Sim.)],
3 [USB(Sim.)], and the client's IPv4 address.
Printer Job Types
1. In the PCL printer driver dialog box, the "User Authentication" and "Encrypt" check boxes are
selected. Personal authentication information is added to the printer job. The printer driver applies
advanced encryption to the login passwords. The printer driver encryption key enables driver
encryption and prevents the login password from being stolen.
For details about prohibiting the use of simple encryption using "Simple Encryption", see
"Specifying the Extended Security Functions".
2. In the PCL printer driver dialog box, the "User Authentication" and "Encrypt" check boxes are
selected. Personal authentication information is added to the printer job. The printer driver applies
simple encryption to login passwords.
For details about turning off "Simple Encryption" and allowing the use of simple encryption, see
"Specifying the Extended Security Functions".
3. In the PCL printer driver dialog box, the "User Authentication" check box is not selected. Personal
authentication information is added to the printer job and is disabled.
4. When using the PostScript 3 printer driver, the printer job contains user code information.
Personal authentication information is not added to the printer job but the user code information
is. This also applies to recovery/parallel printing using a PCL printer driver that does not support
authentication.
5. When using the PostScript 3 printer driver, the printer job does not contain user code information.
Neither personal authentication information nor user code information is added to the printer
job. This also applies to recovery/parallel printing using a PCL printer driver that does not support
authentication.
6. A printer job or PDF file is sent from a host computer without a printer driver and is printed via
LPR. Personal authentication information is not added to the printer job. The above is also true
for Mail to Print. For details about Mail to Print, see "Reception", Facsimile Reference.
7. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password
used for logging on via ftp. However, the user ID and password are not encrypted.

88
Printer Job Authentication

• p.217 "Specifying the Extended Security Functions"

89
3. Configuring User Authentication

If User Authentication is Specified


When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication) is set, the authentication screen is displayed. Unless
a valid user name and password are entered, operations are not possible with the machine. Log on to
operate the machine, and log off when you are finished operations. Be sure to log off to prevent
unauthorized users from using the machine. When auto logout timer is specified, the machine automatically
logs you off if you do not use the control panel within a given time. Additionally, you can authenticate using
an external device. For details about using an external device for user authentication, see "Authentication
3 Using an External Device".

• Consult the User Administrator about your login user name, password, and user code.
• For user code authentication, enter a number registered in the Address Book as [User Code].
• The Auto Logout Timer can only be used under Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication.

• p.97 "Authentication Using an External Device"

If User Code Authentication is Specified

When User Code Authentication is set, the following screen appears.

Enter your user code.

Logging on Using the Control Panel


Use the following procedure to log in when User Code Authentication is enabled.

1. Enter a user code (up to 8 digits), and then press the [OK] key.

90
If User Authentication is Specified

When the authentication is successful, a screen showing the corresponding function is displayed.

• To log off, do one of the following:


• Press the Operation switch.
• Press the [Clear/Stop] key and the [Reset] key at the same time.

Logging on Using the Printer Driver


When User Code Authentication is set, specify a user code in printer properties on the printer driver. For 3
details, see the printer driver Help.

If Basic, Windows, LDAP or Integration Server Authentication is Specified

When Basic Authentication, Windows Authentication, LDAP Authentication or Integration Server


Authentication is set, the following screen appears.

Enter your login user name and password.

Logging on Using the Control Panel


Use the following procedure to log on when Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication is enabled.

1. Press [Login].

2. Enter a login user name, and then press the [OK] key.

91
3. Configuring User Authentication

3. Enter a login password, and then press the [OK] key.

When the user is authenticated, the screen for the function you are using appears.

3 Logging off Using the Control Panel


Follow the procedure below to log off when Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication is set.

1. Press the [User Tools/Counter] key.


2. Press [Logout].

3. Press [Yes].

Logging on Using the Printer Driver


When Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server
Authentication is set, make encryption settings in printer properties on the printer driver, and then specify
a login user name and password. For details, see the printer driver Help.

• When logged on using a printer driver, logging off is not required.

Logging on Using Web Image Monitor


This section explains how to log on to the machine via Web Image Monitor.

1. Click [Login] on the top page of the Web Image Monitor.

92
If User Authentication is Specified

2. Enter a login user name and password, and then click [Login].

• For user code authentication, enter a user code in "User Name", and then click [Login].

Logging off Using Web Image Monitor

1. Click [Logout] to log off.

• Delete the cache memory in the Web Image Monitor after logging off.
3

User Lockout Function

If an incorrect password is entered several times, the User Lockout function prevents further login attempts
under the same user name. Even if the locked out user enters the correct password later, authentication will
fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor
disables the lockout.
To use the lockout function for user authentication, the authentication method must be set to Basic
authentication. Under other authentication methods, the lockout function protects supervisor and
administrator accounts only, not general user accounts.
Lockout setting items
The lockout function settings can be made using Web Image Monitor.

Setting Item Description Setting Values Default Setting

Specify whether or not • Active


Lockout to enable the lockout • Inactive
function. • Inactive

Specify the number of


authentication
Number of Attempts
attempts to allow 1-10 5
Before Lockout
before applying
lockout.

Specify whether or not


to cancel lockout after • Active
Lockout Release Timer • Inactive
a specified period • Inactive
elapses.

93
3. Configuring User Authentication

Setting Item Description Setting Values Default Setting

Specify the number of


Lock Out User for minutes after which 1-9999 min. 60 min.
lockout is canceled.

Lockout release privileges


Administrators with unlocking privileges are as follows.

3 Locked out User Unlocking administrator

general user user administrator

user administrator, network administrator,


supervisor
file administrator, machine administrator

supervisor machine administrator

Specifying the User Lockout Function


This can be specified by the machine administrator using Web Image Monitor.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [User Lockout Policy] under "Security".
The User Lockout Policy page appears.
5. Set "Lockout" to [Active].
6. In the drop down menu, select the number of login attempts to permit before applying
lockout.
7. Set the "Lockout Release Timer" to [Active].
8. In the "Lock Out User for" field, enter the number of minutes until lockout is disabled.
9. Click [OK].
User Lockout Policy is set.

94
If User Authentication is Specified

10. Click [OK].


11. Click [Logout].

Unlocking a Locked User Account


A locked user account can be unlocked by the administrator or supervisor with unlocking privileges using
Web Image Monitor.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar. 3
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The administrator or supervisor with unlocking privileges can log on.
Enter the login user name and login password.
4. Click [Address Book].
The Address Book page appears.
5. Select the locked out user's account.
6. Click [Change].
7. Select the "Lockout" to [Inactive] under "Authentication Information".
8. Click [OK].
9. Click [Logout].

Auto Logout

This can be specified by the machine administrator.


When using Basic Authentication, Windows Authentication, LDAP Authentication or Integration Server
Authentication, the machine automatically logs you off if you do not use the control panel within a given
time. This feature is called "Auto Logout". Specify how long the machine is to wait before performing Auto
Logout.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.

95
3. Configuring User Authentication

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Timer Settings] using [ ] or [ ], and then press the [OK] key.

4. Select [Auto Logout Timer] using [ ] or [ ], and then press the [OK] key.

5. Select [On] using [ ] or [ ], and then press the [OK] key.

6. Enter "60" to "999" (seconds) using the number keys, and then press the [OK] key.

If you do not want to specify [Auto Logout Timer], select [Off].


7. Press the [User Tools/Counter] key.

• If a paper jam occurs or a print cartridge runs out of ink, the machine might not be able to perform
the Auto Logout function.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

96
Authentication Using an External Device

Authentication Using an External Device


To authenticate using an external device, see the device manual.
For details, contact your sales representative.

97
3. Configuring User Authentication

98
4. Protecting Data from Information
Leaks
This chapter describes how to protect document data.

Printing a Confidential Document


Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints
lying in the machine's output trays. When printing confidential documents, use the Locked Print function.
Locked Print
• Using the printer's Locked Print function, store files in the machine as Locked Print files and then 4
print them from the control panel and retrieve them immediately, preventing others from viewing
them.
• Confidential documents can be printed regardless of the User Authentication settings.

• To store files temporarily, select [Stored Print] in the printer driver. If you select [Stored Print (Shared)],
you can also share these files.

Specifying Locked Print File

Using the printer driver, specify a Locked Print file.


If user authentication has been enabled, you must enter the login user name and login password using the
printer driver. For details about logging on, see the printer driver Help.
Locked Print is allowed even if user authentication is not yet configured. For configuring this setting, see
"Locked Print", Printer Reference.
Word Pad is used in this procedure.

1. Open the printer driver dialog box.


2. Set "Job Type" to [Locked Print] under the "One Click Presets" tab.
3. Click [Details...].
4. Enter the user ID and password.
Enter the user ID using up to 8 alphanumeric characters.
Enter the password using 4 to 8 numbers.
Enter the classification code using up to 32 alphanumeric characters.
Classification codes allow you to collate log files that show the number of pages printed under each
code.

99
4. Protecting Data from Information Leaks

The password entered here lets you use the Locked Print function.
To print a Locked Print file, enter the same password on the control panel.
The password is encrypted during data transmission.
5. Click [OK].
A confirmation message appears.
6. Print the locked document.

Printing a Locked Print File

To print a Locked Print file, you must be at the machine and print the file using the control panel.
4 To print Locked Print files, the password is required. If you do not enter the correct password, you cannot
print the files. The file administrator can change the user password if it is forgotten.
For details about logging on and logging off with user authentication, see "If User Authentication is
Specified".
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.

1. Press the [Printer] key.


2. Press [Prt.Jobs].

3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].

Only Locked Print files belonging to the user who has logged on appear.
4. Select the Locked Print file using [ ] or [ ], and then press [Print].

100
Printing a Confidential Document

5. Enter the password for the stored file, and then press the [OK] key.

Enter the password specified in step 4 of "Specifying a Locked Print File".


6. Press [Print].

• p.90 "If User Authentication is Specified"

Deleting Locked Print Files

This can be specified by the file creator (owner).


To delete Locked Print files, you must enter the password for the files. If the password has been forgotten,
ask the file administrator to change the password.
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.

1. Press the [Printer] key.


2. Press [Prt.Jobs].

3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].

101
4. Protecting Data from Information Leaks

4. Select the Locked Print file using [ ] or [ ], and then press [Delete].

5. Enter the password for the stored file, and then press the [OK] key.

4 6. Press [Delete].

• Locked Print files can also be deleted by the file administrator.

Changing the Password of a Locked Print File

This can be specified by the file creator (owner) or file administrator.


If the password has been forgotten, the file administrator changes the password to restore access.
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.

1. Press the [Printer] key.


2. Press [Prt.Jobs].

102
Printing a Confidential Document

3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].

4. Select the Locked Print file using [ ] or [ ], and then press [Change].

5. Enter the password for the stored file, and then press the [OK] key.
4

The file administrator does not need to enter the password.


6. Press the [OK] key.

7. Enter the new password for the stored file, and then press the [OK] key.

8. If a password reentry screen appears, enter the login password, and then press the [OK]
key.

The password entry screen does not appear if the file administrator is logged on.

103
4. Protecting Data from Information Leaks

Unlocking a Locked Print File

If you specify [On] for "Enhance File Protection", the file will be locked and become inaccessible if an
invalid password is entered ten times. This section explains how to unlock files.
"Enhance File Protection" is one of the extended security functions. For details about this and other extended
security functions, see "Specifying the Extended Security Functions".
Only the file administrator can unlock files. For details about logging on and logging off with administrator
authentication, see "Logging on Using Administrator Authentication", "Logging off Using Administrator
Authentication".
This can also be specified via Web Image Monitor. For details, see Web Image Monitor Help.

4 1. Press the [Printer] key.


2. Press [Prt.Jobs].

3. Select [Locked Print Jobs] using [ ] or [ ], and then press [Job List].

4. Select the Locked Print file using [ ] or [ ], and then press [Change].

5. Select [Unlock Files] using [ ] or [ ], and then press the [OK] key.

104
Printing a Confidential Document

6. Press [Unlock].

• You can use the same procedure to unlock stored print files also.

• p.217 "Specifying the Extended Security Functions"


• p.32 "Logging on Using Administrator Authentication" 4
• p.33 "Logging off Using Administrator Authentication"

105
4. Protecting Data from Information Leaks

106
5. Securing Information Sent over the
Network or Stored on Hard Disk
This chapter describes how to protect information transmitted through the network or stored on the hard
disk from unauthorized viewing and modification.

Preventing Information Leakage Due to


Unauthorized Transmission
This section describes Preventing Data Leaks Due to Unauthorized Transmission.
If user authentication is specified, the user who has logged on will be designated as the sender to prevent
data from being sent by an unauthorized person masquerading as the user.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered
in the Address Book.
5

Restricting Destinations

This can be specified by the user administrator.


Make the setting to disable the direct entry of e-mail addresses and phone numbers under the scanner and
fax functions.
By making this setting, the destinations are restricted to addresses registered in the Address Book.
If you set "Restrict Dest. Use(Fax)" to [On], you can prohibit users from directly entering telephone numbers,
e-mail addresses, or Folder Path on the fax screen in order to send files. If you set "Rstrct Dest. Use(Scanner)"
to [On], you can prohibit users from directly entering telephone numbers, e-mail addresses, or Folder Path
on the scanner screen in order to send files.
If you set "Restrict Dest. Use(Fax)" to [Off], "Rstrct Dest. Add.(Fax)" appears. If you set "Rstrct Dest. Use
(Scanner)" to [Off], "Rstrct Dest. Add.(Scanner)" appears.
In "Rstrct Dest. Add.(Fax)", you can restrict users from registering data in the Address Book on the fax screen.
In "Rstrct Dest. Add.(Scanner)", you can restrict users from registering data in the Address Book on the
scanner screen.
If you set "Rstrct Dest. Add.(Fax)" to [Off], users can directly enter destination telephone numbers, e-mail
addresses, and Folder Path in "Program" on the fax screen. If you set "Rstrct Dest. Add.(Scanner)" to [Off],
users can directly enter destination telephone numbers, e-mail addresses, and Folder Path in "Program"
on the scanner screen.
If you set "Rstrct Dest. Add.(Fax)" to [On], users can enter destinations directly, but cannot use "Program"
to register data in the Address Book on the fax screen. If you set "Rstrct Dest. Add.(Scanner)" to [On], users

107
5. Securing Information Sent over the Network or Stored on Hard Disk

can enter destinations directly, but cannot use "Program" to register data in the Address Book on the scanner
screen.
When this setting is made, only the user administrator can change the Address Book. "Restrict Dest. Use
(Fax)", "Rstrct Dest. Use(Scanner)", "Rstrct Dest. Add.(Fax)", and "Rstrct Dest. Add.(Scanner)" are extended
security functions. For more information about these and the extended security functions, see "Specifying
the Extended Security Functions".
" Restricting Destinations" can also be specified using Web Image Monitor or SmartDeviceMonitor for
Admin. For details, see the Help for these applications.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.

5. Select [Rstrct Dest. Use(Scanner)] using [ ] or [ ], and then press the [OK] key.

To restrict the use of fax destinations, select [Restrict Dest. Use(Fax)].

108
Preventing Information Leakage Due to Unauthorized Transmission

6. Select [On] using [ ] or [ ], and then press the [OK] key.

7. Press the [User Tools/Counter] key.

• p.217 "Specifying the Extended Security Functions"


• p.32 "Logging on Using Administrator Authentication"
• p.33 "Logging off Using Administrator Authentication"

109
5. Securing Information Sent over the Network or Stored on Hard Disk

Using S/MIME to Protect E-mail Transmission


By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public
key which prevents its content from being altered during transmission. You can also prevent sender
impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic
signature created with a private key. You can apply these functions separately or, for stronger security,
together.
To send encrypted e-mail, both the sender (this machine) and the receiver must support S/MIME.
For details about using S/MIME with the scanner function, see "Security Settings to E-mails", Scanner
Reference.
Compatible Mailer Applications
The S/MIME function can be used with the following applications:
• Microsoft Outlook 98 and later
5 • Microsoft Outlook Express 5.5 and later
• Netscape Messenger 7.1 and later
• Lotus Notes R5 and later

• To use S/MIME, you must first specify "Administrator's E-mail Address" in [System Settings].

• If an electronic signature is specified for an e-mail, the administrator's address appears in the "From"
field and the address of the user specified as "sender" appears in the "Reply To" field.
• When sending e-mail to users that support S/MIME and users that do not support S/MIME at the
same time, the e-mail is separated into encrypted and unencrypted groups and then sent.
• When using S/MIME, the e-mail size is larger than normal.

E-mail Encryption

To send encrypted e-mail using S/MIME, the user certificate must first be prepared using Web Image
Monitor and registered in the Address Book by the user administrator. Registering the certificate in the
Address Book specifies each user's public key. After installing the certificate, specify the encryption
algorithm using Web Image Monitor. The network administrator can specify the algorithm.
E-mail Encryption
1. Prepare the user certificate.
2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the
certificate is specified in the Address Book.)
3. Specify the encryption algorithm using Web Image Monitor.

110
Using S/MIME to Protect E-mail Transmission

4. Using the shared key, encrypt the e-mail message.


5. The shared key is encrypted using the user's public key.
6. The encrypted e-mail is sent.
7. The receiver decrypts the shared key using a secret key that corresponds to the public key.
8. The e-mail is decrypted using the shared key.

• There are three types of user certificates that can be installed on this machine, "DER encoded binary
X.509", "Base 64 encoded X.509", and "PKCS #7 certificate".
• When installing a user certificate to the Address Book using Web Image Monitor, you might see an
error message if the certificate file contains more than one certificate. If this error message appears,
install the certificates one at a time.

Specifying the User Certificate 5


This can be specified by the user administrator. Each user certificate must be prepared in advance.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The user administrator can log on.
Enter the login user name and login password.
4. Click [Address Book].
The Address Book page appears.
5. Select the user for whom the certificate will be installed, and then click [Change].
The Change User Information screen appears.
6. Enter the user address in the "E-mail Address" field under "E-mail".
7. Click [Change] in "User Certificate".
8. Click [Browse], select the user certificate file, and then click [Open].
9. Click [OK].
The user certificate is installed.
10. Click [OK].
11. Click [Logout].

111
5. Securing Information Sent over the Network or Stored on Hard Disk

Specifying the Encryption Algorithm


This can be specified by the network administrator.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [S/MIME] under "Security".

5 The S/MIME settings page appears.


5. Select the encryption algorithm from the drop down menu next to "Encryption Algorithm"
under "Encryption".
6. Click [OK].
The algorithm for S/MIME is set.
7. Click [OK].
8. Click [Logout].

Attaching an Electronic Signature

To attach an electronic signature to sent e-mail, a device certificate must be installed in advance.
It is possible to use either a self-signed certificate created by the machine, or a certificate issued by a
certificate authority.

• To install an S/MIME device certificate, you must first register "Administrator's E-mail Address" in
[System Settings] as the e-mail address for the device certificate. Note that even if you will not be
using S/MIME, you must still specify an e-mail address for the S/MIME device certificate.
Electronic Signature
1. Install a device certificate on the machine. (The secret key on the certificate is configured on the
machine.)
2. Attach the electronic signature to an e-mail using the secret key provided by the device certificate.
3. Send the e-mail with the electronic signature attached to the user.
4. The receiver requests the public key and device certificate from the machine.

112
Using S/MIME to Protect E-mail Transmission

5. Using the public key, you can determine the authenticity of the attached electronic signature to
see if the message has been altered.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate.
Create and install the device certificate using Web Image Monitor.
2. Make certificate settings.
Make settings for the certificate to be used for S/MIME using Web Image Monitor.
3. Make electronic signature settings.
Make settings for the electronic signature using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Create the device certificate.
Create the device certificate using Web Image Monitor.
The application procedure for a created certificate depends on the certificate authority. Follow 5
the procedure specified by the certificate authority.
2. Install the device certificate.
Install the device certificate using Web Image Monitor.
3. Make certificate settings.
Make settings for the certificate to be used for S/MIME using Web Image Monitor.
4. Make electronic signature settings.
Make settings for the electronic signature using Web Image Monitor.

Creating and Installing the Self-Signed Certificate


This can be specified by the network administrator.
Create and install the device certificate using Web Image Monitor. For details about the displayed items
and selectable items, see Web Image Monitor Help.
This section explains the use of a self-signed certificate as the device certificate.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.

113
5. Securing Information Sent over the Network or Stored on Hard Disk

4. Click [Configuration], and then click [Device Certificate] under "Security".


5. Check the radio button next to the number of the certificate you want to create.
6. Click [Create].
7. Make the necessary settings.
8. Click [OK].
The setting is changed.
9. Click [OK].
A security warning dialog box appears.
10. Check the details, and then click [OK].
"Installed" appears under Certificate Status to show that a device certificate for the printer has been
installed.
11. Click [Logout].
5
• Click [Delete] to delete the device certificate from the machine.

Creating the Device Certificate (Issued by a Certificate Authority)


This can be specified by the network administrator.
Create the device certificate using Web Image Monitor. For details about the displayed and selectable
items and settings, see Web Image Monitor Help.
Use this procedure to create a device certificate issued by a certificate authority.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
The Device Certificate page appears.
5. Check the radio button next to the number of the certificate you want to request.
6. Click [Request].
7. Make the necessary settings.

114
Using S/MIME to Protect E-mail Transmission

8. Click [OK].
"Requesting" appears for Certificate Status in the "Certificates" area.
9. Click [Logout].
10. Apply to the certificate authority for the device certificate.
The application procedure depends on the certificate authority. For details, contact the certificate
authority.
For application details, click the Web Image Monitor Details icon and use the information shown in
"Certificate Details".

• The issuing location may not be displayed if you request two certificates at the same time. When you
install a certificate, be sure to check the certificate destination and installation procedure.
• Using Web Image Monitor, you can create the contents of the device certificate but you cannot send
the certificate application.
• Click [Cancel Request] to cancel the request for the device certificate.
5

Installing the Device Certificate (Issued by a Certificate Authority)


This can be specified by the network administrator.
Install the device certificate using Web Image Monitor. For details about displayed and selectable items
and settings, see Web Image Monitor Help.
Use this procedure to install a server certificate issued by a certificate authority.
Enter the details of the device certificate issued by the certificate authority.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
The Device Certificate page appears.
5. Check the radio button next to the number of the certificate you want to install.
6. Click [Install].

115
5. Securing Information Sent over the Network or Stored on Hard Disk

7. Enter the details of the device certificate.


In the Certificate Request box, enter the details of the device certificate received from the certificate
authority.
8. Click [OK].
"Installed" appears under [Certificate Status] to show that a device certificate for the machine has
been installed.
9. Click [Logout].

Selecting the Device Certificate


This can be specified by the network administrator.
Select the device certificate to be used for S/MIME using Web Image Monitor.

1. Open a Web browser.


5 2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can logon.
Enter the login user name and login password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
The Device Certificate page appears.
5. Select the certificate to be used for the electronic signature from the drop down box in "S/
MIME" under "Certification".
6. Click [OK].
The certificate to be used for the S/MIME electronic signature is set.
7. Click [OK].
8. Click [Logout].

Specifying the Electronic Signature


This can be specified by the network administrator.
After installing the device certificate on the machine, configure the electronic signature using Web Image
Monitor. The configuration procedure is the same regardless of whether you are using a self-signed
certificate or a certificate issued by a certificate authority.

1. Open a Web browser.

116
Using S/MIME to Protect E-mail Transmission

2. Enter "http://(the machine's IP address or host name)/" in the address bar.


When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can logon.
Enter the login user name and login password.
4. Click [Configuration], and then click [S/MIME] under "Security".
The S/MIME settings page appears.
5. Select the digest algorithm to be used in the electronic signature next to "Digest Algorithm"
under "Signature".
6. Select the method for attaching the electronic signature when sending e-mail from the
scanner next to "When Sending E-mail by Scanner" under "Signature".
5
7. Select the method for attaching the electronic signature when forwarding stored documents
next to "When Transferring Files Stored in Document Server (Utility)" under "Signature".
8. Click [OK].
The settings for the S/MIME electronic signature are enabled.
9. Click [OK].
10. Click [Logout].

117
5. Securing Information Sent over the Network or Stored on Hard Disk

Protecting the Address Book


If user authentication is specified, the user who has logged on will be designated as the sender to prevent
data from being sent by an unauthorized person masquerading as the user.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.

Configuring Address Book Access Permissions

This can be specified by the registered user. Access permission can also be specified by a user granted
full control or the user administrator.
You can specify who is allowed to access the data in the Address Book.
By making this setting, you can prevent the data in the Address Book being used by unregistered users.

5 For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Press [Address Book Management] using [ ] or [ ], and then press the [OK] key.

118
Protecting the Address Book

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination. 5
7. Press the [OK] key.

8. Press [Details].

9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.

10. Select [Dest.Protect:Permissions] using [ ] or [ ], and then press the [OK] key.

119
5. Securing Information Sent over the Network or Stored on Hard Disk

11. Press [Program].

12. Select the users or groups to register.

You can select more than one user.


By pressing [All], you can select all the users.
5 13. Press the [OK] key.

14. Select the permission, and then press the [OK] key.
Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control].
To register multiple users, repeat steps 12 to 14.

15. Press the [User Tools/Counter] key.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Encrypting Data in the Address Book

This can be specified by the user administrator.

120
Protecting the Address Book

You can encrypt the data in the Address Book using the extended security function, "Encrypt Address Book".
For details about this and other extended security functions, see "Specifying the Extended Security
Functions".
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.

5. Select [Encrypt Address Book] using [ ] or [ ], and then press the [OK] key.

6. Select the setting you want to change using [ ] or [ ], and then press [Enc.Key].

121
5. Securing Information Sent over the Network or Stored on Hard Disk

7. Enter the encryption key, and then press the [OK] key.

Enter the encryption key using up to 32 alphanumeric characters.


8. Re-enter the encryption key, and then press the [OK] key.

9. Press the [OK] key.


5

10. Press [OK].

Do not switch the main power off during encryption, as doing so may corrupt the data.
Encrypting the data in the Address Book may take a long time.
The time it takes to encrypt the data in the Address Book depends on the number of registered users.
The machine cannot be used during encryption.
Normally, once encryption is complete, [Exit] appears.
If you press [Stop] during encryption, the data is not encrypted.
If you press [Stop] during decryption, the data stays encrypted.
11. Press [Exit].

122
Protecting the Address Book

12. Press the [User Tools/Counter] key.

• If you register additional users after encrypting the data in the Address Book, those users are also
encrypted.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.217 "Specifying the Extended Security Functions"

123
5. Securing Information Sent over the Network or Stored on Hard Disk

Encrypting Data on the Hard Disk


This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
In order to use this function, the HDD Encryption Unit option is required.
Prevent information leakage by encrypting the Address Book, authentication information, and stored
documents as the data is written. In addition, if the machine malfunctions or needs to be replaced, your
service representative can easily transfer existing data to a new machine.
When the data encryption settings are enabled, an encryption key is generated and this is used to restore
the data. This key can be changed at any time.
Data that is Encrypted
This function encrypts data that is stored in the machine's NVRAM (memory that remains even after
5 the machine has been turned off) and on the hard disk.
The following data is encrypted:
• Address Book data
• User authentication information
• Temporary stored documents
• Logs
• Network I/F setting information
• System settings information

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Enabling the Encryption Settings

Use the following procedure to enable the encryption settings at initial set up, or after encryption settings
have been canceled and settings must be made again.

• The encryption key is required for data recovery if the machine malfunctions. Be sure to store the
encryption key safely for retrieving backup data.
• Encryption begins after you have completed the control panel procedure and rebooted the machine.
If there is unencrypted data on the hard disk that must be both transferred and encrypted, rebooting
will take about three hours. If there is encrypted data on the hard disk that must be re-encrypted,
rebooting will take about five hours. If both the erase-by-overwrite function and the encryption function

124
Encrypting Data on the Hard Disk

are specified, encryption begins after the data that is stored on the hard disk has been overwritten
and the machine has been rebooted.
• If you want to specify encryption of unencrypted data with erase-by-overwrite, select [Random
Numbers] as the overwrite method, and set the number of overwrites to "3". The entire process will
take about five hours. If you specify re-encryption of encrypted data, the entire process will take about
seven hours.
• Rebooting will be faster if there is no data to carry over to the hard disk and if encryption is set to
[Format], even if all the data on the hard disk is formatted. Before you perform encryption, we
recommend you back up important data such as the Address Book.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

5
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.

5. Select [Encrypt] using [ ] or [ ], and then press the [OK] key.

125
5. Securing Information Sent over the Network or Stored on Hard Disk

6. Select the data to be carried over to the hard disk and not be reset.

To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].
7. Press [Print].

5 The encryption key for backup data is printed.


8. Press [Continue].

9. Press [Exit].

10. Press the [User Tools/Counter] key.


11. Turn off the power and the main power switch, and then turn the main power switch back
on.
For details about turning off the power, see "Turning On the Power", About This Machine.

Printing the Encryption Key

Use the following procedure to print the key again if it has been lost or misplaced.

• The encryption key is required for data recovery if the machine malfunctions. Be sure to store the
encryption key safely for retrieving backup data.

126
Encrypting Data on the Hard Disk

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.
5

5. Select [Print Encryption Key] using [ ] or [ ], and then press the [OK] key.

6. Press [Print].

The encryption key for backup data is printed.


7. Press the [User Tools/Counter] key.

Updating the Encryption Key

You can update the encryption key and create a new key. Updates are possible when the machine is
functioning normally.

127
5. Securing Information Sent over the Network or Stored on Hard Disk

• The encryption key is required for recovery if the machine malfunctions. Be sure to store the encryption
key safely for retrieving backup data.
• When the encryption key is updated, encryption is performed using the new key. After completing
the procedure on the machine's control panel, turn off the power and restart the machine to enable
the new settings. Restarting can be slow when there is data to be carried over to the hard disk.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

5 3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.

5. Select [Update Encryption Key] using [ ] or [ ], and then press the [OK] key.

6. Select the data to be carried over to the hard disk and not be reset.

To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].

128
Encrypting Data on the Hard Disk

7. Press [Print].

The encryption key for retrieving the backup data is printed.


8. Press [Continue].

9. Press [Exit].
5

10. Press the [User Tools/Counter] key.


11. Turn off the power and the main power switch, and then turn the main power switch back
on.
For details about turning off the power, see "Turning On the Power", About This Machine.

Canceling Data Encryption

Use the following procedure to cancel the encryption settings when encryption is no longer necessary.

• After completing this procedure on the machine's control panel, turn off the power and restart the
machine to enable the new settings. Restarting can be slow when there is data to be carried over to
the hard disk.
• Before disposing of a hard disk, note that even if [Format] is selected and encryption is canceled,
data stored on the hard disk is not erased.

1. Press the [User Tools/Counter] key.

129
5. Securing Information Sent over the Network or Stored on Hard Disk

2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Machine Data Encryption] using [ ] or [ ], and then press the [OK] key.

5. Select [Cancel Encryption] using [ ] or [ ], and then press the [OK] key.

6. Select the data to be carried over to the hard disk and not be reset.

To carry all of the data over to the hard disk, select [All Data]. To carry over only the machine settings
data, select [File Sys]. To reset all of the data, select [Format].
7. Press [Continue].

130
Encrypting Data on the Hard Disk

8. Press [Exit].

9. Press the [User Tools/Counter] key.


10. Turn off the power and the main power switch, and then turn the main power switch back
on.
For details about turning off the power, see "Turning On the Power", About This Machine.

131
5. Securing Information Sent over the Network or Stored on Hard Disk

Deleting Data on the Hard Disk


This can be specified by the machine administrator.
To use this function, the optional DataOverwriteSecurity Unit must be installed.
The machine's hard disk stores all document data from the copier, printer, fax, and scanner functions. It
also stores the data of users' code counters, and the Address Book.
To prevent data on the hard disk being leaked before disposing of the machine, you can overwrite all data
stored on the hard disk. You can also automatically overwrite temporarily-stored data.

Auto Erase Memory

A document scanned in copier, or scanner mode, or print data sent from a printer driver is temporarily
stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary
5 data. Auto Erase Memory erases the temporary data on the hard disk by writing over it.
Overwriting starts automatically once the job is completed.
The copier, fax, and printer functions take priority over the Auto Erase Memory function. If a copy, fax or
print job is in progress, overwriting will only be done after the job is completed.

Methods of Overwriting
You can select a method of overwriting from the following:
• NSA
Temporary data is overwritten twice with random numbers and once with zeros.
• DoD
Temporary data is overwritten with a fixed value, the fixed value's complement, and random numbers.
It is then verified.
• Random Numbers
Temporary data is overwritten multiple times with random numbers. The number of overwrites can be
selected from 1 to 9. The default is 3 times.

• Default: Random Numbers


• NSA stands for "National Security Agency", U.S.A.
• DoD stands for "Department of Defense", U.S.A.

132
Deleting Data on the Hard Disk

Using Auto Erase Memory


This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

• When Auto Erase Memory is set to "On", temporary data that remained on the hard disk when Auto
Erase Memory was "Off" might not be overwritten.

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

5
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Auto Erase Memory Setting] using [ ] or [ ], and then press the [OK] key.

5. Select [On] using [ ] or [ ], and then press [HD Erase].

Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
If you select [Random Numbers], proceed to step 6.
If you select [NSA] proceed to step 8.
If you select [DoD], proceed to step 9.
For details about the methods of overwriting, see "Methods of Overwriting".

133
5. Securing Information Sent over the Network or Stored on Hard Disk

6. Select [Random Numbers] using [ ] or [ ], and then press the [OK] key.

7. Enter the number of times that you want to overwrite using the number keys, and then press
the [OK] key.

Auto Erase Memory is set.


5 8. Select [NSA] using [ ] or [ ], and then press the [OK] key.

Auto Erase Memory is set.


9. Select [DoD] using [ ] or [ ], and then press the [OK] key.

Auto Erase Memory is set.

• If the main power switch is turned to [Off] before Auto Erase Memory is completed, overwriting will
stop and data will be left on the hard disk.
• Do not stop the overwrite mid-process. Doing so will damage the hard disk.
• Should the main power switch be turned to [Off] before Auto Erase Memory is completed, overwriting
will continue once the main power switch is turned back to [On].
• If an error occurs before overwriting is completed, turn off the main power. Turn it on, and then repeat
from step 1.
• If you specify to both overwrite and encrypt the data, the data will all be encrypted.

134
Deleting Data on the Hard Disk

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.132 "Methods of Overwriting"

Canceling Auto Erase Memory


This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Follow steps 1 to 4 in "Auto Erase Memory Setting".


2. Select [Off] using [ ] or [ ], and then press the [OK] key.
Auto Erase Memory is disabled. 5
• To set Auto Erase Memory to "On" again, repeat the procedure in "Using Auto Erase Memory".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Types of Data that Can or Cannot Be Overwritten


The following table shows the types of data that can or cannot be overwritten by "Auto Erase Memory".
Data Overwritten by Auto Erase Memory
Copier
• Copy jobs
Printer
• Print jobs
• Sample Print /Locked Print/Hold Print/Stored Print jobs
A Sample Print/Locked Print/Hold Print job can only be overwritten after it has been executed.
A Stored Print job is overwritten after it has been deleted.
• Spool Printing jobs
• PDF Direct Print data
Facsimile
• LAN-FAX print data

135
5. Securing Information Sent over the Network or Stored on Hard Disk

Data sent or received via facsimile, as well as fax numbers, will not be overwritten by Auto Erase
Memory
Data Not Overwritten by Auto Erase Memory
• Information registered in the Address Book
Data stored in the Address Book can be encrypted for security. For details, see "Protecting the
Address Book".
• Counters stored under each user code
• Image overlay data
Image overlay data is overwritten after it is deleted.

• p.118 "Protecting the Address Book"

5 Erase All Memory

This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of
your machine.

• If you select "Erase All Memory", the following are also deleted: user codes, counters under each
user code, user stamps, data stored in the Address Book, printer fonts downloaded by users,
applications using Embedded Software Architecture, SSL server certificates, and the machine's
network settings.
• If the main power switch is turned to [Off] before Erase All Memory is completed, overwriting will be
stopped and data will be left on the hard disk.
• Do not stop the overwrite mid-process. Doing so will damage the hard disk.
• Before erasing the hard disk, you can back up user codes, counters for each user code, and Address
Book data using SmartDeviceMonitor for Admin. For details, see SmartDeviceMonitor for Admin
Help.
• Other than pausing, no operations are possible during the "Erase All Memory" process. If [Random
Numbers] is specified and the number of overwrites set to "3", the erase process will take about two
hours.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

136
Deleting Data on the Hard Disk

Using Erase All Memory

1. Disconnect communication cables connected to the machine.


2. Press the [User Tools/Counter] key.
3. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

4. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

5
5. Select [Erase All Memory] using [ ] or [ ], and then press the [OK] key.

6. Select the method of erasing the data.


Select the method of erasing the data from [NSA], [DoD], or [Random Numbers].
If you select [Random Numbers], proceed to step 7.
If you select [NSA] proceed to step 9.
If you select [DoD], proceed to step 10.
For details about the methods of overwriting, see "Methods of Overwriting".
7. Select [Random Numbers] using [ ] or [ ], and then press the [OK] key.

137
5. Securing Information Sent over the Network or Stored on Hard Disk

8. Enter the number of times that you want to overwrite using the number keys, and then press
the [OK] key.

9. Select [NSA] using [ ] or [ ], and then press the [OK] key.

10. Select [DoD] using [ ] or [ ], and then press the [OK] key.
5

11. Press [Yes].

12. When overwriting is completed, press [Exit], and then turn off the power.

• Should the main power switch be turned to [Off] before Erase All Memory is completed, overwriting
will continue once the main power switch is turned back to [On].
• If you specify to both overwrite and encrypt the data, the data will all be encrypted.
• If an error occurs before overwriting is completed, turn off the main power. Turn it on again, and then
repeat from step 2.

• p.132 "Methods of Overwriting"

Suspending Erase All Memory


The overwriting process can be suspended temporarily.

138
Deleting Data on the Hard Disk

• Erase All Memory cannot be cancelled.

1. Press [Suspend] while Erase All Memory is in progress.


2. Press [Yes].
Erase All Memory is canceled.
3. Turn off the main power.

• To resume overwriting, turn on the main power.

139
5. Securing Information Sent over the Network or Stored on Hard Disk

140
6. Managing Access to the Machine
This chapter describes how to prevent unauthorized access to and modification of the machine's settings.

Preventing Changes to Machine Settings


This section describes Preventing Modification of Machine Settings.
The administrator type determines which machine settings can be modified. Users cannot change the
administrator settings. In "Items" under "Admin. Auth. Management", the administrator can select which
settings users cannot specify. For details about the administrator roles, see "Administrators".
Register the administrators before using the machine. For instructions on registering the administrator, see
"Registering the Administrator".
Type of Administrator
Register the administrator on the machine, and then authenticate the administrator using the
administrator's login user name and password. The administrator can also specify [Items] in "Admin.
Auth. Management" to prevent users from specifying certain settings. Administrator type determines
which machine settings can be modified. The following administrator types are possible: 6
• User Administrator
For a list of settings that the user administrator can specify, see "User Administrator Settings".
• Machine Administrator
For a list of settings that the machine administrator can specify, see "Machine Administrator
Settings".
• Network Administrator
For a list of settings that the network administrator can specify, see "Network Administrator
Settings".
• File Administrator
For a list of settings that the file administrator can specify, see "File Administrator Settings".
Menu Protect
Use this function to specify the permission level for users to change those settings accessible by non-
administrators.
You can specify Menu Protect for the following settings:
• Copier Features
• Fax Features
• Printer Features
• Scanner Features

141
6. Managing Access to the Machine

For a list of settings that users can specify according to the Menu Protect level, see "User Settings -
Control Panel Settings", "User Settings - Web Image Monitor Settings".

• p.21 "Administrators"
• p.27 "Registering the Administrator"
• p.265 "User Administrator Settings"
• p.248 "Machine Administrator Settings"
• p.258 "Network Administrator Settings"
• p.263 "File Administrator Settings"
• p.270 "User Settings - Control Panel Settings"
• p.287 "User Settings - Web Image Monitor Settings"

142
Menu Protect

Menu Protect
The administrator can also limit users' access permission to the machine's settings. The machine's "System
Settings" menu and the printer's regular menus can be locked so they cannot be changed. This function is
also effective when management is not based on user authentication. For a list of settings that users can
specify according to the Menu Protect level, see "User Settings - Control Panel Settings", or "User Settings
- Web Image Monitor Settings".

• p.270 "User Settings - Control Panel Settings"


• p.287 "User Settings - Web Image Monitor Settings"

Specifying Menu Protect

This can be specified by the machine administrator. You can set menu protect to [Off], [Level 1], or [Level
2]. If you set it to [Off], no menu protect limitation is applied. To limit access to the fullest extent, select [Level
2].
6
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Copy Function
To specify "Menu Protect" in "Copier Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".

1. Press the [User Tools/Counter] key.


2. Select [Copier Features] using [ ] or [ ], and then press the [OK] key.

143
6. Managing Access to the Machine

3. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.

4. Select the menu protect level using [ ] or [ ], and then press the [OK] key.

5. Press the [User Tools/Counter] key.

Fax Function
To specify "Menu Protect" in "Fax Features", set "Machine Management" to [On] in "Admin. Auth.
6 Management" in "Administrator Tools" in "System Settings".

1. Press the [User Tools/Counter] key.


2. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.

144
Menu Protect

5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.

6. Press the [User Tools/Counter] key.

Printer Function
To specify "Menu Protect" in "Printer Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".

1. Press the [User Tools/Counter] key.


2. Select [Printer Features] using [ ] or [ ], and then press the [OK] key.

3. Select [Maintenance] using [ ] or [ ], and then press the [OK] key.

4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.

5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.

6. Press the [User Tools/Counter] key.

145
6. Managing Access to the Machine

Scanner Function
To specify "Menu Protect" in "Scanner Features", set "Machine Management" to [On] in "Admin. Auth.
Management" in "Administrator Tools" in "System Settings".

1. Press the [User Tools/Counter] key.


2. Select [Scanner Features] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

6 4. Select [Menu Protect], and then press the [OK] key.

5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.

6. Press the [User Tools/Counter] key.

146
Limiting Available Functions

Limiting Available Functions


To prevent unauthorized operation, you can specify who is allowed to access each of the machine's
functions.
Available Functions
Specify the available functions from the copier, fax, scanner, and printer functions.

Specifying Which Functions are Available

This can be specified by the user administrator. Specify the functions available to registered users. By making
this setting, you can limit the functions available to users.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
6

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.

5. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.

147
6. Managing Access to the Machine

6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.

By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.

8. Press [Details].

9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.

10. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.

11. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.

148
Limiting Available Functions

The box next to a selected item is checked. To deselect the item, press [ ].
12. Press the [OK] key.

13. Press the [Escape] key.


14. Press [End].

15. Press the [OK] key.


16. Press the [User Tools/Counter] key.
6
• p.32 "Logging on Using Administrator Authentication"
• p.33 "Logging off Using Administrator Authentication"

149
6. Managing Access to the Machine

Managing Log Files


The logs created by this machine allow you to track access to the machine, identities of users, and usage
of the machine's various functions.
For security, you can encrypt the logs. This prevents users who do not have the encryption key from accessing
log information.
Note however that logs are data heavy and will consume hard disk space. To make hard disk space
available, you might need to periodically delete the log files.
The logs can be viewed using Web Image Monitor or Web SmartDeviceMonitor. You can also convert
log files into CSV files for downloading. To use Web SmartDeviceMonitor, you must specify the log transfer
setting under Web SmartDeviceMonitor in advance.
Log Types
This machine creates two types of log: the job log and the access log.
• Job Log
Stores details of user file-related operations such as copying, printing, and faxing, and control
6 panel operations such as sending scan files and printing reports (the configuration list, for
example).
• Access Log
Stores details of login/logout activity, service engineer operations such as hard disk formatting,
system operations such as viewing the results of log transfers, and security operations such as
specifying settings for encryption, unauthorized access detection, user lockout, and firmware
authentication.

Using the Control Panel to Specify Log File Settings

You can specify settings such as whether or not to transfer logs to Web SmartDeviceMonitor and whether
or not to delete all logs.

Disabling Log Transfer to Web SmartDeviceMonitor


This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
Use the following procedure to disable log transfer from the machine to Web SmartDeviceMonitor. Note
that you can change the log transfer setting to [Inactive] only if it is already set to [Active].
For details about Web SmartDeviceMonitor, contact your sales representative.
For details about the transfer log setting, see Web SmartDeviceMonitor manual.

150
Managing Log Files

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Transfer Log Setting] using [ ] or [ ], and then press the [OK] key.

6
5. Press the [OK] key.

6. Press the [User Tools/Counter] key.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Specifying Delete All Logs


This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
By deleting the log stored in the machine, you can free up space on the hard disk.
To delete all logs from the control panel, you must use Web SmartDeviceMonitor or enable the Job Log
or Access Log collection settings using Web Image Monitor first.

151
6. Managing Access to the Machine

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Delete All Logs] using [ ] or [ ], and then press the [OK] key.

6
5. Press [Yes].

6. Press [Exit].

7. Press the [User Tools/Counter] key.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

152
Managing Log Files

Using Web SmartDeviceMonitor to Manage Log Files

For details about using Web SmartDeviceMonitor to manage Log Files, see the manual supplied with the
Using Web SmartDeviceMonitor.

Using Web Image Monitor to Manage Log Files

This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
You can specify the types of log to store in the machine and the log collection level. You can also encrypt,
bulk delete, or download log files.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

6
Specify Log Collect Settings
Specify collection log settings. The collection log levels are listed below.
Job Log Collect Level
Level 1
User Settings
Access Log Collect Level
Level 1
Level 2
User Settings

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under Device Settings.

153
6. Managing Access to the Machine

5. Select Collect Job Logs to specify Job Log settings, or select Collect Access Logs to specify
Access Log settings, and then select [Active].
6. Specify the recording levels for either Job Log Collect Level or Access Log Collect Level.
The settings shown for "Job Log Collect Level" or "Access Log Collect Level" vary depending on the
collection level selected.
If you change the setting in the list, the setting for Job Log Collect Level or Access Log Collect Level
automatically changes to [User Settings].
7. Click [OK].
Changes are also reflected in related log settings.
8. Click [Logout].

• The greater the Access Log Collect setting value, the more logs are collected.

Disabling Log Transfer to Web SmartDeviceMonitor

6 Use the following procedure to disable log transfer to Web SmartDeviceMonitor. Note that you can change
the log transfer setting to [Inactive] only if it is already set to [Active].

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under Device Settings.
5. Select [Inactive] under "Transfer Logs".
6. Click [OK].
7. Click [Logout].

Specifying Log Encryption


Use the following procedure to enable/disable log encryption.

1. Open a Web browser.

154
Managing Log Files

2. Enter "http://(the machine's IP address or host name)/" in the address bar.


When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under Device Settings.
5. Select [Active] under "Encrypt Logs."
To disable log encryption, select [Inactive].
6. Click [OK].
The log is encrypted. If other changes have been made in related log settings, they will occur at the
same time.
7. Click [Logout].

• In order to enable encryption, either Collect Job Logs or Collect Access Logs, or both must be set to
[Active].
6
• If the data stored in the machine has been encrypted with the optional HDD Encryption Unit, the log
files will still be encrypted, regardless of this setting.

Deleting All Logs


Use the following procedure to delete all logs stored in the machine.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under Device Settings.
5. Click [Delete] under "Delete All Logs".
6. Click [OK].
All job logs and device access log records are cleared.
7. Click [Logout].

155
6. Managing Access to the Machine

• On this page, "Delete All Logs" does not appear if either Collect Job Logs or Collect Access Logs are
not set to [Active].

Downloading Logs
Use the following procedure to convert the logs stored in the machine into a CSV file for simultaneous batch
download.

1. Open a Web browser.


2. In the Web browser’s address bar, enter "http://(the machine’s IP address or host name)/
" to access the machine.
When entering an IPv4 address, do not begin segments with zeros. For example: if the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine. If you enter it
as "192.168.001.010", you cannot access the machine.
The top page of Web Image Monitor appears.

6 3. Click [Login].
Log on using an administrator's user name and password.
4. Click [Configuration], and then click [Download Logs] under "Device Settings".
5. Click [Download].
6. Specify the folder in which you want to save the file.
7. Click [OK].
8. Click [Logout].

• Downloaded logs contain data recorded up till the time you click the [Download] button. Any logs
recorded after the [Download] button is clicked will not be downloaded.
• Downloading is slower if the number of logs is large.
• If an error occurs while the CSV file is downloading or being created, the download is cancelled and
details of the error are included at the end of the file.
• For details about saving CSV log files, see your browser's Help.
• Depending on the configuration of your computer, some applications might not be able to display
the downloaded CSV files.
• To collect logs, set "Collect Job Logs" and "Collect Access Logs" to Active. For details about setting,
see Web Image Monitor Help.
• For details about the items contained in the logs, see "Attributes of Logs you Can Download".

156
Managing Log Files

• p.160 "Attributes of Logs you Can Download"

Logs that can be Managed Using Web Image Monitor

This section details the information items contained in the logs that are created for retrieval by Web Image
Monitor.

Logs that can be Collected


The following tables explain the items in the job log and access log that the machine creates when you
enable log collection using Web Image Monitor. If you require log collection, use Web Image Monitor to
configure it. Web Image Monitor will then download the collected logs. For details, see Web Image
Monitor Help.
Job Log Information Items

Job Log Item Content 6


Copier: Copying Details of normal and Sample Copy jobs.

Scanner: Sending Details of sent scan files.

Printer: Printing Details of normal print jobs.

Printer: Locked Print Details of Unprinted Locked Print files stored on the machine.
(Incomplete)

Printer: Locked Print Details of Locked Print files stored on the machine and printed
from Web Image Monitor or the control panel.

Printer: Sample Print Details of Unprinted Sample Print files stored on the machine.
(Incomplete)

Printer: Sample Print Details of Sample Print files stored on the machine and printed
from Web Image Monitor or the control panel.

Printer: Hold Print (Incomplete) Details of Unprinted Hold Print files stored on the machine.

Printer: Hold Print Details of Hold Print files stored on the machine and printed from
Web Image Monitor or the control panel.

Printer: Stored Print Details of Stored Print files stored on the machine.

157
6. Managing Access to the Machine

Job Log Item Content

Printer: Store and Normal Print Details of Stored Print files that were printed at the time of storage
(when "Job Type" was set to [Store and Normal Print] in printer
properties).

Printer: Stored File Printing Details of Stored Print files printed from the control panel or Web
Image Monitor.

Report Printing Details of reports printed from the control panel.

Result Report Printing/E-mailing Details of sent e-mail notifications and printouts of reports such
as the Communication Result Report and Error Report.

Scanner: TWAIN Driver Details of stored scan files that were sent using Network TWAIN
Scanning Scanner.

Fax: Sending Details of sent fax files.

Fax: LAN-Fax Sending Details of sent LAN-Fax files.


6 Fax: Storing Details of stored fax files.

Fax: Stored File Printing Details of printing of fax files waiting be sent.

Fax: Receiving Details of received fax files.

Fax: Receiving and Delivering Details of forwarding of received fax files.

Fax: Receiving and Storing Details of storage of received fax files.

Access Log Information Items

Access Log Item Content

Login Times of login and identity of logged in users.

Logout Times of logout and identity of logged out users.

HDD Format Details of hard disk formatting.

All Logs Deletion Details of deletions of all logs.

Log Setting Change Details of changes made to log settings.

Transfer Log Error Details of log transfer errors.

158
Managing Log Files

Access Log Item Content

Log Collection Item Change Details of changes to job log collection levels, access log
collection levels, and types of log collected.

Collect Encrypted Details of communications that were encrypted using utilities,


Communication Logs Web Image Monitor, or external devices.

Access Violation Details of failed access attempts.

Lockout Details of lockout activation.

Firmware: Update Details of firmware updates.

Firmware: Structure Change Details of structure changes that occurred when an SD card was
inserted or removed, or when an unsupported SD card was
inserted.

Firmware: Structure Details of checks for changes to firmware module structure made
at times such as when the machine was switched on.

Machine Data Encryption Key Details of changes made to encryption keys using the Machine
6
Change Data Encryption setting.

Firmware: Invalid Details of checks for firmware validity made at times such as
when the machine was switched on.

Date/Time Change Details of changes made to date and time settings.

File Access Privilege Change Details of changes made to access privileges for stored files.

Password Change Details of changes made to the login password.

Administrator Change Details of changes of administrator.

Address Book Change Details of changes made to address book entries.

Capture Error Details of file capture errors.

• If [Job Log Collect Level] is set to [Level 1], all job logs are collected.
• If [Access Log Collect Level] is set to [Level 1], the following information items are recorded in the
access log:
• HDD Format
• All Logs Deletion
• Log Setting Change

159
6. Managing Access to the Machine

• Log Collection Item Change


• If [Access Log Collect Level] is set to [Level 2], all access logs are collected.
• If you format the hard disk, a log recording details of the format is created, but all actual logs up to
that moment are deleted.

Attributes of Logs you Can Download


If you use Web Image Monitor to download logs, a CSV file containing the information items shown in the
following table is produced.
Note that a blank field indicates an item is not featured in a log.

Item Content

Start Date/Time Dates and times logged operations started.

End Date/Time Dates and times logged operations ended.

Log Type Details of the log type. Access logs are classified under "Access Log
6 Type". For details about the information items contained in each type
of log, see "Logs that can be Collected".

Result Result/outcome of the operation. "Complete" indicates the


operation was completed successfully; "Failed" indicates the
operation was not completed successfully. Details about failed jobs
can be found in the access log.

User Entry ID ID assigned to the entry.

User Code/User Name User code or user name of the user who performed the operation.

Log ID ID assigned to the log.

Job Log Information Items

Item Content

Source Type of the job log source. "Scan File" indicates a scan file;
"Stored File" indicates a stored file; "Received File" indicates a
stored file; "Printer" indicates a printer driver job; "Report"
indicates a printed report.

Start Date/Time Dates and times "Scan File", "Received File" and "Printer"
operations started.

160
Managing Log Files

Item Content

End Date/Time Dates and times "Scan File", "Received File" and "Report"
operations ended.

Stored File ID ID assigned to stored "Stored File" files.

Stored File Name Names of "Stored File" files.

Print File Name Name of "Printer" files.

Target Type of the job target. "Print" indicates a print file; "Store"
indicates a stored file; "Send" indicates a sent file.

Start Date/Time Dates and times "Print", "Store", and "Send" operations started.

End Date/Time Dates and times "Print", "Store", and "Send" operations ended.

Destination Name Names of "Send" destinations.

Destination Address IP address, path, e-mail address or fax number of "Send"


destinations. 6
Stored File ID ID assigned to "Store" files.

Stored File Name If the Target Type is "Store", the file name of the stored file is
recorded.

Access Log Information Items

Item Content

Access Log Type Type of access log.

Authentication Server The name of the authentication server accessed last (Windows/
LDAP Authentication only).

No. of Authentication Server The number of authentication server switches due to server failure
Switches (LDAP Authentication only).

Logout Mode Mode of logout. "Manual logout" indicates a normal logout;


"Auto logout" indicates an automatic logout.

Target User Entry ID Entry ID of the user whose data was accessed.

Target User Code/User Name User code or user name of the user whose data was accessed.
If the administrator's data was accessed, the administrator's user
name is logged.

161
6. Managing Access to the Machine

Item Content

User Lockout Policy The mode of operation access. "Lockout" indicates activation of
password lockout; "Release" indicates deactivation of password
lockout.

Lockout Release Method "Administrator" is recorded if the machine is unlocked manually.


"Lockout Release Timer" is recorded if the machine is unlocked
by the lockout release timer.

Stored File ID ID of a created or deleted file.

Stored File Name Name of a created or deleted file.

File Location Region of all file deletion. "Fax Memory" is recorded if all files
in the memory are deleted.

Protocol Destination protocol. "TCP" indicates the destination's protocol


is TCP; "UDP" indicates the destination's protocol is UDP;

6 "Unknown" indicates the destination's protocol could not be


identified.

IP Address Destination IP address.

Port No. Destination port number.

MAC Address Destination MAC (physical) address.

Module Name Firmware module name.

Parts Number Firmware module part number.

Version Firmware version.

Access Result Results of logged operations. "Complete" indicates an operation


completed successfully; "Failed" indicates an operation
completed unsuccessfully.

• p.157 "Logs that can be Collected"

162
7. Enhanced Network Security
This chapter describes how to increase security over the network using the machine's functions.

Preventing Unauthorized Access


You can limit IP addresses, disable ports and protocols, or use Web Image Monitor to specify the network
security level to prevent unauthorized access over the network and protect the Address Book, stored files,
and default settings.

Access Control

This can be specified by the network administrator using Web Image Monitor. For details, see Web Image
Monitor Help.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access control range.
For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC
addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].

7
• Using access control, you can limit access involving LPR, RCP/RSH, FTP, SSH/SFTP, Bonjour, SMB,
WSD (Device), WSD (Printer), WSD (Scanner), IPP, DIPRINT, RHPP, Web Image Monitor,
SmartDeviceMonitor for Client or DeskTopBinder. You cannot limit the monitoring of
SmartDeviceMonitor for Client. You cannot limit access involving telnet, or SmartDeviceMonitor for
Admin, when using the SNMPv1 monitoring.

1. Open a Web browser.


2. Enter " http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Access Control] under "Security".
The "Access Control" page appears.
5. To specify the IPv4 Address, enter an IP address that has access to the machine in "Access
Control Range".
To specify the IPv6 Address, enter an IP address that has access to the machine in "Range" under
"Access Control Range", or enter an IP address in "Mask" and specify the "Mask Length".

163
7. Enhanced Network Security

6. Click [OK].
Access control is set.
7. Click [Logout].

Enabling and Disabling Protocols

This can be specified by the network administrator.


Specify whether to enable or disable the function for each protocol. By making this setting, you can specify
which protocols are available and so prevent unauthorized access over the network. Network settings can
be specified on the control panel, or using Web Image Monitor, telnet, SmartDeviceMonitor for Admin or
Web SmartDeviceMonitor. For details about making settings using SmartDeviceMonitor for Admin or Web
SmartDeviceMonitor, see the Help for each application. For details about making settings using telnet, see
"Remote Maintenance by telnet ", Network and System Settings Guide. To disable SMTP on Web Image
Monitor, in E-mail settings, set the protocol to anything other than SMTP. For details, see Web Image
Monitor Help.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

Protocol Port Setting Method When Disabled


7 • Control Panel
All applications that
• Web Image Monitor operate over IPv4
• telnet cannot be used.
IPv4 - • SmartDeviceMonitor IPv4 cannot be disabled
for Admin from Web Image
Monitor when using
• Web
IPv4 transmission.
SmartDeviceMonitor

• Control Panel
• Web Image Monitor
• telnet All applications that
IPv6 - • SmartDeviceMonitor operate over IPv6
for Admin cannot be used.

• Web
SmartDeviceMonitor

• Control Panel
Encrypted transmission
IPsec - • Web Image Monitor
using IPsec is disabled.
• telnet

164
Preventing Unauthorized Access

Protocol Port Setting Method When Disabled

Functions that require


• Web Image Monitor FTP cannot be used.

• telnet You can restrict


personal information
FTP TCP:21 • SmartDeviceMonitor
from being displayed by
for Admin
making settings on the
• Web control panel using
SmartDeviceMonitor "Restrict Display of User
Information".

Functions that require


• Web Image Monitor sftp cannot be used.

• telnet You can restrict


personal information
ssh/sftp TCP:22 • SmartDeviceMonitor
from being displayed by
for Admin
making settings on the
• Web control panel using
SmartDeviceMonitor "Restrict Display of User
Information".
7
Commands using telnet
telnet TCP:23 • Web Image Monitor
are disabled.

• Control Panel
• Web Image Monitor Internet Fax or e-mail
TCP:25 notification functions
SMTP • SmartDeviceMonitor that require SMTP
(variable) for Admin reception cannot be
• Web used.
SmartDeviceMonitor

Functions that require


• Web Image Monitor HTTP cannot be used.
HTTP TCP:80
• telnet Cannot print using IPP
on port 80.

165
7. Enhanced Network Security

Protocol Port Setting Method When Disabled

Functions that require


HTTPS cannot be used.
@Remote cannot be
• Web Image Monitor used.
HTTPS TCP:443 You can also make
• telnet
settings to require SSL
transmission using the
control panel or Web
Image Monitor.

• Control Panel
• Web Image Monitor
• telnet
SMB printing functions
SMB TCP:139 • SmartDeviceMonitor cannot be used.
for Admin
• Web
SmartDeviceMonitor
7 SMB printing functions
UDP:137 via TCP/IP, as well as
NBT • telnet NetBIOS designated
UDP:138 functions on the WINS
server cannot be used.

Functions that require


• Web Image Monitor SNMPv1, v2 cannot be
used.
• telnet
Using the control panel,
SNMPv1,v2 UDP:161 • SmartDeviceMonitor
Web Image Monitor or
for Admin
telnet, you can specify
• Web that SNMPv1, v2
SmartDeviceMonitor settings are read-only,
and cannot be edited.

166
Preventing Unauthorized Access

Protocol Port Setting Method When Disabled

Functions that require


SNMPv3 cannot be
used.
• Web Image Monitor
You can also make
• telnet settings to require
SNMPv3 UDP:161 • SmartDeviceMonitor SNMPv3 encrypted
for Admin transmission and restrict
• Web the use of other
SmartDeviceMonitor transmission methods
using the control panel,
Web Image Monitor, or
telnet.

Functions that require


RSH and network
• Web Image Monitor TWAIN functions
cannot be used.
• telnet
You can restrict
RSH/RCP TCP:514 • SmartDeviceMonitor
for Admin
personal information
from being displayed by
7
• Web making settings on the
SmartDeviceMonitor control panel using
"Restrict Display of User
Information".

LPR functions cannot be


• Web Image Monitor used.

• telnet You can restrict


personal information
LPR TCP:515 • SmartDeviceMonitor
from being displayed by
for Admin
making settings on the
• Web control panel using
SmartDeviceMonitor "Restrict Display of User
Information".

167
7. Enhanced Network Security

Protocol Port Setting Method When Disabled

• Web Image Monitor


• telnet
• SmartDeviceMonitor IPP functions cannot be
IPP TCP:631
for Admin used.
• Web
SmartDeviceMonitor

TCP:1720 (H.323)
UDP:1719
(Gatekeeper) • Control Panel
TCP/UDP:5060 • Web Image Monitor IP-Fax connecting
(SIP) • SmartDeviceMonitor functions using H.323,
IP-Fax
TCP:5000 (H.245) for Admin SIP and T.38 cannot be
used.
UDP:5004, 5005 • Web
(Voice) SmartDeviceMonitor
TCP/UDP:49152 (T.
38)
7
• Web Image Monitor Device discovery using
SSDP UDP:1900 UPnP from Windows
• telnet cannot be used.

• Web Image Monitor


• telnet
• SmartDeviceMonitor Bonjour functions
Bonjour UDP:5353
for Admin cannot be used.
• Web
SmartDeviceMonitor

TCP:7443 @Remote cannot be


@Remote • telnet
TCP:7444 used.

• Web Image Monitor


• telnet
• SmartDeviceMonitor DIPRINT functions
DIPRINT TCP:9100
for Admin cannot be used.
• Web
SmartDeviceMonitor

168
Preventing Unauthorized Access

Protocol Port Setting Method When Disabled

You can attempt to


RFU TCP:10021 • telnet update firmware via
FTP.

• Control Panel
• Web Image Monitor
Cannot print with
• telnet NetWare.
NetWare (IPX/SPX) • SmartDeviceMonitor SNMP over IPX cannot
for Admin be used.
• Web
SmartDeviceMonitor

• Control Panel
Cannot print with
AppleTalk (PAP) • Web Image Monitor
AppleTalk.
• telnet

• Web Image Monitor


• telnet
TCP:53000 • SmartDeviceMonitor WSD (Device) functions 7
WSD (Device)
(variable) for Admin cannot be used.
• Web
SmartDeviceMonitor

• Web Image Monitor


• telnet
TCP:53001 • SmartDeviceMonitor WSD (Printer) functions
WSD (Printer)
(variable) for Admin cannot be used.
• Web
SmartDeviceMonitor

• Web Image Monitor


• telnet
TCP-53002 WSD (Scanner)
WSD (Scanner) • SmartDeviceMonitor functions cannot be
(variable) for Admin used.
• Web
SmartDeviceMonitor

169
7. Enhanced Network Security

Protocol Port Setting Method When Disabled

• telnet WSD (Device, Printer,


WS-Discovery UDP/TCP:3702 • Web Scanner) search
SmartDeviceMonitor function cannot be used.

• Web Image Monitor


RHPP TCP:59100 Cannot print with RHPP.
• telnet

• "Restrict Display of User Information" is one of the Extended Security features. For details about making
this setting, see "Specifying the Extended Security Functions".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.217 "Specifying the Extended Security Functions"

Enabling and Disabling Protocols Using the Control Panel


7
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.

4. Select [Network] using [ ] or [ ], and then press the [OK] key.

170
Preventing Unauthorized Access

5. Select [Effective Protocol] using [ ] or [ ], and then press the [OK] key.

6. Select the protocol you want to specify, and then press the [OK] key.

7. Select [Inactive] using [ ] or [ ], and then press the [OK] key.

8. Press the [User Tools/Counter] key.


7
Enabling and Disabling Protocols Using Web Image Monitor

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Network Security] under "Security".
5. Set the desired protocols to active/inactive (or open/close).
6. Click [OK].
7. Click [OK].
8. Click [Logout].

171
7. Enhanced Network Security

• To disable SMTP from Web Image Monitor, specify a protocol other than SMTP as the mail receiving
protocol. See Web Image Monitor help for instructions to configure this setting.
• For details about how to configure telnet, see "Using telnet", Network and System Settings Guide. For
details about how to configure SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin
help. For details about how to configure Web SmartDeviceMonitor, see the Web
SmartDeviceMonitor user manual.

Specifying Network Security Level

This can be specified by the network administrator. This setting lets you change the security level to limit
unauthorized access. You can make network security level settings on the control panel, as well as Web
Image Monitor. However, the protocols that can be specified differ.
Set the security level to [Level 0], [Level 1], or [Level 2].
Select [Level 2] for maximum security to protect confidential information. Make this setting when it is
necessary to protect confidential information from outside threats.
Select [Level 1] for moderate security to protect important information. Use this setting if the machine is
connected to the office local area network (LAN).
7 Select [Level 0] for easy use of all the features. Use this setting when you have no information that needs
to be protected from outside threats.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Specifying Network Security Level Using the Control Panel

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

172
Preventing Unauthorized Access

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Network Security Level] using [ ] or [ ], and then press the [OK] key.

5. Select the network security level using [ ] or [ ], and then press the [OK] key.

Select [Level 0], [Level 1], or [Level 2].


6. Press the [User Tools/Counter] key. 7
Specifying Network Security Level Using Web Image Monitor

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Network Security] under "Security".
5. Select the network security level in "Security Level".
6. Click [OK].
7. Click [OK].
8. Click [Logout].

173
7. Enhanced Network Security

Status of Functions Under Each Network Security Level


Tab Name:TCP/IP

Function Level 0 Level 1 Level 2

TCP/IP Active Active Active

HTTP> Port 80 Open Open Open

IPP> Port 80 Open Open Open

IPP> Port 631 Open Open Close

SSL/TLS> Port 443 Open Open Open

SSL/TLS> Permit SSL/TLS Communication Ciphertext Ciphertext


Ciphertext Only
Priority Priority

SSL/TLS> Certificate Status None None None

DIPRINT Active Active Inactive

LPR Active Active Inactive


7 FTP Active Active Active

sftp Active Active Active

ssh Active Active Active

RSH/RCP Active Active Inactive

TELNET Active Inactive Inactive

Bonjour Active Active Inactive

SSDP Active Active Inactive

SMB Active Active Inactive

NetBIOS over TCP/IPv4 Active Active Inactive

WSD (Device) Active Active Inactive

WSD (Printer) Active Active Inactive

WSD (Scanner) Active Active Inactive

RHPP Active Active Inactive

174
Preventing Unauthorized Access

Tab Name:NetWare

Function Level 0 Level 1 Level 2

NetWare Active Active Inactive

Tab Name:AppleTalk

Function Level 0 Level 1 Level 2

AppleTalk Active Active Inactive

Tab Name:SNMP

Function Level 0 Level 1 Level 2

SNMP Active Active Active

Permit Settings by SNMPv1 and v2 On Off Off

SNMPv1 / v2 Function Active Active Inactive

SNMPv3 Function Active Active Active


7
Encryption / Encryption / Encryption
Permit SNMPv3 Communication
Cleartext Cleartext Only

175
7. Enhanced Network Security

Encrypting Transmitted Passwords


Prevent login passwords, group passwords for PDF files, and IPP authentication passwords from being
revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user authentication.
Driver Encryption Key
Encrypt the password transmitted when specifying user authentication.
To encrypt the login password, specify the driver encryption key on the machine and on the printer
driver installed in the user's computer.
Group Passwords for PDF Files
DeskTopBinder Lite's PDF Direct Print function allows a PDF group password to be specified to enhance
security.
To use PDF direct print, the optional PostScript 3 Unit must be installed.
Password for IPP Authentication
To encrypt the IPP Authentication password on Web Image Monitor, set "Authentication" to [DIGEST],
and then specify the IPP Authentication password set on the machine.
You can use telnet or FTP to manage passwords for IPP authentication, although it is not recommended.
7
Specifying a Driver Encryption Key

This can be specified by the network administrator.


Specify the driver encryption key on the machine.
By making this setting, you can encrypt login passwords for transmission to prevent them from being
analyzed.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

176
Encrypting Transmitted Passwords

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.

5. Select [Driver Encryption Key] using [ ] or [ ], and then press the [OK] key.

"Driver Encryption Key" is one of the extended security functions. For details about this and other
security functions, see "Specifying the Extended Security Functions". 7
6. Enter the driver encryption key, and then press the [OK] key.

Enter the driver encryption key using up to 32 alphanumeric characters.


The network administrator must give users the driver encryption key specified on the machine so they
can register it on their computers. Make sure to enter the same driver encryption key as that is specified
on the machine.
7. Re-enter the encryption key, and then press the [OK] key.

8. Press the [User Tools/Counter] key.


For details about specifying the encryption key on the printer driver, see the printer driver Help.
For details about specifying the encryption key on the TWAIN driver, see the TWAIN driver Help.

177
7. Enhanced Network Security

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.217 "Specifying the Extended Security Functions"

Specifying a Group Password for PDF Files

This can be specified by the machine administrator.


On the machine, specify the group password for PDF files.
By using a PDF group password, you can enhance security and so protect passwords from being analyzed.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [Printer Features] using [ ] or [ ], and then press the [OK] key.

7
3. Select [PDF Menu] using [ ] or [ ], and then press the [OK] key.

4. Select [PDF Group Password] using [ ] or [ ], and then press the [OK] key.

5. Enter the new PDF Group password, and then press the [OK] key.

178
Encrypting Transmitted Passwords

6. Re-enter the PDF Group password, and then press the [OK] key.

7. Press the [Escape] key two times.


8. Press the [User Tools/Counter] key.

• The machine administrator must give users the group password for PDF files that are already registered
on the machine. The users can then register it in DeskTopBinder on their computers. For details, see
DeskTopBinder Help.
• Be sure to enter the same character string as that specified on the machine for the group password
for PDF files.
• The group password for PDF files can also be specified using Web Image Monitor. For details, see
Web Image Monitor Help.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication" 7

Specifying an IPP Authentication Password

This can be specified by the network administrator.


Specify the IPP authentication passwords for the machine using Web Image Monitor.
By making this setting, you can encrypt IPP authentication passwords for transmission to prevent them from
being analyzed.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on. Enter the login user name and login password.
4. Click [Configuration] under "Security", and then click [IPP Authentication].
The "IPP Authentication" page appears.

179
7. Enhanced Network Security

5. Select [DIGEST] from the "Authentication" list.


6. Enter the user name in the "User Name" box.
7. Enter the password in the "Password" box.
8. Click [OK].
IPP authentication is specified.
9. Click [Logout].

• When using the IPP port under Windows XP or Windows Server 2003/Windows Server 2003 R2,
you can use the operating system's standard IPP port.

180
Protection Using Encryption

Protection Using Encryption


Establish encrypted transmission on this machine using SSL, SNMPv3, and IPsec. By encrypting transmitted
data and safeguarding the transmission route, you can prevent sent data from being intercepted, analyzed,
and tampered with.

SSL (Secure Sockets Layer) Encryption

This can be specified by the network administrator.


To protect the communication path and establish encrypted communication, create and install the device
certificate.
There are two ways of installing a device certificate: create and install a self-signed certificate using the
machine, or request a certificate from a certificate authority and install it.

SSL (Secure Sockets Layer)

BBC003S

1. To access the machine from a user's computer, request the SSL device certificate and public key.

181
7. Enhanced Network Security

2. The device certificate and public key are sent from the machine to the user's computer.
3. Create a shared key from the user's computer, and then encrypt it using the public key.
4. The encrypted shared key is sent to the machine.
5. The encrypted shared key is decrypted in the machine using the private key.
6. Transmit the encrypted data using the shared key, and the data is then decrypted at the machine to
attain secure transmission.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate
Install the device certificate using Web Image Monitor.
2. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Creating the device certificate
Create the device certificate using Web Image Monitor.
The application procedure after creating the certificate depends on the certificate authority.
Follow the procedure specified by the certificate authority.
2. Installing the device certificate
7 Install the device certificate using Web Image Monitor.
3. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.

• To confirm whether SSL configuration is enabled, enter "https://(the machine's IP address or host
name)/" in your Web browser's address bar to access this machine. If the "The page cannot be
displayed" message appears, check the configuration because the current SSL configuration is invalid.
• If you enable SSL for IPP (printer functions), sent data is encrypted, preventing it from being intercepted,
analyzed, or tampered with.

Creating and Installing the Self-Signed Certificate


Create and install the device certificate using Web Image Monitor. For details about the displayed items
and selectable items, see Web Image Monitor Help.
This section explains the use of a self-signed certificate as the device certificate.

1. Open a Web browser.

182
Protection Using Encryption

2. Enter "http://(the machine's IP address or host name)/" in the address bar.


When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
5. Check the radio button next to the number of the certificate you want to create.
6. Click [Create].
7. Make the necessary settings.
8. Click [OK].
The setting is changed.
9. Click [OK].
A security warning dialog box appears.
10. Check the details, and then click [OK].
"Installed" appears under "Certificate Status" to show that a device certificate for the machine has
been installed.
7
11. Click [Logout].

• Click [Delete] to delete the device certificate from the machine.

Creating the Device Certificate (Issued by a Certificate Authority)


Create the device certificate using Web Image Monitor. For details about the displayed items and
selectable items, see Web Image Monitor Help.
This section explains the use of a certificate issued by a certificate authority as the device certificate.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.

183
7. Enhanced Network Security

4. Click [Configuration], and then click [Device Certificate] under "Security".


The "Device Certificate" page appears.
5. Check the radio button next to the number of the certificate you want to request.
6. Click [Request].
7. Make the necessary settings.
8. Click [OK].
"Requesting" appears for "Certificate Status" in the "Certificates" area.
9. Click [Logout].
10. Apply to the certificate authority for the device certificate.
The application procedure depends on the certificate authority. For details, contact the certificate
authority.
For the application, click Web Image Monitor Details icon and use the information that appears in
"Certificate Details".

• The issuing location may not be displayed if you request two certificates at the same time. When you
install a certificate, be sure to check the certificate destination and installation procedure.
• Using Web Image Monitor, you can create the contents of the device certificate but you cannot send
7 the certificate application.
• Click [Cancel Request] to cancel the request for the device certificate.

Installing the Device Certificate (Issued by a Certificate Authority)


Install the device certificate using Web Image Monitor. For details about the displayed items and selectable
items, see Web Image Monitor Help.
This section explains the use of a certificate issued by a certificate authority as the device certificate.
Enter the device certificate contents issued by the certificate authority.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.

184
Protection Using Encryption

4. Click [Configuration], and then click [Device Certificate] under "Security".


The "Device Certificate" page appears.
5. Check the radio button next to the number of the certificate you want to install.
6. Click [Install].
7. Enter the contents of the device certificate.
In the "Certificate Request" box, enter the contents of the device certificate received from the certificate
authority.
8. Click [OK].
"Installed" appears under "Certificate Status" to show that a device certificate for the machine has
been installed.
9. Click [Logout].

Enabling SSL
After installing the device certificate in the machine, enable the SSL setting.
This procedure is used for a self-signed certificate or a certificate issued by a certificate authority.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar. 7
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [SSL/TLS] under "Security".
The "SSL/TLS" page appears.
5. Click [Active] for the protocol version used in "SSL/TLS".
6. Select the encryption communication mode for "Permit SSL/TLS Communication".
7. Click [OK].
The SSL setting is enabled.
8. Click [OK].
9. Click [Logout].

• If you set "Permit SSL/TLS Communication" to [Ciphertext Only], enter " https://(the machine's IP
address or host name)/" to access the machine.

185
7. Enhanced Network Security

User Settings for SSL (Secure Sockets Layer)

If you have installed a device certificate using a self-signed certificate and enabled Secure Sockets Layer
(SSL), a warning message appears whenever you access the machine using Web Image Monitor or IPP.
To stop this message appearing, install the certificate using the procedure for your particular browser. If
you are the network administrator, tell your users they must install the certificate to stop the warning message
appearing.

• Take the appropriate steps when you receive a user's inquiry concerning problems such as an expired
certificate.
• For details about how to install the certificate and about where to store the certificate when accessing
the machine using IPP, see Web Image Monitor Help.
• If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store
location with the certificate authority.

Setting the SSL/TLS Encryption Mode

By specifying the SSL/TLS encrypted communication mode, you can change the security level.
7 Encrypted Communication Mode
Using the encrypted communication mode, you can specify encrypted communication.

Allows encrypted communication only.


Ciphertext Only If encryption is not possible, the machine does
not communicate.

Performs encrypted communication if encryption


is possible.
Ciphertext Priority
If encryption is not possible, the machine
communicates without it.

Communicates with or without encryption,


Ciphertext/Cleartext
according to the setting.

Specifying the SSL/TLS Encryption Mode


This can be specified by the network administrator.
After installing the device certificate, specify the SSL/TLS encrypted communication mode. By making this
setting, you can change the security level.

186
Protection Using Encryption

For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.

4. Select [Network] using [ ] or [ ], and then press the [OK] key.

7
5. Select [Permit SSL/TLS Comm.] using [ ] or [ ], and then press the [OK] key.

6. Select the encrypted communication mode using [ ] or [ ], and then press the [OK] key.

Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext/Cleartext] as the encrypted


communication mode.
7. Press the [User Tools/Counter] key.

187
7. Enhanced Network Security

• The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For
details, see Web Image Monitor Help.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

SNMPv3 Encryption

This can be specified by the network administrator.


When using SmartDeviceMonitor for Admin or another application to make various settings, you can
encrypt the data transmitted.
By making this setting, you can protect data from being tampered with.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
7

3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.

4. Select [Network] using [ ] or [ ], and then press the [OK] key.

188
Protection Using Encryption

5. Select [Permit SNMPv3 Communictn.] using [ ] or [ ], and then press the [OK] key.

6. Select [Encryption Only] using [ ] or [ ], and then press the [OK] key.

7. Press the [User Tools/Counter] key.

• To use SmartDeviceMonitor for Admin for encrypting the data for specifying settings, you need to
specify the network administrator's [Encryption Password] setting and [Encryption Key] in [SNMP
Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit
SNMPv3 Communictn.] on the machine. For details about specifying [Encryption Key] in
SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin Help.
• If network administrator's [Encryption Password] setting is not specified, the data for transmission may 7
not be encrypted or sent. For details about specifying the network administrator's [Encryption
Password] setting, see "Registering the Administrator".

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"
• p.27 "Registering the Administrator"

189
7. Enhanced Network Security

Transmission Using IPsec


This can be specified by the network administrator.
For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP
protocol level using the shared key encryption method, where both the sender and receiver retain the same
key. This machine has two methods that you can use to specify the shared encryption key for both parties:
encryption key auto exchange and encryption key manual settings. Using the auto exchange setting, you
can renew the shared key exchange settings within a specified validity period, and achieve higher
transmission security.

• When "Inactive" is specified for "Exclude HTTPS Communication", access to Web Image Monitor can
be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to
exclude HTTPS Communication by selecting "Active". When you want to include HTTPS transmission,
we recommend that you select "Inactive" for "Exclude HTTPS Communication" after confirming that
IPsec is properly configured. When "Active" is selected for "Exclude HTTPS Communication", even
though HTTPS transmission is not targeted by IPsec, Web Image Monitor might become unusable
when TCP is targeted by IPsec from the computer side. If you cannot access Web Image Monitor due
to IPsec configuration problems, disable IPsec in System Settings on the control panel, and then access
Web Image Monitor. For details about enabling and disabling IPsec using the control panel, see
7 "System Settings", Network and System Settings Guide.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later,
RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.

Encryption and Authentication by IPsec

IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and
the authentication function, which verifies the sender of the data and the data's integrity. This machine's
IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions
at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.

190
Transmission Using IPsec

• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol + ESP Protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption and
authentication. These protocols provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.

7
• Some operating systems use the term "Compliance" in place of "Authentication".

Encryption Key Auto Exchange Settings and Encryption Key Manual Settings

This machine provides two key setting methods: manual and auto exchange. Using either of these methods,
agreements such as the IPsec algorithm and key must be specified for both sender and receiver. Such
agreements form what is known as an SA (Security Association). IPsec communication is possible only if
the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured on
both parties' machines. However, before setting the IPsec SA, the ISAKMP SA (Phase 1) settings are auto
configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are auto
configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time limit)
for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by both
parties. To preserve the security of your SA settings, we recommend that they are not exchanged over a
network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.

191
7. Enhanced Network Security

Settings 1-4 and Default Setting


Using either the manual or auto exchange method, you can configure four separate sets of SA details
(such as different shared keys and IPsec algorithms). In the default settings of these sets, you can
include settings that the fields of sets 1 to 4 cannot contain.
When IPsec is enabled, set 1 has the highest priority and 4 has the lowest. You can use this priority
system to target IP addresses more securely. For example, set the broadest IP range at the lowest
priority (4), and then set specific IP addresses at a higher priority level (3 and higher). This way, when
IPsec transmission is enabled for a specific IP address, the higher level security settings will be applied.

IPsec Settings

IPsec settings for this machine can be made on Web Image Monitor. The following table explains individual
setting items.
Encryption Key Auto Exchange / Manual Settings - Shared Settings

Setting Description Setting Value

Specify whether to enable or • Active


IPsec
disable IPsec. • Inactive
7 • Active
• Inactive
Exclude HTTPS Specify whether to enable
Communication IPsec for HTTPS transmission. Specify "Active" if you do not
want to use IPsec for HTTPS
transmission.

• Active
Specify whether to enable
• Inactive
Encryption Key Manual Encryption Key Manual
Settings Settings, or use Encryption Key Specify "Active" if you want to
Auto Exchange Settings only. use "Encryption Key Manual
Exchange Settings".

Encryption Key Auto Exchange Security Level


When you select a security level, certain security settings are automatically configured. The following
table explains security level features.

192
Transmission Using IPsec

Security Level Security Level Features

Select this level if you want to authenticate the transmission partner


and prevent unauthorized data tampering, but not perform data
packet encryption.
Authentication Only
Since the data is sent in cleartext, data packets are vulnerable to
eavesdropping attacks. Do not select this if you are exchanging
sensitive information.

Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and Low Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides less security than
"Authentication and High Level Encryption".

Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and High Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides higher security than
"Authentication and Low Level Encryption".

The following table lists the settings that are automatically configured according to the security level. 7
Authentication and Low Authentication and High
Setting Authentication Only
Level Encryption Level Encryption

Security Policy Apply Apply Apply

Encapsulation
Transport Transport Transport
Mode

IPsec Requirement
Use When Possible Use When Possible Always Require
Level

Authentication
PSK PSK PSK
Method

Phase 1 Hash
MD5 SHA1 SHA1
Algorithm

Phase 1 Encryption
DES 3DES 3DES
Algorithm

Phase 1 Diffie-
2 2 2
Hellman Group

193
7. Enhanced Network Security

Authentication and Low Authentication and High


Setting Authentication Only
Level Encryption Level Encryption

Phase 2 Security
AH ESP ESP
Protocol

Phase 2
HMAC-MD5-96/ HMAC-MD5-96/
Authentication HMAC-SHA1-96
HMAC-SHA1-96 HMAC-SHA1-96
Algorithm

DES/3DES/
Phase 2 Encryption Cleartext (NULL 3DES/AES-128/
AES-128/AES-192/
Algorithm encryption) AES-192/AES-256
AES-256

Phase 2 PFS Inactive Inactive 2

Encryption Key Auto Exchange Setting Items


When you specify a security level, the corresponding security settings are automatically configured,
but other settings, such as address type, local address, and remote address must still be configured
manually.
After you specify a security level, you can still make changes to the auto configured settings. When
7 you change an auto configured setting, the security level switches automatically to "User Setting".

Setting Description Setting Value

• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)

The machine's IPv4 or IPv6


Specify the machine's address. address.
If you are using multiple If you are not setting an address
Local Address
addresses in IPv6, you can also range, enter 32 after an IPv4
specify an address range. address, or enter 128 after an
IPv6 address.

194
Transmission Using IPsec

Setting Description Setting Value

The IPsec transmission partner's


IPv4 or IPv6 address.
Specify the address of the IPsec
Remote Address transmission partner. You can If you are not setting an address
also specify an address range. range, enter 32 after an IPv4
address, or enter 128 after an
IPv6 address.

• apply
Security Policy Specify how IPsec is handled. • bypass
• discarded

• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
Specify the encapsulation
If you specify "Tunnel", you
Encapsulation Mode mode.
must then specify the "Tunnel
(auto setting) End Points", which are the
beginning and ending IP 7
addresses. Set the same
address for the beginning point
as you set in "Local Address".

Specify whether to only


transmit using IPsec, or to allow
• Use When Possible
IPsec Requirement Level cleartext transmission when
IPsec cannot be established. • Always Require

(auto setting)

• PSK
• Certificate

Specify the method for If you specify PSK, you must


authenticating transmission then set the PSK text (using
Authentication Method partners. ASCII characters).

(auto setting) If you specify Certificate, the


certificate for IPsec must be
installed and specified before it
can be used.

195
7. Enhanced Network Security

Setting Description Setting Value

Specify the pre-shared key for Enter the pre-shared key


PSK Text required for PSK
PSK authentication. authentication.

Specify the HASH algorithm to


Phase 1 • MD5
be used in phase 1.
HASH Algorithm • SHA1
(auto setting)

Specify the encryption


Phase 1 algorithm to be used in phase • DES
Encryption Algorithm 1. • 3DES
(auto setting)

Select the Diffie-Hellman group • 1


Phase 1 number used for IKE encryption
key generation. • 2
Diffie-Hellman Group
(auto setting) • 14

Phase 1 Specify the time period for


Set in seconds from 300 sec. (5
7 Validity Period
which the SA settings in phase
1 are valid.
min.) to 172800 sec. (48 hrs.).

Specify the security protocol to


be used in Phase 2.
To apply both encryption and • ESP
Phase 2 authentication to sent data,
specify ESP or ESP+AH. • AH
Security Protocol
To apply authentication data • ESP+AH
only, specify AH.
(auto setting)

Specify the authentication


Phase 2 algorithm to be used in phase • HMAC-MD5-96
Authentication Algorithm 2. • HMAC-SHA1-96
(auto setting)

196
Transmission Using IPsec

Setting Description Setting Value

• Cleartext (NULL
encryption)
Phase 2 Specify the encryption • DES
algorithm to be used in phase
Encryption Algorithm • 3DES
2.
Permissions • AES-128
(auto setting)
• AES-192
• AES-256

Specify whether to activate • Inactive


Phase 2 PFS. Then, if PFS is activated, • 1
PFS select the Diffie-Hellman group. • 2
(auto setting) • 14

Phase 2 Specify the time period for Specify a period (in seconds)
which the SA settings in phase from 300 (5min.) to 172800
Validity Period 2 are valid. (48 hrs.).

Encryption Key Manual Settings Items 7


Setting Description Setting Value

• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)

The machine's IPv4 or IPv6


Specify the machine's address. address.
If you are using multiple IPv6 If you are not setting an address
Local Address
addresses, you can also range, enter 32 after an IPv4
specify an address range. address, or enter 128 after an
IPv6 address.

197
7. Enhanced Network Security

Setting Description Setting Value

The IPsec transmission partner's


IPv4 or IPv6 address.
Specify the address of the IPsec
Remote Address transmission partner. You can If you are not setting an address
also specify an address range. range, enter 32 after an IPv4
address, or enter 128 after an
IPv6 address.

• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
If you select "Tunnel", set the
Encapsulation Mode Select the encapsulation mode.
"Tunnel End Point", the
beginning and ending IP
addresses. In "Tunnel End
Point", set the same address for
the beginning point as you set
in "Local Address".
7 Specify the same value as your
Any number between 256 and
SPI (Output) transmission partner's SPI input
4095
value.

Specify the same value as your


Any number between 256 and
SPI (Input) transmission partner's SPI
4095
output value.

To apply both encryption and


authentication to sent data, • ESP
Security Protocol specify ESP or AH + ESP. • AH
To apply authentication data • ESP + AH
only, specify AH.

Specify the authentication • HMAC-MD5-96


Authentication Algorithm
algorithm. • HMAC-SHA1-96

198
Transmission Using IPsec

Setting Description Setting Value

Specify a value within the


ranges shown below,
according to the encryption
algorithm.
Hexadecimal value
0-9, a-f, A-F
• If HMAC-MD5-96, set
Specify the key for the 32 digits
Authentication Key
authentication algorithm.
• If HMAC-SHA1-96, set
40 digits
ASCII
• IF HMAC-MD5-96, set
16 characters
• If HMAC-SHA1-96, set
20 characters

• Cleartext (NULL
encryption) 7
• DES
Specify the encryption • 3DES
Encryption Algorithm
algorithm.
• AES-128
• AES-192
• AES-256

199
7. Enhanced Network Security

Setting Description Setting Value

Specify a value within the


ranges shown below,
according to the encryption
algorithm.
hexadecimal value
0-9, a-f, A-F
• DES, set 16 digits
• 3DES, set 48 digits
• AES-128, set 32 digits
Specify the key for the • AES-192, set 48 digits
Encryption Key
encryption algorithm. • AES-256, set 64 digits
ASCII
• DES, set 8 characters
• 3DES, set 24 characters
• AES-128, set 16

7 characters
• AES-192, set 24
characters
• AES-256, set 32
characters

Encryption Key Auto Exchange Settings Configuration Flow

This section explains the procedure for specifying Encryption Key Auto Exchange Settings. This can be
specified by the network administrator.

200
Transmission Using IPsec

BBD004S

• To use a certificate to authenticate the transmission partner in encryption key auto exchange settings,
a device certificate must be installed. 7
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission on the
computer side. Also, because the response is slow during initial key exchange, it may take some time
to confirm that transmission has been established.

Specifying Encryption Key Auto Exchange Settings


This can be specified using Web Image Monitor.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [IPsec] under "Security".
The IPsec settings page appears.

201
7. Enhanced Network Security

5. Click [Edit] under "Encryption Key Auto Exchange Settings".


6. Make encryption key auto exchange settings in [Settings 1].
If you want to make multiple settings, select the settings number and add settings.
7. Click [OK].
8. Select [Active] for "IPsec".
9. Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS
transmission.
10. Click [OK].
11. Click [Logout].

• To change the transmission partner authentication method for encryption key auto exchange settings
to "Certificate", you must first install and assign a certificate. For details about creating and installing
a device certificate, see "Using S/MIME to Protect E-mail Transmission".

• p.110 "Using S/MIME to Protect E-mail Transmission"

7 Selecting the Certificate for IPsec


This can be specified by the network administrator.
Using Web Image Monitor, select the certificate to be used for IPsec. You must install the certificate before
it can be used.

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [Device Certificate] under "Security".
The [Device Certificate] settings page appears.
5. Select the certificate to be used for IPsec from the drop down box in "IPsec" under
"Certificate".
6. Click [OK].
The certificate for IPsec is specified.

202
Transmission Using IPsec

7. Click [OK].
8. Click [Logout].

Specifying IPsec Settings on the Computer


Specify exactly the same settings for IPsec SA settings on your computer as are specified by the machine's
security level on the machine. Setting methods differ according to the computer's operating system. The
example procedure shown here uses Windows XP when the Authentication and Low Level Encryption
Security level is selected.

1. On the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then
click [Administrative Tools].
2. Click [Local Security Policy].
3. Click [IP Security Policies on Local Computer].
4. In the "Action" menu, click [Create IP Security Policy].
The IP Security Policy Wizard appears.
5. Click [Next].
6. Enter a security policy name in "Name", and then click [Next].
7. Clear the "Activate the default response rule" check box, and then click [Next].
8. Select "Edit properties", and then click [Finish].
7
9. In the "General" tab, click [Advanced].
10. In "Authenticate and generate a new key after every" enter the same validity period (in
minutes) that is specified on the machine in Encryption Key Auto Exchange Settings Phase
1, and then click [Methods].
11. Confirm that the combination of hash algorithm (on Windows XP, "Integrity"), the encryption
algorithm (on Windows XP, "Encryption"), and the Diffie-Hellman group settings in "Security
method preference order" match the settings specified on the machine in Encryption Key
Auto Exchange Settings Phase 1.
12. If the settings are not displayed, click [Add].
13. Click [OK] twice.
14. Click [Add] in the "Rules" Tab.
The Security Rule Wizard appears.
15. Click [Next].
16. Select "This rule does not specify a tunnel", and then click [Next].
17. Select the type of network for IPsec, and then click [Next].
18. Select the "initial authentication method", and then click [Next].

203
7. Enhanced Network Security

19. If you select "Certificate" for authentication method in Encryption Key Auto Exchange
Settings on the machine, specify the device certificate. If you select PSK, enter the same PSK
text specified on the machine with the pre-shared key.
20. Click [Add] in the IP Filter List.
21. In [Name], enter an IP Filter name, and then click [Add].
The IP Filter Wizard appears.
22. Click [Next].
23. Select "My Address" in "Source Address", and then click [Next].
24. Select "A specific IP address" in "Destination Address", enter the machine's IP address, and
then click [Next].
25. Select the protocol type for IPsec, and then click [Next].
26. Click [Finish].
27. Click [OK].
28. Select the IP filter that was just created, and then click [Next].
29. Select the IPsec security filter, and then click [Edit].
30. Click [Add], select the "Custom" check box, and then click [Settings].
31. In "Integrity algorithm", select the authentication algorithm that was specified on the
7 machine in Encryption Key Auto Exchange Settings Phase 2.
32. In "Encryption algorithm", select the encryption algorithm that specified on the machine in
Encryption Key Auto Exchange Settings Phase 2.
33. In Session Key settings, select "Generate a new key every", and enter the validity period
(in seconds) that was specified on the machine in Encryption Key Auto Exchange Settings
Phase 2.
34. Click [OK] three times.
35. Click [Next].
36. Click [Finish].
37. Click [OK].
38. Click [Close].
The new IP security policy (IPsec settings) is specified.
39. Select the security policy that was just created, right click, and then click [Assign].
IPsec settings on the computer are enabled.

• To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-
assign].

204
Transmission Using IPsec

• If you specify the "Authentication and High Level Encryption" security level in encryption key auto
exchange settings, also select the "Master key perfect forward secrecy (PFS)" check box in the Security
Filter Properties screen (which appears in step 29). If using PFS in Windows XP, the PFS group number
used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in
step 11). Consequently, if you change the security level specified automatic settings on the machine
and "User Setting" appears, you must set the same the group number for "Phase 1 Diffie-Hellman
Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.

Encryption Key Manual Settings Configuration Flow

This section explains the procedure for specifying encryption key manual settings. This can be specified by
the network administrator.

BBD003S

• Before transmission, SA information is shared and specified by the sender and receiver. To prevent
SA information leakage, we recommend that this exchange is not performed over the network.
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission. Also,
because the response is slow during initial key exchange, it may take some time to confirm that
transmission has been established.

Specifying Encryption Key Manual Settings


This can be specified using Web Image Monitor.

205
7. Enhanced Network Security

1. Open a Web browser.


2. Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The network administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [IPsec] under "Security".
The IPsec settings page appears.
5. Select [Active] for "Encryption Key Manual Settings".
6. Click [Edit] under "Encryption Key Manual Settings".
7. Set items for encryption key manual settings in [Settings 1].
If you want to make multiple settings, select the settings number and add settings.
8. Click [OK].
9. Select [Active] for " IPsec" in "IPsec".

7 10. Set "Exclude HTTPS Communication" to [Active] if you do not want to use IPsec for HTTPS
communication.
11. Click [OK].
12. Click [Logout].

telnet Setting Commands

You can use telnet to confirm IPsec settings and make setting changes. This section explains telnet commands
for IPsec. To log on as an administrator using telnet, the default login user name is "admin", and the password
is blank. For details about logging on to telnet and telnet operations, see "Using telnet", Network and
System Settings Guide.

• If you are using a certificate as the authentication method in encryption key auto exchange settings
(IKE), install the certificate using Web Image Monitor. A certificate cannot be installed using telnet.

ipsec
To display IPsec related settings information, use the "ipsec" command.

206
Transmission Using IPsec

Display current settings


msh> ipsec
Displays the following IPsec settings information:
• IPsec shared settings values
• Encryption key manual settings, SA setting 1-4 values
• Encryption key manual settings, default setting values
• Encryption key auto exchange settings, IKE setting 1-4 values
• Encryption key auto exchange settings, IKE default setting values
Display current settings portions
msh> ipsec -p
• Displays IPsec settings information in portions.

ipsec manual mode


To display or specify encryption key manual settings, use the "ipsec manual_mode" command.
Display current settings
msh> ipsec manual_mode
• Displays the current encryption key manual settings. 7
Specify encryption key manual settings
msh> ipsec manual_mode {on|off}
• To enable encryption key manual settings, set to [on]. To disable settings, set to [off].

ipsec exclude
To display or specify protocols excluded by IPsec, use the "ipsec exclude" command.
Display current settings
msh> ipsec exclude
• Displays the protocols currently excluded from IPsec transmission.
Specify protocols to exclude
msh> ipsec exclude {https|dns|dhcp|wins|all} {on|off}
• Specify the protocol, and then enter [on] to exclude it, or [off] to include it for IPsec transmission.
Entering [all] specifies all protocols collectively.

ipsec manual
To display or specify the encryption key manual settings, use the "ipsec manual" command.

207
7. Enhanced Network Security

Display current settings


msh> ipsec manual {1|2|3|4|default}
• To display the settings 1-4, specify the number [1-4].
• To display the default setting, specify [default].
• Not specifying any value displays all of the settings.
Disable settings
msh> ipsec manual {1|2|3|4|default} disable
• To disable the settings 1-4, specify the setting number [1-4].
• To disable the default settings, specify [default].
Specify the local/remote address for settings 1-4
msh> ipsec manual {1|2|3|4} {ipv4|ipv6} local address remote address
• Enter the separate setting number [1-4] or [default] and specify the local address and remote
address.
• To specify the local or remote address value, specify masklen by entering [/] and an integer
0-32 if you are specifying an IPv4 address. If you are specifying an IPv6 address, specify masklen
by entering [/] and an integer 0-128.
• Not specifying an address value displays the current setting.
7 Specify the address type in default setting
msh> ipsec manual default {ipv4|ipv6|any}
• Specify the address type for the default setting.
• To specify both IPv4 and IPv6, enter [any].
Security protocol setting
msh> ipsec manual {1|2|3|4|default} proto {ah|esp|dual}
• Enter the separate setting number [1-4] or [default] and specify the security protocol.
• To specify AH, enter [ah]. To specify ESP, enter [esp]. To specify AH and ESP, enter [dual].
• Not specifying a protocol displays the current setting.
SPI value setting
msh> ipsec manual {1|2|3|4|default} spi SPI input value SPI output value
• Enter the separate setting number [1-4] or [default] and specify the SPI input and output values.
• Specify a decimal number between 256-4095, for both the SPI input and output values.
Encapsulation mode setting
msh> ipsec manual {1|2|3|4|default} mode {transport|tunnel}
• Enter the separate setting number [1-4] or [default] and specify the encapsulation mode.
• To specify transport mode, enter [transport]. To specify tunnel mode, enter [tunnel].

208
Transmission Using IPsec

• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
Tunnel end point setting
msh> ipsec manual {1|2|3|4|default} tunneladdar beginning IP address ending IP
address
• Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning
and ending IP address.
• Not specifying either the beginning or ending address displays the current settings.
Authentication algorithm and authentication key settings
msh> ipsec manual {1|2|3|4|default} auth {hmac-md5|hmac-sha1} authentication key
• Enter the separate setting number [1-4] or [default] and specify the authentication algorithm,
and then set the authentication key.
• If you are setting a hexadecimal number, attach 0x at the beginning.
• If you are setting an ASCII character string, enter it as is.
• Not specifying either the authentication algorithm or key displays the current setting. (The
authentication key is not displayed.)
Encryption algorithm and encryption key setting 7
msh> ipsec manual {1|2|3|4|default} encrypt {null|des|3des|aes128|aes192|aes256}
encryption key
• Enter the separate setting number [1-4] or [default], specify the encryption algorithm, and then
set the encryption key.
• If you are setting a hexadecimal number, attach 0x at the beginning. If you have set the encryption
algorithm to [null], enter an encryption key of arbitrary numbers 2-64 digits long.
• If you are setting an ASCII character string, enter it as is. If you have set the encryption algorithm
to [null], enter an encryption key of arbitrary numbers 1-32 digits long.
• Not specifying an encryption algorithm or key displays the current setting. (The encryption key
is not displayed.)
Reset setting values
msh> ipsec manual {1|2|3|4|default|all} clear
• Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying
[all] resets all of the settings, including default.

ipsec ike
To display or specify the encryption key auto exchange settings, use the "ipsec ike" command.

209
7. Enhanced Network Security

Display current settings


msh> ipsec ike {1|2|3|4|default}
• To display the settings 1-4, specify the number [1-4].
• To display the default setting, specify [default].
• Not specifying any value displays all of the settings.
Disable settings
msh> ipsec ike {1|2|3|4|default} disable
• To disable the settings 1-4, specify the number [1-4].
• To disable the default settings, specify [default].
Specify the local/remote address for settings 1-4
msh> ipsec ike {1|2|3|4} {ipv4|ipv6} local address remote address
• Enter the separate setting number [1-4], and the address type to specify local and remote
address.
• To set the local or remote address values, specify masklen by entering [/] and an integer 0-32
when settings an IPv4 address. When setting an IPv6 address, specify masklen by entering [/]
and an integer 0-128.
• Not specifying an address value displays the current setting.
7 Specify the address type in default setting
msh> ipsec ike default {ipv4|ipv6|any}
• Specify the address type for the default setting.
• To specify both ipv4 and ipv6, enter [any].
Security policy setting
msh> ipsec ike {1|2|3|4|default} proc {apply|bypass|discard}
• Enter the separate setting number [1-4] or [default] and specify the security policy for the address
specified in the selected setting.
• To apply IPsec to the relevant packets, specify [apply]. To not apply IPsec, specify [bypass].
• If you specify [discard], any packets that IPsec can be applied to are discarded.
• Not specifying a security policy displays the current setting.
Security protocol setting
msh> ipsec ike {1|2|3|4|default} proto {ah|esp|dual}
• Enter the separate setting number [1-4] or [default] and specify the security protocol.
• To specify AH, enter [ah]. To specify ESP, enter [esp]. To specify AH and ESP, enter [dual].
• Not specifying a protocol displays the current setting.

210
Transmission Using IPsec

IPsec requirement level setting


msh> ipsec ike {1|2|3|4|default} level {require|use}
• Enter the separate setting number [1-4] or [default] and specify the IPsec requirement level.
• If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify
[use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec
transmission is performed.
• Not specifying a requirement level displays the current setting.
Encapsulation mode setting
msh> ipsec ike {1|2|3|4|default} mode {transport|tunnel}
• Enter the separate setting number [1-4] or [default] and specify the encapsulation mode.
• To specify transport mode, enter [transport]. To specify tunnel mode, enter [tunnel].
• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
Tunnel end point setting
msh> ipsec ike {1|2|3|4|default} tunneladdar beginning IP address ending IP
address
• Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning 7
and ending IP address.
• Not specifying either the beginning or ending address displays the current setting.
IKE partner authentication method setting
msh> ipsec ike {1|2|3|4|default} auth {psk|rsasig}
• Enter the separate setting number [1-4] or [default] and specify the authentication method.
• Specify [psk] to use a shared key as the authentication method. Specify [rsasig] to use a certificate
at the authentication method.
• You must also specify the PSK character string when you select [psk].
• Note that if you select "Certificate", the certificate for IPsec must be installed and specified before
it can be used. To install and specify the certificate use Web Image Monitor.
PSK character string setting
msh> ipsec ike {1|2|3|4|default} psk PSK character string
• If you select PSK as the authentication method, enter the separate setting number [1-4] or [default]
and specify the PSK character string.
• Specify the character string in ASCII characters. There can be no abbreviations.
ISAKMP SA (phase 1) hash algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 hash {md5|sha1}

211
7. Enhanced Network Security

• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) hash
algorithm.
• To use MD5, enter [md5]. To use SHA1, enter [sha1].
• Not specifying the hash algorithm displays the current setting.
ISAKMP SA (phase 1) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
encryption algorithm.
• To use DES, enter [des]. To use 3DES, enter [3des].
• Not specifying an encryption algorithm displays the current setting.
ISAKMP SA (phase 1) Diffie-Hellman group setting
msh> ipsec ike {1|2|3|4|default} ph1 dhgroup {1|2|14}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) Diffie-
Hellman group number.
• Specify the group number to be used.
• Not specifying a group number displays the current setting.
ISAKMP SA (phase 1) validity period setting
7 msh> ipsec ike {1|2|3|4|default} ph1 lifetime validity period
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) validity
period.
• Enter the validity period (in seconds) from 300 to 172800.
• Not specifying a validity period displays the current setting.
IPsec SA (phase 2) authentication algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 auth {hmac-md5|hmac-sha1}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2)
authentication algorithm.
• Separate multiple encryption algorithm entries with a comma (,). The current setting values are
displayed in order of highest priority.
• Not specifying an authentication algorithm displays the current setting.
IPsec SA (phase 2) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 encrypt {null|des|3des|aes128|aes192|
aes256}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) encryption
algorithm.

212
Transmission Using IPsec

• Separate multiple encryption algorithm entries with a comma (,). The current setting values are
displayed in order of highest priority.
• Not specifying an encryption algorithm displays the current setting.
IPsec SA (phase 2) PFS setting
msh> ipsec ike {1|2|3|4|default} ph2 pfs {none|1|2|14}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) Diffie-
Hellman group number.
• Specify the group number to be used.
• Not specifying a group number displays the current setting.
IPsec SA (phase 2) validity period setting
msh> ipsec ike {1|2|3|4|default} ph2 lifetime validity period
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2) validity
period.
• Enter the validity period (in seconds) from 300 to 172800.
• Not specifying a validity period displays the current setting.
Reset setting values
msh> ipsec ike {1|2|3|4|default|all} clear
• Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying 7
[all] resets all of the settings, including default.

213
7. Enhanced Network Security

Authentication by telnet
This section explains Authentication by telnet. When using telnet, the default login name for administrator
login is "admin" and the password is blank. For details on how to login to telnet, see "Using telnet", Network
and System Settings Guide.

"authfree" Command

Use the "authfree" command to display and configure authentication exclusion control settings. If you use
the "authfree" command in telnet, you can exclude printer job authentication and specify an IP address
range. The authentication exclusion control display and setting methods are explained below.
View Settings
msh> authfree
If print job authentication exclusion is not specified, authentication exclusion control is not displayed.
IPv4 address settings
msh> authfree "ID" range_addr1 range_addr2
IPv6 address settings

7 msh> authfree "ID" range6_addr1 range6_addr2


IPv6 address mask settings
msh> authfree "ID" mask6_addr1 masklen
Parallel/USB settings
msh> authfree [parallel|usb] [on|off]
• To enable authfree, specify "on". To disable authfree, specify "off".
• Always specify the interface.
Authentication exclusion control initialization
msh> authfree flush

• In both IPv4 and IPv6 environments, up to five access ranges can be registered and selected.

214
Authentication by IEEE802.1X

Authentication by IEEE802.1X
IEEE802.1X enables authentication in an Ethernet or wireless LAN environment. For details, see "Using
telnet", Network and System Settings Guide.

215
7. Enhanced Network Security

216
8. Specifying the Extended Security
Functions
This chapter describes the machine's extended security features and how to specify them.

Specifying the Extended Security Functions


In addition to providing basic security through user authentication and administrator specified access limits
on the machine, security can also be increased by encrypting transmitted data and data in the Address
Book. If you need extended security, specify the machine's extended security functions before using the
machine.
This section outlines the extended security functions and how to specify them.
For details about when to use each function, see the corresponding chapters.

Changing the Extended Security Functions

To change the extended security functions, display the extended security screen as follows.
Administrators can change the extended security functions according to their role.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
This section describes how to Change the Extended Security Functions. 8
1. Press the [User Tools/Counter] key.
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

217
8. Specifying the Extended Security Functions

4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.

5. Press the setting you want to change using [ ] or [ ], and then press the [OK] key.

6. Change the setting, and then press the [OK] key.


7. Press the [User Tools/Counter] key.

• p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Extended Security Settings

8 Default settings are shown in bold type.


Driver Encryption Key
This can be specified by the network administrator. Encrypt the password transmitted when specifying
user authentication. If you register the encryption key specified with the machine in the driver,
passwords are encrypted. For details, see the printer driver Help, LAN Fax driver Help, or TWAIN
driver Help.
Encrypt Address Book
This can be specified by the user administrator. Encrypt the data in the machine's Address Book.
For details on protecting data in the Address Book, see "Protecting the Address Book".
• On
• Off
Restrict Dest. Use(Fax), Rstrct Dest. Use(Scanner)
This can be specified by the user administrator.
The available fax and scanner destinations are limited to the destinations registered in the Address
Book.
A user cannot directly enter the destinations for transmission.

218
Specifying the Extended Security Functions

If [Rstrct Dest. Use(Scanner)] is set to [On], you can register fax numbers only.
If you have selected e-mail reception via SMTP, you cannot use "Restrict Dest. Use(Fax)" and "Rstrct
Dest. Use(Scanner)".
The destinations searched by "LDAP Search" can be used.
For details about preventing unauthorized transmission, see "Preventing Information Leakage Due to
Unauthorized Transmission".
• On
• Off
Rstrct Dest. Add.(Fax), Rstrct Dest. Add.(Scanner)
This can be specified by the user administrator.
When "Restrict Dest. Use(Fax)" is set to [Off], after entering a destination directly on the fax screen,
you can register it in the Address Book by pressing [Add Dest]. When "Rstrct Dest. Use(Scanner)" is
set to [Off], after entering a destination directly on the scanner screen, you can register it in the Address
Book by pressing [Add Dest].
If [On] is selected for this setting, [Add Dest] does not appear.
If you set "Rstrct Dest. Add.(Fax)" to [On], users can specify destinations directly on the fax screen,
but cannot use [Add Dest] to register data in the Address Book. If you set "Rstrct Dest. Add.(Scanner)"
to [On], users can specify destinations directly on the scanner screen, but cannot use [Add Dest] to
register data in the Address Book. When this setting is made, only the user administrator can change
the Address Book.
• On
8
• Off
Restrict User Info.Display
This can be specified if user authentication is specified. When the job history is checked using a network
connection for which authentication is not available, all personal information can be displayed as
"********". For example, when someone not authenticated as an administrator checks the job
history using SNMP in SmartDeviceMonitor for Admin, personal information can be displayed as
"********" so that users cannot be identified. Because information identifying registered users
cannot be viewed, unauthorized users are prevented from obtaining information about the registered
files.
• On
• Off
Enhance File Protection
This can be specified by the file administrator. By specifying a password, you can limit operations
such as printing, deleting, and sending files, and can prevent unauthorized people from accessing
the files. However, it is still possible for the password to be cracked.

219
8. Specifying the Extended Security Functions

By specifying "Enhance File Protection", files are locked and so become inaccessible if an invalid
password is entered ten times. This can protect the files from unauthorized access attempts in which
a password is repeatedly guessed.
The locked files can only be unlocked by the file administrator. When "Enhance File Protection" is
specified, ( ) appears in the lower right corner of the screen.
When files are locked, you cannot select them even if the correct password is entered.
• On
• Off
Settings by SNMPv1 and v2
This can be specified by the network administrator. When the machine is accessed using the SNMPv1,
v2 protocol, authentication cannot be performed, allowing machine administrator settings such as
the paper setting to be changed. If you select [Prohibit], the setting can be viewed but not specified
with SNMPv1, v2.
• Prohibit
• Do not Prohibit
Simple Encryption
This can be specified by the network administrator. When a sophisticated encryption method cannot
be enabled, simple encryption will be applied. For example, when using User Management Tool and
Address Management in Smart Device Monitor for Admin to edit the Address Book, or
DeskTopBinder and ScanRouter delivery software and SSL/TLS cannot be enabled, make this setting
[Do not Restrict] to enable simple encryption. When SSL/TLS can be enabled, make this setting
8 [Restrict].
For details about specifying SSL/TLS, see "Setting the SSL / TSL Encryption Mode".
If you select [Restrict], specify the encryption setting using the printer driver.
• Restrict
• Do not Restrict
Transfer to Fax Receiver
This can be specified by the machine administrator.
If you use [Forwarding] under the fax function, files stored in the machine can be transferred or
delivered.
To prevent stored files being transferred by mistake, select [Prohibit] for this setting.
• Prohibit
• Do not Prohibit
If you select [Prohibit] for this setting, the following functions are disabled:
• Forwarding
• Delivery of Mail Received via SMTP

220
Specifying the Extended Security Functions

• Routing Received Documents


Remote Diagns.(Fax)
This setting is not available if [Admin. Auth. Management] and [User Auth. Management] have been
specified.
• Prohibit
• Do not prohibit
Authenticate Current Job
This can be specified by the machine administrator. This setting lets you specify whether or not
authentication is required for operations such as canceling jobs under the copier and printer functions.
If you select [Login Privilege], authorized users and the machine administrator can operate the
machine. When this is selected, authentication is not required for users who logged on to the machine
before [Login Privilege] was selected.
If you select [Access Privilege], users who canceled a copy or print job in progress and the machine
administrator can operate the machine.
Even if you select [Login Privilege] and log on to the machine, you cannot cancel a copy or print job
in progress if you are not authorized to use the copy and printer functions.
You can specify [Authenticate Current Job] only if [User Auth. Management] was specified.
• Login Privilege
• Access Privilege
• Off
Password Policy
8
This can be specified by the user administrator.
The password policy setting is effective only if [Basic Auth.] is specified.
This setting lets you specify [Complexity Setting] and [Minimum Character No.] for the password. By
making this setting, you can limit the available passwords to only those that meet the conditions
specified in [Complexity Setting] and [Minimum Character No.].
If you select [Level 1], specify the password using a combination of two types of characters selected
from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.
If you select [Level 2], specify the password using a combination of three types of characters selected
from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.
• Level 1
• Level 2
• Do not Restrict
• Minimum Character No. (0)
@Remote Service
This can be specified by the machine administrator.

221
8. Specifying the Extended Security Functions

Communication via HTTPS for @Remote Service is disabled if you select [Prohibit].
• Prohibit
• Do not Prohibit
Update Firmware
This can be specified by the machine administrator.
Specify whether to allow firmware updates on the machine. Firmware update means having the service
representative update the firmware or updating the firmware via the network.
If you select [Prohibit], firmware on the machine cannot be updated.
If you select [Do not Prohibit], there are no restrictions on firmware updates.
• Prohibit
• Do not Prohibit
Change Firmware Structure
This can be specified by the machine administrator.
Specify whether to prevent changes in the machine's firmware structure. The Change Firmware
Structure function detects when the SD card is inserted, removed or replaced.
If you select [Prohibit], the machine stops during startup when a firmware structure change is detected
and a message requesting administrator login is displayed. After the machine administrator logs in,
the machine finishes startup with the updated firmware.
The administrator can confirm if the updated structure change is permissible or not by checking the

8 firmware version displayed on the control panel screen. If the firmware structure change is not
permissible, contact your service representative before logging on.
When Change Firmware Structure is set to [Prohibit], administrator authentication must be enabled.
After [Prohibit] is specified, turn off administrator authentication once, and the next time administrator
authentication is specified, the setting will return to the default, [Do not Prohibit].
If you select [Do not Prohibit], firmware structure change detection is disabled.
• Prohibit
• Do not Prohibit

• p.118 "Protecting the Address Book"


• p.107 "Preventing Information Leakage Due to Unauthorized Transmission"
• p.186 "Setting the SSL/TLS Encryption Mode"

222
Other Security Functions

Other Security Functions


This section explains settings for preventing information leaks, and functions that you can restrict to further
increase security.

Fax Function

Not Displaying Destinations and Senders in Reports and Lists


In [Fax Features], you can specify whether to display destinations and sender names by setting "Switch
4, Bit No. 4" and "Switch 4, Bit No. 5" in [Parameter Setting], under [Administrator Tools]. Making
this setting helps prevent information leaks, because unintended users cannot read destinations and
sender names on both the sending and receiving side. For details about "Parameter Settings", see
"Fax Features", Facsimile Reference.
Stored Reception File User Setting
In [Fax Features], you can specify which users can manage fax files stored on the hard disk by setting
[Stored Recpt.File User Set] to [Set], under [Reception Settings]. To access the machine over the
network, specified users must enter their user codes or login user names and passwords. Only
authorized users can manage fax files stored on the hard disk. For details about "Reception Settings",
see "Fax Features", Facsimile Reference.
Printing the Journal
When making authentication settings for users, to prevent personal information in transmission history
being printed, set the Journal to not be printed. Also, if more than 200 transmissions are made, 8
transmissions shown in the Journal are overwritten each time a further transmission is made. To prevent
the Transmission History from being overwritten, perform the following procedures:
• In [Fax Features], go to [Administrator Tools], [Parameter Setting] "Switch 03, Bit 7", and change
the setting for automatically printing the Journal.
• In [Fax Features], go to [Administrator Tools], [Parameter Setting] "Switch 21, Bit 4", and set
"Journal Notification by E-mail" to ON.
Specifying Automatic Deletion of Incoming Faxes when an Error Occurs
This can be specified by the machine administrator.
In [Fax Features], you can configure the machine to automatically delete incoming faxes by setting
Bit 07 of Switch 10 in [Parameter Setting] under [Administrator Tools]. If you make this setting, the
machine will delete every incoming fax when an error occurs, even if you have configured the machine
to only store incoming faxes. Errors can be caused by corruption of the hard disk, memory overload,
or lack of storage for incoming faxes. Each deletion is recorded and will appear on the incoming fax
deletion report. By preventing incoming faxes printing out unexpectedly, this function makes fax
reception more secure.

223
8. Specifying the Extended Security Functions

Scanner Function

Print & Delete Scanner Journal


To prevent personal information in the transmission/delivery history being printed automatically, set user
authentication and the journal will specify [Do not Print: Disable Send] automatically. If you do this, the
scanner is automatically disabled when the journal history exceeds 250 transmissions/deliveries. When
this happens, click [Print Scanner Journal] or [Delete Scanner Journal]. To print the scanner journal
automatically, set [On] for "Print & Delete Scanner Journal".

WSD scanner function


WSD scanner function is automatically disabled when user authentication is specified. Even if automatically
disabled, it can be enabled from the initial settings available in the Web Image Monitor. For instructions
on how to configure this function, see "Before Sending Scan Files Using WSD", Scanner Reference.

224
Limiting Machine Operations to Customers Only

Limiting Machine Operations to Customers Only


The machine can be set so that operation is impossible without administrator authentication.
The machine can be set to prohibit operation without administrator authentication and also prohibit remote
registration in the Address Book by a service representative.
We maintain strict security when handling customers' data. Administrator authentication prevents us from
operating the machine without administrator permission.
Use the following setting.
• Service Mode Lock

Settings

Service Mode Lock


This can be specified by the machine administrator. Service mode is used by a service representative
for inspection or repair. If you set the service mode lock to [On], service mode cannot be used unless
the machine administrator logs on to the machine and cancels the service mode lock to allow the
service representative to operate the machine for inspection and repair. This ensures that the inspection
and repair are done under the supervision of the machine administrator.

Specifying Service Mode Lock


For details about logging on and logging off with administrator authentication, see "Logging on Using
8
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

225
8. Specifying the Extended Security Functions

4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.

5. Select [On] using [ ] or [ ], and then press the [OK] key.

A confirmation message appears.


6. Press [Yes].

7. Press the [User Tools/Counter] key.

8 • p.32 "Logging on Using Administrator Authentication"


• p.33 "Logging off Using Administrator Authentication"

Canceling Service Mode Lock


To enable a service representative to inspect or repair this machine, the machine administrator must log on
and cancel the service mode lock beforehand.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".

1. Press the [User Tools/Counter] key.


2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

226
Limiting Machine Operations to Customers Only

3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.

5. Select [Off] using [ ] or [ ], and then press the [OK] key.

6. Press the [User Tools/Counter] key.


The service representative can switch to service mode.

• p.32 "Logging on Using Administrator Authentication" 8


• p.33 "Logging off Using Administrator Authentication"

227
8. Specifying the Extended Security Functions

Additional Information for Enhanced Security


This section explains the settings that you can configure to enhance the machine's security.

Settings you can Configure Using the Control Panel

Use the control panel to configure the security settings shown in the following table.
Menu
System Settings

Tab Item Setting

Timer Settings Auto Logout Timer [On]: 180 seconds or less.


You cannot change the Web Image Monitor
auto logout time.
See "Auto Logout".

Administrator User Auth. Management Select [Basic Auth.], and then set "Printer Job
Tools Authentication" to [Entire].
See "Basic Authentication".

Administrator Admin. Auth. Select [On], and then select [Administrator


8 Tools Management / User Tools] for "Items".
Management See "Enabling Administrator Authentication".

Administrator Admin. Auth. Select [On], and then select [General Features],
Tools Management / Machine [Tray Paper Settings], [Timer Settings], [Interface
Management Settings], [File Transfer], and [Administrator
Tools] for "Items".
See "Enabling Administrator Authentication".

Administrator Admin. Auth. Select [On], and then select [Interface Settings],
Tools Management / Network [File Transfer], and [Administrator Tools] for
Management "Items".
See "Enabling Administrator Authentication".

Administrator Admin. Auth. Select [On], and then select [Administrator


Tools Management / File Tools] for "Items".
Management See "Enabling Administrator Authentication".

228
Additional Information for Enhanced Security

Tab Item Setting

Administrator Extended Security/Settings [Prohibit]


Tools by SNMPv1 and v2 See "Specifying the Extended Security
Functions".

Administrator Extended Security / Simple [Do not Restrict]


Tools Encryption See "Specifying the Extended Security
Functions".

Administrator Extended Security/ [Access Privilege]


Tools Authenticate Current Job See "Specifying the Extended Security
Functions".

Administrator Extended Security/ "Complexity Setting": [Level 1] or higher,


Tools Password Policy "Minimum Character No.": 6 or higher
See "Specifying the Extended Security
Functions".

Administrator Network Security Level [Level 2]


Tools To acquire the machine status through printer
driver or Web Image Monitor, set "SNMP" to
Active on Web Image Monitor.
See "Specifying Network Security Level". 8
Administrator Service Mode Lock [On]
Tools See "Limiting Machine Operations to Customers
Only".

Administrator Machine Data Encryption Select [Encrypt], and then select [All Data] for
Tools "Carry over to HD All Data, File Sys only or
Format all.".
See "Encrypting Data on the Hard Disk".

Fax Features

Tab Item Setting

Reception Stored Recpt.File User Set Select [Set], and then specify the recipient user
Settings or group.
See "Other Security Functions".

229
8. Specifying the Extended Security Functions

Tab Item Setting

Administrator Menu Protect [Level 2]


Tools See "Menu Protect".

• For details about SNMP setting, see Web Image Monitor Help.

• p.95 "Auto Logout"


• p.48 "Basic Authentication"
• p.25 "Enabling Administrator Authentication"
• p.217 "Specifying the Extended Security Functions"
• p.172 "Specifying Network Security Level"
• p.225 "Limiting Machine Operations to Customers Only"
• p.124 "Encrypting Data on the Hard Disk"
• p.223 "Other Security Functions"
• p.143 "Menu Protect"

Settings you can Configure Using Web Image Monitor


8
Use Web Image Monitor to configure the security settings shown in the following table.

Category Item Setting

Device Settings/ Collect Job Logs Active


Logs

Device Settings/ Collect Access Logs Active


Logs

Security/User Lockout Active


Lockout Policy

Security/User Number of Attempts before 5 times or less.


Lockout Policy Lockout See "User Lockout Function".

Security/User Lockout Release Timer Set to Active or Inactive. When setting to Active, set
Lockout Policy the Lockout release timer to 60 minutes or more.
See "User Lockout Function".

230
Additional Information for Enhanced Security

Category Item Setting

Security/User Lock Out User for When setting "Lockout Release Timer" to Active, set
Lockout Policy the Lockout release timer to 60 minutes or more.
See "User Lockout Function".

Network/ SNMPv3 Function Inactive


SNMPv3 To use SNMPv3 functions, set "SNMPv3 Function"
to "Active", and set "Permit SNMPv3
Communication" to "Encryption Only". Because
SNMPv3 enforces authentication for each packet,
Login log will be disabled as long as SNMPv3 is
active.

Network/ FTP Inactive


Network Security Before specifying this setting, set "Network Security
Level" to [Level 2] on the control panel.

• For details about the collect log setting and SNMPv3 setting, see Web Image Monitor Help.

• p.93 "User Lockout Function"


8
Settings you can Configure when IPsec is Available/Unavailable

IPsec encrypts all the data traveling on your network.


If your network supports IPsec, we recommend you enable it.

Settings you can Configure when IPsec is Available


If IPsec is available, configure the settings shown in the following table to enhance the security of the data
traveling on your network.
System Settings(Control panel)

Tab Item Setting

Interface Settings Network / IPsec [Active]

Interface Settings Permit SSL/TLS Comm. [Ciphertext Only]

231
8. Specifying the Extended Security Functions

Web Image Monitor settings

Category Item Setting

Security/SSL/ Permit SSL/TLS If you set "Exclude HTTPS Communication" to


TLS Communication Active, you must also set "Permit SSL/TLS
Communication" to Ciphertext Priority.

Security/IPsec Encryption Key Inactive


Manual Settings

Security/IPsec Encryption Key Authentication and High Level Encryption


Auto Exchange
Settings/Security
Level

• You can set "Permit SSL/TLS Communication" using either Web Image Monitor or the machine's
control panel.

Settings you can Configure when IPsec is Unavailable

8 If IPsec is not available, configure the settings shown in the following table to enhance the security of the
data traveling on your network.
System Settings(Control panel)

Tab Item Setting

Interface Settings Network / IPsec [Inactive]

Interface Settings Permit SSL/TLS Comm. [Ciphertext Only]

Web Image Monitor settings

Category Item Setting

Security S/MIME "Encryption Algorithm": 3DES-168 bit


You must register the user certificate in order to
use S/MIME.

Address User Certificate You must register the user certificate in order to
Book/E-mail use S/MIME.

232
Additional Information for Enhanced Security

Securing Data when IPsec is Unavailable


The following procedures make user data more secure when IPsec is unavailable.
Administrators must inform users to carry out these procedures.
• Fax
When sending faxes, specify destinations by fax number or e-mail address. Do not specify destinations
by IP-Fax destination. For details about specifying fax destinations, see "Specifying a Destination",
Facsimile Reference.
• Printer
To use the printer functions, specify "SFTP" as the protocol, or specify "IPP" and select "Active" for
"SSL".
For details about SFTP, see "Special Operations under Windows", Network and System Settings
Guide.
For details about IPP settings, see "Installing the Printer Driver", Printer Reference.
For details about SSL settings, see "Protection Using Encryption".
• Scanner
Send the URL of scanned files to destinations by configuring [Send Settings] in [Scanner Features],
instead of sending the actual scanned files. Use Web Image Monitor through your network to view,
delete, send, and download scanned files.
When sending scanned files attached to e-mail, protect them by applying an S/MIME certificate. To
do this, configure the "Security" settings prior to sending. For details about sending e-mail from the
scanner, see "Sending Scan Files by E-mail", Scanner Reference. 8

• p.181 "Protection Using Encryption"

233
8. Specifying the Extended Security Functions

234
9. Troubleshooting
This chapter describes what to do if the machine does not function properly.

If Authentication Fails
This section explains what to do if a user cannot operate the machine because of a problem related to user
authentication. Refer to this section if a user comes to you with such a problem.

If a Message is Displayed

This section explains how to deal with problems if a message appears on the screen during user
authentication.
The most common messages are explained. If some other message appears, deal with the problem
according to the information contained in the message.

Messages Cause Solutions

"You do not have privileges to The authority to use the function • If this appears when trying
use this function." is not specified. to use a function: The
function is not specified in
the Address Book
management setting as
being available. The user
administrator must decide
whether to authorize use of 9
the function and then assign
the authority.
• If this appears when trying
to specify a default setting:
The administrator differs
depending on the default
settings you wish to specify.
Using the list of settings, the
administrator responsible
must decide whether to
authorize use of the
function.

235
9. Troubleshooting

Messages Cause Solutions

"Failed to obtain URL." The machine cannot connect to Make sure the server's settings,
the server or cannot establish such as the IP address and host
communication. name, are specified correctly on
the machine. Make sure the host
name of the UA Server is
specified correctly.

"Failed to obtain URL." The machine is connected to the Make sure the UA service is
server, but the UA service is not specified correctly.
responding properly.

"Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication
the server. Manager.

"Failed to obtain URL." Server authentication failed. Make sure server authentication
is specified correctly on the
machine.

"Authentication failed." The entered login user name or Ask the user administrator for the
login password is incorrect. correct login user name and login
password.

"Authentication failed." Authentication failed because no Delete unnecessary user


more users can be registered. addresses.
(The number of users registered
in the Address Book has reached
9 capacity.)

"Authentication failed." Cannot access the authentication A network or server error may
server when using Windows have occurred. Confirm the
Authentication, LDAP network in use with the LAN
Authentication, or Integration administrator.
Server Authentication.

236
If Authentication Fails

Messages Cause Solutions

"Set User Management in Admin. User administrator privileges To specify Basic Authentication,
Auth. to On to use this setting." have not been enabled in Windows Authentication, LDAP
Administrator Authentication Authentication, or Integration
Management. Server Authentication, you must
first enable user administrator
privileges in Administrator
Authentication Management.
For details about authentication
settings, see "Configuring User
Authentication".

• p.39 "Configuring User Authentication"

If the Machine Cannot Be Operated

If the following conditions arise while users are operating the machine, provide the instructions on how to
deal with them.

Condition Cause Solution

Cannot perform the following: User authentication has been Confirm the user name and login
• Print with the printer driver rejected. name with the administrator of

• Connect with the TWAIN


the network in use if using 9
Windows Authentication, LDAP
driver
Authentication, or Integration
Send or print with the LAN-Fax Server Authentication.
driver
Confirm with the user
administrator if using basic
authentication.

Cannot perform the following: The encryption key specified in Specify the driver encryption key
• Print with the printer driver the driver does not match the registered in the machine.
machine's driver encryption key. See "Specifying a Driver
• Connect with the TWAIN
driver Encryption Key".

Send or print with the LAN-Fax


driver

237
9. Troubleshooting

Condition Cause Solution

Cannot perform the following: The SNMPv3 account, Specify the account, password
• Print with the printer driver password, and encryption and the encryption algorithm of
algorithm do not match settings SNMPv3 registered in the
• Connect with the TWAIN
specified on this machine. machine using network
driver
connection tools.
Send or print with the LAN-Fax
driver

Cannot authenticate using the Another user is logging on to the Wait for the user to log off.
TWAIN driver. machine.

Cannot authenticate using the Authentication is taking time Make sure the LDAP server
TWAIN driver. because of operating conditions. setting is correct.
Make sure the network settings
are correct.

Cannot authenticate using the Authentication is not possible Wait until editing of the Address
TWAIN driver. while the machine is editing the Book data is complete.
Address Book data.

After starting "User Management "Simple Encryption" is not set Set "Simple Encryption" to [On].
Tool" or "Address Management correctly. Alternatively, "SSL/ Alternatively, enable "SSL/TLS",
Tool" in SmartDeviceMonitor for TLS" has been enabled although install the server certificate in the
Admin and entering the correct the required certificate is not machine, and then install the
login user name and password, installed in the computer. certificate in the computer.

9 a message that an incorrect


password has been entered
See "Setting the SSL / TLS
Encryption Mode".
appears.

Cannot access the machine using "Simple Encryption" is not set Set "Simple Encryption" to [On].
ScanRouter EX Professional V3 / correctly. Alternatively, "SSL/ Alternatively, enable "SSL/TLS",
ScanRouter EX Enterprise V2. TLS" has been enabled although install the server certificate in the
the required certificate is not machine, and then install the
installed in the computer. certificate in the computer.
See "Setting the SSL / TLS
Encryption Mode".

Cannot connect to the The ScanRouter delivery Update to the latest version of the
ScanRouter delivery software. software may not be supported ScanRouter delivery software.
by the machine.

238
If Authentication Fails

Condition Cause Solution

Cannot access the machine using ScanRouter EX Professional V2 ScanRouter EX Professional V2


ScanRouter EX Professional V2. does not support user does not support user
authentication. authentication.

Cannot log off when using the The original has not been When the original has been
copying or scanner functions. scanned completely. scanned completely, press the
[ ] key, remove the original,
and then log off.

"Program" does not appear on "Rstrct Dest. Add.(Fax)" is set to Registration must be done by the
the fax or scanner screen for [Off] in "Restrict Dest. Use(Fax)" user administrator.
specifying destinations. under "Extended Security", so
only the user administrator can
register destinations in the
Address Book on the fax screen.

"Rstrct Dest. Add.(Scanner)" is set


to [Off] in "Rstrct Dest. Use
(Scanner)" under "Extended
Security", so only the user
administrator can register
destinations in the Address Book
on the scanner screen.

User authentication is enabled, User authentication may have Re-enable user authentication,
yet destinations specified using been disabled while [All Users] is and then enable [All Users] for
the machine do not appear. not specified. the destinations that did not 9
appear.
For details about enabling [All
Users], see "Protecting the
Address Book".

Cannot print when user User authentication may not be Specify user authentication in the
authentication has been specified in the printer driver. printer driver.
specified. For details, see the printer driver
Help.

239
9. Troubleshooting

Condition Cause Solution

If you try to interrupt a job while With this machine, you can log Only the user who executed a
copying or scanning, an off while copying or scanning. If copying or scanning job can
authentication screen appears. you try to interrupt copying or interrupt it. Wait until the job has
scanning after logging off, an completed or consult an
authentication screen appears. administrator or the user who
executed the job.

After you execute "Encrypt The hard disk may be faulty. Contact your service
Address Book", the "Exit" The file may be corrupt. representative.
message does not appear.

• p.176 "Specifying a Driver Encryption Key"


• p.186 "Setting the SSL/TLS Encryption Mode"
• p.118 "Protecting the Address Book"

240
10. Appendix

Supervisor Operations
The supervisor can delete an administrator's password and specify a new one.
If any of the administrators forgets their password or if any of the administrators changes, the supervisor
can assign a new password. If logged on using the supervisor's user name and password, you cannot use
normal functions or specify defaults.
Log on as the supervisor only to change an administrator's password.

• The default login user name is "supervisor" and the login password is blank. We recommend changing
the login user name and login password.
• When registering login user names and login passwords, you can specify up to 32 alphanumeric
characters and symbols. Keep in mind that user names and passwords are case-sensitive.
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
service representative will to have to return the machine to its default state. This will result in all data
in the machine being lost and the service call may not be free of charge.

• You cannot specify the same login user name for the supervisor and the administrators.
• Using Web Image Monitor, you can log on as the supervisor and delete an administrator's password
or specify a new one.

Logging on as the Supervisor

If administrator authentication has been specified, log on using the supervisor login user name and login 10
password. This section describes how to log on.

1. Press the [User Tools/Counter] key.


2. Press [Login].

241
10. Appendix

3. Enter a login user name, and then press the [OK] key.

When you assign the administrator for the first time, enter "supervisor".
4. Enter a login password, and then press the [OK] key.

When you assign the administrator for the first time, press the [OK] key without entering login
password.

Logging off as the Supervisor

If administrator authentication has been specified, be sure to log off after completing settings. This section
describes how to log off after completing settings.

1. Press [Logout].

10 2. Press [Yes].

Changing the Supervisor

This section describes how to change the supervisor's login name and password.
To do this, you must enable the user administrator's privileges through the settings under [Admin. Auth.
Management]. For details, see "Specifying Administrator Privileges".

242
Supervisor Operations

1. Press the [User Tools/Counter] key.


2. Press [Login].

3. Log on as the supervisor.


You can log on in the same way as an administrator.
4. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.

7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
10

8. Select [Supervisor] using [ ] or [ ], and then press the [OK] key.

243
10. Appendix

9. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.

10. Enter the login user name, and then press the [OK] key.

11. Select [Login Password] using [ ] or [ ], and then press the [OK] key.

12. Enter the login password, and then press the [OK] key.

13. If a password reentry screen appears, enter the login password, and then press the [OK]
key.

10

14. Press [Exit] three times.

15. Press the [User Tools/Counter] key.

244
Supervisor Operations

• p.25 "Specifying Administrator Privileges"

Resetting the Administrator's Password

This section describes how to reset the administrators' passwords.


For details about logging on and logging off as the supervisor, see "Supervisor Operations".

1. Press the [User Tools/Counter] key.


2. Press [Login].

3. Log on as the supervisor.


You can log on in the same way as an administrator.
4. Select [System Settings] using [ ] or [ ], and then press the [OK] key.

5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.

10

6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.

245
10. Appendix

7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.

8. Select the administrator you wish to reset using [ ] or [ ], and then press the [OK] key.

9. Select [Login Password] using [ ] or [ ], and then press the [OK] key.

10. Enter the login password, and then press the [OK] key.

11. If a password reentry screen appears, enter the login password, and then press the [OK]
key.

10

12. Press [Exit] three times.

13. Press the [User Tools/Counter] key.

246
Supervisor Operations

• p.241 "Supervisor Operations"

10

247
10. Appendix

Machine Administrator Settings


The machine administrator settings that can be specified are as follows:

System Settings

The following settings can be specified.


General Features
All the settings can be specified.
Tray Paper Settings
All the settings can be specified.
Timer Settings
All the settings can be specified.
Interface Settings
The following settings can be specified.
• Parallel Interface
All the settings can be specified.
File Transfer
The following settings can be specified.
• Delivery Option
• SMTP Authentication
User Name
E-mail Address
10 Password
Encrypt
• POP before SMTP
Wait Time after Auth.
User Name
E-mail Address
Password
• Reception Protocol
• POP3 / IMAP4 Settings
Server Name
Encryption

248
Machine Administrator Settings

• Admin.E- mail Address


• Default User Name/PW(Send)
SMB User Name / SMB Password
FTP User Name / FTP Password
NCP User Name / NCP Password
• Fax E-mail Account
Administrator Tools
The following settings can be specified.
• Address Book Management
• Prgrm./Change/Delete Group
• Display / Print Counter
Print
• Disp./Print User Counter
• User Auth. Management
You can specify which authentication to use.
You can also edit the settings for each function.
• Admin. Auth. Management
Machine Management
• Program/Change Admin.
Machine Administrator
You can change the user name and the full-control user's authority.
• Key Counter Management
• Extended Security
Encrypt Address Book
10
Restrict User Info.Display
Transfer to Fax Receiver
Authenticate Current Job
@Remote Service
Update Firmware
Change Firmware Structure
• Prog/Chnge/Del LDAP Server
• LDAP Search
• Prog./Change/Delete Realm

249
10. Appendix

• AOF (Always On)


• Service Mode Lock
• Firmware Version
• Auto Erase Memory Setting
• Erase All Memory
• Delete All Logs
• Transfer Log Setting
• Fixed USB Port
• Machine Data Encryption

• "Machine Data Encryption" are available only if the optional HDD Encryption Unit is installed.
• "Auto Erase Memory Setting" and the "Erase All Memory" setting are available only if the optional
Data Overwrite Security Unit is installed.

Copier Features

All the settings can be specified.

Fax Features

The following settings can be specified.


General Settings/Adjust
All the settings can be specified.

10 Reception Settings
The following settings can be specified.
• Switch Reception Mode
• RX Mode Auto Switch Time
• Authorized Reception
• Checkered Mark
• Center Mark
• Print Reception Time
• 2 Sided Print
• Reception File Setting

250
Machine Administrator Settings

E-mail Settings
The following settings can be specified.
• Internet Fax Setting
• SMTP RX File Delivery
Administrator Tools
The following settings can be specified.
• Print Journal
• Print TX Standby File List
• Communication Page Count
• Forwarding
• Folder TX Result Report
• Parameter Setting
• Program Special Sender
• Program Memory Lock ID
• G3 Analog Line
• Memory File Transfer
• Menu Protect

Printer Features

The following settings can be specified.


List / Test Print
All the settings can be specified.
Maintenance 10
The following settings can be specified.
• Menu Protect
• List / Test Print Lock
System
The following settings can be specified.
• Print Error Report
• Auto Continue
• Memory Overflow
• Rotate by 180 Degrees
• Print Compressed Data

251
10. Appendix

• Memory Usage
• Duplex
• Copies
• Blank Page Print
• Edge Smoothing
• Toner Saving
• Printer Language
• Sub Paper Size
• Page Size
• Letterhead Setting
• Bypass Tray Setting Priority
• Edge to Edge Print
• Default Printer Lang.
• Tray Switching
• RAM Disk
• Extended Auto Tray Switching
Host Interface
All the settings can be specified.
PCL Menu
All the settings can be specified.
PS Menu
All the settings can be specified.
PDF Menu
10 All the settings can be specified.

• PS or PDF menu settings are available only if the optional PostScript 3 Unit is installed.

Scanner Features

The following settings can be specified.


Scan Settings
All the settings can be specified.

252
Machine Administrator Settings

Destination List Settings


All the settings can be specified.
Send Settings
The following settings can be specified.
• PC Scan Command Stdby Time
• File Type Priority
• Compression (B&W)
• Compress. (Gray/Full Clr)
• Print&Del. Scanner Journal
• Print Scanner Journal
• Delete Scanner Journal
• Insert Addit. E-mail Info
• Default E-mail Subject
Administrator Tools
All the settings can be specified.

Settings via Web Image Monitor

The following settings can be specified.


Status
• Reset Device
• Reset Printer Job
Device Settings
• System 10
Spool Printing
Protect Printer Display Panel
Print Priority
Function Reset Timer
Permit Firmware Update
Permit Firmware Structure Change
Display IP Address on Device Display Panel
Paper Tray Priority
• Paper
All the settings can be specified.

253
10. Appendix

• Date/Time
All the settings can be specified.
• Timer
All the settings can be specified.
• Logs
All the settings can be specified.
• E-mail
All the settings can be specified.
• Auto E-mail Notification
All the settings can be specified.
• On-demand E-mail Notification
All the settings can be specified.
• File Transfer
All the settings can be specified.
• User Authentication Management
All the settings can be specified.
• Administrator Authentication Management
Machine Administrator Authentication
Available Settings for Machine Administrator
• Program/Change Administrator
You can specify the following administrator settings for the machine administrator.
Login User Name
Login Password
10 Encryption Password
• LDAP Server
All the settings can be specified.
• Firmware Update
All the settings can be specified.
• Program/Change Realm
All the settings can be specified.
Printer
• Basic Settings
Print Error Report

254
Machine Administrator Settings

Auto Continue
Memory Overflow
Rotate by 180 Degrees
Print Compressed Data
Memory Usage
Duplex
Copies
Blank Page Print
Edge Smoothing
Toner Saving
Printer Language
Sub Paper Size
Page Size
Letterhead Setting
Bypass Tray Setting Priority
Edge to Edge Print
Default Printer Language
Tray Switching
List/Test Print Lock
Extended Auto Tray Switching
Virtual Printer
Host Interface
PCL Menu
PS Menu
10
PDF Menu
• Tray Parameters (PCL)
All the settings can be specified.
• Tray Parameters (PS)
All the settings can be specified.
• Virtual Printer Settings
All the settings can be specified.
• PDF Group Password
All the settings can be specified.

255
10. Appendix

• PDF Fixed Password


All the settings can be specified.
Fax
• General Settings
All the settings can be specified.
• Administrator Tools
All the settings can be specified.
• E-mail Settings
Internet Fax
SMTP RX File Delivery
Settings Authorized E-mail Address
• Parameter Settings
All the settings can be specified.
Scanner
• Scan Settings
All the settings can be specified.
• Destination List Settings
All the settings can be specified.
• Send Settings
All the settings can be specified.
• Administrator Tools
All the settings can be specified.
Interface
10 • Interface Settings
USB
Network
• SNMPv3
Security
• User Lockout Policy
All the settings can be specified.
RC Gate
• Setup RC Gate
Request No.

256
Machine Administrator Settings

• Update RC Gate Firmware


All the settings can be specified.
• RC Gate Proxy Server
All the settings can be specified.
Webpage
• Webpage
Download Help File
Extended Feature Settings
• Install
All the settings can be specified.
• Administrator Tools
All the settings can be specified.
• Copy Extended Features
All the settings can be specified.

• The following settings are available only if the optional PostScript 3 Unit is installed: "PS Menu", "PDF
Menu", "Tray Parameters (PS)", "Virtual Printer Settings", "PDF Group Password", and "PDF Fixed
Password".

Settings via SmartDeviceMonitor for Admin

The following settings can be specified.


Device Properties
• Reset Current Job 10
• Reset All Jobs
• Reset Device
• Refresh
User Management Tool
The following settings can be specified.
• User Counter Information
• Access Control List

257
10. Appendix

Network Administrator Settings


The network administrator settings that can be specified are as follows:

System Settings

The following settings can be specified.


Interface Settings
If DHCP is set to On, the settings that are automatically obtained via DHCP cannot be specified.
• Network
All the settings can be specified.
• Wireless LAN
Communication Mode
SSID Setting
Channel
Security Method
Restore Defaults
• Print I/F Settings List
File Transfer
• SMTP Server
Server Name
Port No.
• E-mail Communication Port
10 • E-mail Recept. Interval
• Max. Recept. E-mail Size
• E-mail Storage in Server
• Auto Specify Sender Name
Administrator Tools
• Address Book Management
• Prgrm./Change/Delete Group
• Disp./Print User Counter
Display
• Admin. Auth. Management
Network Management

258
Network Administrator Settings

• Program/Change Admin.
Network Administrator
You can specify the user name and change the full-control user's authority.
• Extended Security
Driver Encryption Key
Settings by SNMP V1 and V2
Simple Encryption
• Network Security Level

• The "Wireless LAN" setting is available only if the wireless LAN interface is installed.

Fax Features

The following settings can be specified.


E-mail Settings
• Maximum E- mail Size
IP-Fax Settings
All the settings can be specified.

Printer Features

The following settings can be specified.


System
• Print Compressed Data 10
Scanner Features

The following settings can be specified.


Send Settings
• Max. E-mail Size
• Divide & Send E-mail

259
10. Appendix

Settings via Web Image Monitor

The following settings can be specified.


Device Settings
• System
Device Name
Comment
Location
• E-mail
All the settings can be specified.
• Auto E-mail Notification
Groups to notify
• Administrator Authentication Management
Network Administrator Authentication
Available Settings for Network Administrator
• Program/Change Administrator
You can specify the following administrator settings for the network administrator.
Login User Name
Login Password
Encryption Password
Printer
• Basic Settings
Print Compressed Data
10 Fax
• E-mail Settings
Maximum E-mail Size
• IP-Fax Settings
All the settings can be specified.
• IP-Fax Gateway Settings
All the settings can be specified.
Scanner
• Send Settings
Max. E-mail Size

260
Network Administrator Settings

Divide & Send E-mail


Interface
• Interface Settings
LAN Type
Ethernet Security
Ethernet Speed
• Wireless LAN Settings
LAN Type
Communication Mode
SSID
Channel
Security Method
WEP Settings
WPA Settings
Network
• IPv4
All the settings can be specified.
• IPv6
All the settings can be specified.
• NetWare
All the settings can be specified.
• AppleTalk
All the settings can be specified.
• SMB
10
All the settings can be specified.
• SNMP
All the settings can be specified.
• SNMPv3
All the settings can be specified.
• SSDP
All the settings can be specified.
• Bonjour
All the settings can be specified.

261
10. Appendix

Security
• Network Security
All the settings can be specified.
• Access Control
All the settings can be specified.
• IPP Authentication
All the settings can be specified.
• SSL/TLS
All the settings can be specified.
• ssh
All the settings can be specified.
• Site Certificate
All the settings can be specified.
• Device Certificate
All the settings can be specified.
• IPsec
All the settings can be specified.
• IEEE 802.1X (WPA/WPA2)
All the settings can be specified.
• S/MIME
All the settings can be specified.
Webpage
All the settings can be specified.
10
• "Wireless LAN Settings" are available only if the wireless LAN interface is installed.

Settings via SmartDeviceMonitor for Admin

The following settings can be specified.


NIB Setup Tool
All the settings can be specified.

262
File Administrator Settings

File Administrator Settings


The file administrator settings that can be specified are as follows:

System Settings

The following settings can be specified.


Administrator Tools
• Address Book Management
• Prgrm./Change/Delete Group
• Disp./Print User Counter
Display
• Admin.Auth.Management
File Management
• Program/Change Admin.
File Administrator
• Extended Security
Enhance File Protection

Fax Features

The following settings can be specified.


Reception Settings
• Stored Recpt.File User Set 10
Printer Features

The following settings can be specified.


Maintenance
• Delete All Temporary Jobs
• Delete All Stored Jobs
System
• Auto Delete Temporary Jobs
• Auto Delete Stored Jobs

263
10. Appendix

Settings via Web Image Monitor

The following settings can be specified.


Printer: Print Jobs
The file administrator can Edit/Delete the Print Job List and Unlock the print job.
Device Settings
• Auto E-mail Notification
You can select groups to notify.
• Administrator Authentication Management
File Administrator Authentication
Available Settings for File Administrator
• Program/Change Administrator
You can specify the following administrator settings for the file administrator.
Login User Name
Login Password
Encryption Password
Printer
• Basic Settings
Auto Delete Temporary Print Jobs
Auto Delete Stored Print Jobs
Webpage
• Download Help File

10

264
User Administrator Settings

User Administrator Settings


The user administrator settings that can be specified are as follows:

System Settings

The following settings can be specified.


Administrator Tools
• Address Book Management
• Prgrm. / Change / Delete Group
• Address Book: Print List
• Display/Print Counter
• Disp./Print User Counter
Display
Clear
• Admin.Auth. Management
User Management
• Program / Change Admin.
User Administrator
• Extended Security
Encrypt Address Book
Restrict Dest. Use(Fax)
Rstrct Dest. Add.(Fax)
Rstrct Dest. Use(Scanner) 10
Rstrct Dest. Add.(Scanner)
Password Policy

Settings via Web Image Monitor

The following settings can be specified.


Address Book
All the settings can be specified.
Device Settings
• Auto E-mail Notification

265
10. Appendix

Groups to notify
• Administrator Authentication Management
User Administrator Authentication
Available Settings for User Administrator
• Program/Change Administrator
You can specify the following administrator settings for the user administrator.
Login User Name
Login Password
Encryption Password
Webpage
• Download Help File

Settings via SmartDeviceMonitor for Admin

The following settings can be specified.


Address Management Tool
All the settings can be specified.
User Management Tool
• Reset User Counters
• Add New User
• Delete User
• User Properties

10

266
The Privilege for User Account Settings in the Address Book

The Privilege for User Account Settings in the


Address Book
The authorities for using the Address Book are as follows:
The authority designations in the list indicate users with the following authorities.
• Abbreviations in the table heads
Read-only (User) = This is a user assigned "Read-only" authority.
Edit (User) = This is a user assigned "Edit" authority.
Edit / Delete (User) = This is a user assigned "Edit/Delete" authority.
User Admin. = This is the user administrator.
Registered User = This is a user that has personal information registered in the Address Book and has
a login password and user name.
Full Control = This is a user granted full control.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

Name R R/W R/W R/W R/W R/W

Reg.No. R R/W R/W R/W R/W R/W


10
Tab Name: Auth. Info

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

User Code N/A N/A N/A N/A N/A R/W

Login User Name N/A N/A N/A N/A R/W R/W

Login Password N/A N/A N/A N/A R/W*1 R/W*1

SMTP Authentication N/A N/A N/A N/A R/W*1 R/W*1

267
10. Appendix

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

Folder Authentication R R/W R/W R/W R/W R/W

LDAP Authentication N/A N/A N/A N/A R/W*1 R/W*1

Function Permissions N/A N/A N/A N/A R R/W

*1 The password for "Login Password", "SMTP Authentication", or "LDAP Authentication" can be entered or
changed but not displayed.
Tab Name: Auth.Protect

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

Register as R R/W R/W R/W R/W R/W

Dest.Protect Code N/A N/A N/A R/W*2 R/W*2 R/W*2

Dest.Protect Obj. N/A R/W R/W R/W R/W R/W

Dest.Protect:Permissi
N/A N/A N/A R/W R/W R/W
ons

*2 The code for "Protection Code" can be entered or changed but not displayed.
Tab Name: Fax Settings

10 Read-
Edit
Edit /
Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

Fax Dest. R R/W R/W R/W R/W R/W

SUB Code R R/W R/W R/W R/W R/W

SEP Code R R/W R/W R/W R/W R/W

International TX
N/A R/W R/W R/W R/W R/W
Mode

Label Insertion N/A R/W R/W R/W R/W R/W

268
The Privilege for User Account Settings in the Address Book

Tab Name: E-mail Settings

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

E-mail Address R R/W R/W R/W R/W R/W

E-mail/Internet Fax
N/A R/W R/W R/W R/W R/W
Dest.

Internet Fax Dest. only N/A R/W R/W R/W R/W R/W

Tab Name: Folder Info

Read- Edit /
Edit Full Registered User
Settings only Delete
(User) Control User Admin.
(User) (User)

SMB/FTP/NCP R R/W R/W R/W R/W R/W

SMB: Path R R/W R/W R/W R/W R/W

FTP: Port No. R R/W R/W R/W R/W R/W

FTP: Server Name R R/W R/W R/W R/W R/W

FTP: Path R R/W R/W R/W R/W R/W

NCP: Path (NDS or


R R/W R/W R/W R/W R/W
Bindery)

10

269
10. Appendix

User Settings - Control Panel Settings


This section explains which functions and system settings are available to users when administrator
authentication is specified. The administrator's configuration of Menu Protect and Available Settings
determines which functions and system settings are available to users. If user authentication is specified,
system settings and functions are available to authorized users only, who must log on to access them.

10

270
Copier Features

Copier Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
General Features

Settings Level 1 Level 2

Auto Tray Switching R R

Original Type Setting R/W R

Duplex Mode Priority R R

Orientation R/W R

Max. Number of Sets R R

Original Count Display R R

Reproduction Ratio R R

Preset R/E Priority R R

Duplex Margin R/W R 10


Letterhead Setting R R

Menu Protect R R

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

271
10. Appendix

Printer Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Normal Printer Screen

Functions Level 1 Level 2

Prt.Jobs R/W R/W

List / Test Print

Settings Level 1 Level 2

Multiple Lists R/W R/W

Config. Page R/W R/W

Error Log R/W R/W

Menu List R/W R/W

10 PCL Config./Font Page R/W R/W

PS Config./Font Page R/W R/W

PDF Config./Font Page R/W R/W

Hex Dump R/W R/W

The "PS Config./Font Page" and the "PDF Config./Font Page" can be printed only if the optional
PostScript 3 Unit is installed.
System

Settings Level 1 Level 2

Print Error Report R R

272
Printer Features

Settings Level 1 Level 2

Auto Continue R R

Memory Overflow R R

Rotate by 180 Degrees R R

Auto Delete Temporary Jobs R R

Auto Delete Stored Jobs R R

Print Compressed Data R R

Memory Usage R R

Duplex R R

Copies R R

Blank Page Print R R

Edge Smoothing R R

Toner Saving R R

Printer Language R R

Sub Paper Size R R

Page Size R/W R

Letterhead Setting R R

Bypass Tray Priority R R


10
Edge to Edge Print R R

Default Printer Lang. R R

Tray Switching R R

RAM Disk R R

Extend Auto Tray Switching R R

273
10. Appendix

Host Interface

Settings Level 1 Level 2

I/O Buffer R R

I/O Timeout R R

PCL Menu

Settings Level 1 Level 2

Orientation R R

Form Lines R R

Font Source R R

Font Number R R

Point Size R R

Font Pitch R R

Symbol Set R R

Courier Font R R

Extend A4 Width R R

Append CR to LF R R

Resolution R R

10 RAM Disk R R

PS Menu

Settings Level 1 Level 2

Job Timeout R R

Wait Timeout R R

Data Format R R

Resolution R R

Orientation Auto Detect R R

274
Printer Features

PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu

Settings Level 1 Level 2

Change PDF Password R R

PDF Group Password R R

Reverse Order Print R R

Resolution R R

Orientation Auto Detect R R

PDF menu settings are available only if the optional PostScript 3 Unit is installed.

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

10

275
10. Appendix

Scanner Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Scan Settings

Settings Level 1 Level 2

Default Scan Settings R R

Original Setting R R

Orig. Orientation Priority R R

Original Type Setting R/W R

Color Mode Priority R R

Blank Page Detect R R

Destination List Settings

10 Settings Level 1 Level 2

Dest. List Priority 2 R R

Send Settings

Settings Level 1 Level 2

PC Scan Command Stdby Time R R

File Type Priority R R

Compression (B&W) R/W R

Compress. (Gray/Full Clr) R/W R

276
Scanner Features

Settings Level 1 Level 2

Print&Del. Scanner Journal R R

Print Scanner Journal R R

Delete Scanner Journal R R

Max. E-mail Size R R

Divide & Send E-mail R R

Insert Addit. E-mail Info R/W R

Default E-mail Subject R R

Administrator Tools

Settings Level 1 Level 2

Menu Protect R R

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

10

277
10. Appendix

Fax Features
When administrator authentication is enabled, the administrator's configuration of Menu Protect determines
which functions and settings are available to users.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
General Settings/Adjust

Settings Level 1 Level 2

Adjust Sound Volume R/W R

Program Fax Information R R

On Hook Release Time R/W R

Set User Function Key R/W R

Reception Settings

Settings Level 1 Level 2

Switch Reception Mode R R

10 RX Mode Auto Switch Time R R

Authorized Reception R R

Checkered Mark R/W R

Center Mark R/W R

Print Reception Time R/W R

2 Sided Print R/W R

Reception File Setting R R

Stored Recpt. File User Set R R

278
Fax Features

E-mail Settings

Settings Level 1 Level 2

Internet Fax Settings R R

Maximum E-mail Size R R

SMTP RX File Delivery R R

IP-Fax Settings

Settings Level 1 Level 2

Enable H.323 R R

Enable SIP R R

H.323 Settings R R

SIP Settings R R

Gateway Settings R R

Administrator Tools

Settings Level 1 Level 2

Print Journal R N/A

Print TX Standby File List R R

Communication Page Count R R


10
Memory Lock R R

Forwarding R R

Folder TX Result Report R R

Parameter Settings R R

Program Special Sender R R

Program Memory Lock ID R R

G3 Analog line R R

Memory File Transfer R R

279
10. Appendix

Settings Level 1 Level 2

Menu Protect R R

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

10

280
System Settings

System Settings
When administrator authentication is enabled, the administrator's configuration of Available Settings
determines which system settings are available to users.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
General Features

Not
Settings Specified
Specified

Program / Change / Delete User Text R/W R

Panel Key Sound R/W R

Warm-up Beeper R/W R

Copy Count Display R/W R

Function Priority R/W R

Print Priority R/W R

Function Reset Timer R/W R


10
Display Contrast R/W R

Key Repeat R/W R

Measurement Unit R/W R

Tray Paper Settings

Not
Settings Specified
Specified

Paper Size:Tray1-3 R/W R

281
10. Appendix

Not
Settings Specified
Specified

Printer Bypass Paper Size R/W R

Paper Type: Bypass Tray R/W R

Paper Type: Tray 1-3 R/W R

Ppr Tray Priority:Copier R/W R

Ppr Tray Priority:Fax R/W R

Ppr Tray Priority:Printer R/W R

Timer Settings

Not
Settings Specified
Specified

Auto Off Timer R/W R

Energy Saver Timer R/W R

System Auto Reset Timer R/W R

Copier Auto Reset Timer R/W R

Facsimile Auto Reset Timer R/W R

Printer Auto Reset Timer R/W R

Scanner Auto Reset Timer R/W R


10 Set Date R/W R

Set Time R/W R

Auto Logout Timer R/W R

Interface Settings

Settings Not Specified Specified

Print I/F Settings List R/W R

Network

282
System Settings

Not
Settings Specified
Specified

Machine IPv4 Address R/W R

IPv4 Gateway Address R/W R

Machine IPv6 Address R/W R

IPv6 Gateway Address R/W R

IPv6 Stateless Settings R/W R

DNS Configuration R/W R

DDNS Configuration R/W R

IPsec R/W R

Domain Name R/W R

WINS Configuration R/W R

Effective Protocol R/W R

NCP Delivery Protocol R/W R

NW Frame Type R/W R

SMB Computer Name R/W N/A

SMB Work Group R/W N/A

Ethernet Speed R/W R

IEEE802.1X Auth.(Ethernet) R/W R 10


Restr.IEEE802.1X Auth.Def. R/W R

Ping Command R/W R

Permit SNMPv3 Communictn. R/W R

Permit SSL / TLS Comm. R/W R

Host Name R/W N/A

Machine Name R/W N/A

283
10. Appendix

If you set "Machine IPv4 Address", "DNS Configuration", "Domain Name", or "WINS Configuration"
to "Auto-Obtain (DHCP)", you can only display the settings.
Parallel Interface

Settings Not Specified Specified

Parallel Timing R/W R

Parallel Comm. Speed R/W R

Selection Signal Status R/W R

Input Prime R/W R

Bidirectional Comm. R/W R

Signal Control R/W R

"Parallel Interface" settings are available only if the optional IEEE 1284 interface unit is installed.
Wireless LAN

Settings Not Specified Specified

Communication Mode R/W R

SSID Setting R/W R

Ad-hoc Channel R/W R

Security Method R/W R

Restore Defaults R/W N/A


10
"Wireless LAN" settings are available only if the optional Wireless LAN interface unit is installed.
File Transfer

Not
Settings Specified
Specified

Delivery Option R/W R

SMTP Server R/W R

SMTP Authentication R/W R

POP before SMTP R/W R

284
System Settings

Not
Settings Specified
Specified

Reception Protocol R/W R

POP3 / IMAP4 Settings R/W R

Admin. E-mail Address R/W N/A

E-mail Communication Port R/W R

E-mail Recept. Interval R/W R

Max. Recept. E-mail Size R/W R

E-mail Storage in Server R/W R

Default User Name / PW (Send) R/W R

Auto Specify Sender name R/W R

Fax E-mail Account R/W R

Scanner Resend Time R/W R

Scanner Resend R/W R

The settings made for "Main Delivery Server IP Address" and "Sub Delivery Server IP Address" in
"Delivery Option" can only be displayed, not changed.
The passwords for "SMTP Authentication" and "Default User Name / PW (Send)" can be entered or
changed but not displayed.
Administrator Tools

Settings Not Specified Specified


10
Address Book Management R/W R/W

Prgrm./Change/Delete Group R/W R/W

Address Book:Print List R/W R/W

Display / Print Counter R/W R/W

Disp./Print User Counter R/W R/W

User Auth. Management R/W R

Admin. Auth Management R/W R

285
10. Appendix

Settings Not Specified Specified

Key Counter Management R/W R

Extended Security R/W R

Prog / Change / Del LDAP Server R/W R

LDAP Search R/W R

Prog./ Change / Delete Realm R/W R

AOF(Always On) R/W R

Service Mode Lock R/W R

Firmware Version R R

Delete All Logs R/W R

Transfer log Setting R/W N/A

Fixed USB Port R/W R

The password for "Program / Change / Delete LDAP Server" can be entered or changed but not
displayed.

10

286
User Settings - Web Image Monitor Settings

User Settings - Web Image Monitor Settings


This section displays the user settings that can be specified on Web Image Monitor when user authentication
is specified. Settings that can be specified by the user vary according to the menu protect level and available
settings specifications.

10

287
10. Appendix

Device Settings
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
System

Not
Settings Specified
Specified

General Settings : Device Name R/W R

General Settings : Comment R/W R

General Settings : Location R/W R

Spool Printing R/W N/A

Paper Tray Priority : Copier R/W R

10 Paper Tray Priority : Fax R/W R

Paper Tray Priority : Printer R/W R

Paper

Not
Settings Specified
Specified

Tray1 : Paper Size R/W R

Tray1 : Paper Type R/W R

Tray1 : Apply Auto Paper Select R/W R

288
Device Settings

Not
Settings Specified
Specified

Tray1 : Apply Duplex R/W R

Tray2 : Paper Size R/W R

Tray2 : Paper Type R/W R

Tray2 : Apply Auto Paper Select R/W R

Tray2 : Apply Duplex R/W R

Tray3 : Paper Size R/W R

Tray3 : Paper Type R/W R

Tray3 : Apply Auto Paper Select R/W R

Tray3 : Apply Duplex R/W R

Bypass Tray : Paper Size R/W R

Bypass Tray : Custom Paper Size R/W R

Bypass Tray : Paper Type R/W R

Date/Time

Not
Settings Specified
Specified

Set Date R/W R

Set Time R/W R


10
SNTP Server Name R/W R

SNTP Polling Interval R/W R

Time Zone R/W R

Timer

Not
Settings Specified
Specified

Auto Off Timer R/W R

289
10. Appendix

Not
Settings Specified
Specified

Energy Saver Timer R/W R

System Auto Reset Timer R/W R

Copier Auto Reset Timer R/W R

Facsimile Auto Reset Timer R/W R

Scanner Auto Reset Timer R/W R

Printer Auto Reset Timer R/W R

Auto Logout Timer R/W R

Logs

Not
Settings Specified
Specified

Collect Job Logs R/W R

Job Log Collect Level R/W R

Collect Access Logs R/W R

Access Log Collect Level R/W R

Transfer Logs R R

Encrypt Logs R/W R


10 Classification Code R/W R

Delete All Logs R/W N/A

E-mail

Not
Settings Specified
Specified

Administrator E-mail Address R/W R

Reception Protocol R/W R

E-mail Reception Interval R/W R

290
Device Settings

Not
Settings Specified
Specified

Max. Reception E-mail Size R/W R

E-mail Storage in Server R/W R

SMTP Server Name R/W R

SMTP Port No. R/W R

SMTP Authentication R/W R

SMTP Auth. E-mail Address R/W R

SMTP Auth. User Name R/W N/A

SMTP Auth. Password R/W N/A

SMTP Auth. Encryption R/W R

POP before SMTP R/W R

POP E-mail Address R/W R

POP User Name R/W N/A

POP Password R/W N/A

Timeout setting after POP Auth. R/W R

POP3/IMAP4 Server Name R/W R

POP3/IMAP4 Encryption R/W R

POP3 Reception Port No. R/W R 10


IMAP4 Reception Port No. R/W R

Fax E-mail Address R/W R

Receive Fax E-mail R/W N/A

Fax E-mail User Name R/W N/A

Fax E-mail Password R/W N/A

E-mail Notification E-mail Address R/W R

Receive E-mail Notification R/W N/A

291
10. Appendix

Not
Settings Specified
Specified

E-mail Notification User Name R/W N/A

E-mail Notification Password R/W N/A

File Transfer

Not
Settings Specified
Specified

SMB User Name R/W N/A

SMB Password R/W N/A

FTP User Name R/W N/A

FTP Password R/W N/A

NCP User Name R/W N/A

NCP Password R/W N/A

The passwords for "SMB Password", "FTP Password", and "NCP Password" can be entered or
changed but not displayed.
User Authentication Management

Not
Settings Specified
Specified

10 User Authentication Management R/W R

User Code Authentication - Printer Job Authentication R/W R

User Code Authentication - Available Function R/W R

Basic Authentication - Printer Job Authentication R/W R

Basic Authentication - Available Function R/W R

Windows Authentication - Printer Job Authentication R/W R

Windows Authentication - SSL R/W R

Windows Authentication - Kerberos Authentication R/W R

292
Device Settings

Not
Settings Specified
Specified

Windows Authentication - Domain Name R/W R

Windows Authentication - Realm Name R/W R

Windows Authentication - Group Settings for Windows


R/W R
Authentication

LDAP Authentication - Printer Job Authentication R/W R

LDAP Authentication - LDAP Authentication R/W R

LDAP Authentication - Login Name Attribute R/W R

LDAP Authentication - Unique Attribute R/W R

LDAP Authentication - Available Function R/W R

Integration Server Authentication - Printer Job Authentication R/W R

Integration Server Authentication - SSL R/W R

Integration Server Authentication - Integration Server Name R/W R

Integration Server Authentication - Authentication Type R/W R

Integration Server Authentication - Domain Name R/W R

Integration Server Authentication - Group Settings for Integration


R/W R
Server Authentication

Auto E-mail Notification


10
Not
Settings Specified
Specified

Address List R/W R/W

LDAP Server

Not
Settings Specified
Specified

LDAP Search R/W N/A

Program/Change/Delete R/W N/A

293
10. Appendix

Printer
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Printer Basic Settings
System

Settings Level 1 Level 2

Print Error Report R R

Auto Continue R R

Memory Overflow R R

Rotate by 180 Degrees R R

Print Compressed Data R R

Memory Usage R R

Duplex R R

10 Copies R R

Blank Page Print R R

Edge Smoothing R R

Toner Saving R R

Printer Language R R

Sub Paper Size R R

Letterhead Setting R R

Bypass Tray Setting Priority R R

294
Printer

Settings Level 1 Level 2

Edge to Edge Print R R

Default Printer Language R R

Tray Switching R R

Extended Auto Tray Switching R R

Virtual Printer R R

Host Interface

Settings Level 1 Level 2

I/O Buffer R R

I/O Timeout R R

PCL Menu

Settings Level 1 Level 2

Orientation R R

Form Lines R R

Font Source R R

Font Number R R

Point Size R R
10
Font Pitch R R

Symbol Set R R

Courier Font R R

Extend A4 Width R R

Append CR to LF R R

Resolution R R

PS Menu

295
10. Appendix

Settings Level 1 Level 2

Job Timeout R R

Wait Timeout R R

Data Format R R

Resolution R R

Orientation Auto Detect R R

PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu

Settings Level 1 Level 2

Reverse Order Print R R

Resolution R R

Orientation Auto Detect R R

PDF menu settings are available only if the optional PostScript 3 Unit is installed.
Virtual Printer Settings
System

Settings Level 1 Level 2

Print Error Report R R

10 Job Separation R R

Rotate by 180 Degrees R R

Memory Usage R R

Duplex R R

Copies R R

Blank Page Print R R

Edge Smoothing R R

Toner Saving R R

296
Printer

Settings Level 1 Level 2

Sub Paper Size R R

Input Tray R/W R/W

Page Size R/W R/W

Paper Type R/W R/W

Output Tray R/W R/W

Letterhead Setting R R

Edge to Edge Print R R

PCL Menu

Settings Level 1 Level 2

Orientation R R

Form Lines R R

Font Source R R

Font Number R R

Point Size R R

Font Pitch R R

Symbol Set R R

Courier Font R R 10
Extend A4 Width R R

Append CR to LF R R

Resolution R R

PS Menu

Settings Level 1 Level 2

Job Timeout R R

Wait Timeout R R

297
10. Appendix

Settings Level 1 Level 2

Data Format R R

Resolution R R

Orientation Auto Detect R R

PS menu settings are available only if the optional PostScript 3 Unit is installed.
PDF Menu

Settings Level 1 Level 2

Resolution R R

Orientation Auto Detect R R

PDF menu settings are available only if the optional PostScript 3 Unit is installed.
RHPP Settings

Settings Level 1 Level 2

After Errors Are Solved R/W R/W

When Errors Occur R/W R/W

RHPP Timeout R/W R/W

After Misfed Paper Is Removed R/W R/W

PDF Temporary Password


10
Settings Level 1 Level 2

PDF Temporary Password R/W R/W

Confirm Password R/W R/W

"PDF Temporary Password" settings are available only if the optional PostScript 3 Unit is installed.
PDF Group Password

Settings Level 1 Level 2

Current PDF Group Password N/A N/A

298
Printer

Settings Level 1 Level 2

New PDF Group Password N/A N/A

Confirm PDF Group Password N/A N/A

"PDF Group Password" settings are available only if the optional PostScript 3 Unit is installed.
PDF Fixed Password

Settings Level 1 Level 2

Current PDF Fixed Password N/A N/A

New PDF Fixed Password N/A N/A

Confirm Password N/A N/A

"PDF Fixed Password" settings are available only if the optional PostScript 3 Unit is installed.

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

10

299
10. Appendix

Scanner
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Scan Settings

Settings Level 1 Level 2

Scan Settings: Original Type (Full Color: Text) R/W R

Scan Settings: Original Type (Full Color: Photo) R/W R

Scan Settings: Original Type (Black&White: Text) R/W R

Scan Settings: Original Type (Black&White: Photo) R/W R

Scan Settings: Resolution R R

Scan Settings: Scan Size R R

Scan Size R R

Original Setting R R
10 Original Orientation Priority R R

A.C.S. Sensitivity Level R/W R

Blank Page Detect R R

Destination List Settings

Settings Level 1 Level 2

Destination List Display Priority 1 R R

Destination List Display Priority 2 R R

300
Scanner

Send Settings

Settings Level 1 Level 2

PC Scan Command Standby Time R R

Send File Type R R

Compression (Black & White) R/W R

Compression (Gray Scale/Full Color) R/W R

Print & Delete Scanner Journal R/W R

Max. E-mail Size R R

Divide & Send E-mail R R

Insert Additional E-mail Info R/W R

Default E-mail Subject R R

Administrator Tools

Settings Level 1 Level 2

Display WSD Destination List R R

Prohibit WSD Scan Command R R

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting. 10

301
10. Appendix

Fax
If you have enabled administrator authentication, the menu protection setting determines which functions
and settings are available.
User privileges are as follows:
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
When [Menu Protect] is set to [Off], all the following settings can be viewed and modified.
Fax General Settings

Settings Level 1 Level 2

Fax Header N/A N/A

Own Name N/A N/A

Own Fax Number N/A N/A

Switch Reception Mode N/A N/A

2 Sided Print R/W N/A

Checkered Mark R/W N/A

Center Mark R/W N/A

Print Reception Time R/W N/A


10 Paper Tray R/W N/A

Administrator Tools

Settings Level 1 Level 2

Memory Lock Reception N/A N/A

Program Memory Lock ID N/A N/A

Select Dial/Push Phone N/A N/A

Select Extension/ Outside N/A N/A

Outside Access No. N/A N/A

302
Fax

Fax E-mail Settings

Settings Level 1 Level 2

Internet Fax N/A N/A

Maximum E-mail Size N/A N/A

SMTP RX File Delivery Settings N/A N/A

IP-Fax Settings

Settings Level 1 Level 2

Enable H.323 N/A N/A

Enable IP-Fax Gatekeeper N/A N/A

Gatekeeper Address (Main) N/A N/A

Gatekeeper Address (Sub) N/A N/A

Own Fax No. N/A N/A

Enable SIP N/A N/A

Enable Server N/A N/A

User Name N/A N/A

Server IP Address: Proxy Server Addr. (Main) N/A N/A

Server IP Address: Proxy Server Address (Sub) N/A N/A

Server IP Address: Redirect Svr. Addr. (Main) N/A N/A 10


Server IP Address: Redirect Svr. Addr. (Sub) N/A N/A

Server IP Address: Registrar Address (Main) N/A N/A

Server IP Address: Registrar Address (Sub) N/A N/A

Digest Authentication N/A N/A

IP-Fax Gateway Settings

Settings Level 1 Level 2

Prefix 1-10 N/A N/A

303
10. Appendix

Settings Level 1 Level 2

Select Protocol 1-10 N/A N/A

Gateway Address 1-10 N/A N/A

Parameter Settings

Settings Level 1 Level 2

Just Size Printing N/A N/A

Combine 2 Originals N/A N/A

Convert to PDF When Transferring to Folder N/A N/A

Journal N/A N/A

Immediate Transmission Result Report N/A N/A

Communication Result Report N/A N/A

Memory Storage Report N/A N/A

SEP Code RX Result Report N/A N/A

SEP Code RX Reserve Report N/A N/A

LAN-Fax Result Report N/A N/A

Inclusion of Part of Image N/A N/A

Error E-mail Notification N/A N/A

10 Display Network Errors N/A N/A

Journal Notification by E-mail N/A N/A

Response to RX Notice Request N/A N/A

Select Destination Type Priority N/A N/A

• The default for Menu Protect is [Level 2].


• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.

304
Interface

Interface
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Interface Settings

Not
Settings Specified
Specified

Ethernet : Ethernet Security R/W R

Ethernet: Ethernet Speed R/W R

USB R/W R

Wireless LAN Settings

Not
Settings
Specified
Specified 10
LAN Type R/W N/A

Communication Mode R/W R

SSID R/W R

Channel R/W N/A

Security Method R/W R

WEP Authentication R/W N/A

WEP Key Number R/W R

305
10. Appendix

Not
Settings Specified
Specified

WEP Key R/W R

WPA Encryption Method R/W R

WPA Authentication Method R/W R

WPA-PSK/WPA2-PSK R/W R

WPA/WPA2 Settings R/W R

"Wireless LAN Settings" are available only if the Wireless LAN interface unit is installed.

10

306
Network

Network
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
IPv4

Not
Settings Specified
Specified

Host Name R/W R

DHCP R/W R

Domain Name R/W R

IPv4 Address R/W R

Subnet Mask R/W R

DDNS R/W R 10
WINS R/W R

Primary WINS Server R/W R

Secondary WINS Server R/W R

Scope ID R/W R

Default Gateway Address R/W R

DNS Server R/W R

LPR R/W R

307
10. Appendix

Not
Settings Specified
Specified

RSH/RCP R/W R

DIPRINT R/W R

FTP R/W R

sftp R/W R

WSD (Device) R/W R

WSD (Printer) R/W R

WSD (Scanner) R/W R

IPP R/W R

WSD (Printer) / IPP Timeout R/W R

RHPP R/W R

IPv6

Not
Settings Specified
Specified

IPv6 R/W R

Host Name R/W R

Domain Name R/W R


10 Stateless Address R/W R

Manual Configuration Address R/W R

DHCPv6-lite R/W R

DDNS R/W R

Default Gateway Address R/W R

DNS Server R/W R

LPR R/W R

RSH/RCP R/W R

308
Network

Not
Settings Specified
Specified

DIPRINT R/W R

FTP R/W R

sftp R/W R

WSD (Device) R/W R

WSD (Printer) R/W R

WSD (Scanner) R/W R

IPP R/W R

WSD (Printer) / IPP Timeout R/W R

RHPP R/W R

NetWare

Not
Settings Specified
Specified

NetWare R/W R

Print Server Name R/W R

Logon Mode R/W R

File Server Name R/W R

NDS Tree R/W N/A


10
NDS Context Name R/W R

Operation Mode R/W R

Remote Printer No. R/W N/A

Job Timeout R/W N/A

Frame Type R/W R

Print Server Protocol R/W R

NCP Delivery Protocol R/W R

309
10. Appendix

AppleTalk

Not
Settings Specified
Specified

AppleTalk R/W R

Printer Name R/W R

Zone Name R/W R

SMB

Not
Settings Specified
Specified

SMB R/W R

Workgroup Name R/W R

Computer Name R/W R

Comment R/W R

Notify Print Completion R/W R

Bonjour

Not
Settings Specified
Specified

Bonjour R/W R
10 Computer Name R/W R

Location R/W R

DIPRINT R/W R

LPR R/W R

IPP R/W R

310
Webpage

Webpage
The settings available to the user depend on whether or not administrator authentication is enabled.
If administrator authentication is enabled, the settings available to the user depend on whether or not "Items"
has been specified.
User privileges are as follows:
• Abbreviations in the table heads
Not Specified = Authorized user when "Items" have not been specified.
Specified = Authorized user when "Items" have been specified.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Webpage

Not
Settings Specified
Specified

Language 1 R/W R

Language 2 R/W R

URL 1 R/W R

URL 2 R/W R

Set Help URL Target R/W R

WSD / UPnP Setting R/W R 10


Download Help File R/W R/W

311
10. Appendix

Functions That Require Options


The following functions require certain options and additional functions.
• Hard Disk overwrite erase function
DataOverwriteSecurity Unit
• PDF Direct Print function
PostScript 3 Unit
• Hard Disk data encryption function
HDD Encryption Unit

10

312
Trademarks

Trademarks
Microsoft®, Windows®, Windows Server®, Windows Vista®, and Outlook® are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Netscape, and Netscape Messenger are either registered trademarks or trademarks of Netscape
Communications Corporation in the United States and/or other countries.
Lotus, and Lotus Notes are either registered trademarks or trademarks of IBM Corporation in the United
States and/or other countries.
Netware, IPX, IPX/SPX are either registered trademarks or trademarks of Novell, Inc.
UPnPTM is a trademark of the UPnPTM Implementers Corporation.
PCL® is a registered trademark of Hewlett-Packard Company.
Monotype is a registered trademark of Monotype Imaging, Inc.
Apple, AppleTalk, Bonjour, Macintosh, and Mac OS are trademarks of Apple Inc., registered in the U.S.
and other countries.
Solaris is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other
countries.
LINUX® is the registered trademark of Linus Torvalds in the U.S. and other countries.
RED HAT is a registered trademark of Red Hat, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
* The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional 10
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
* The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
* The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business

313
10. Appendix

Microsoft® Windows Vista® Home Premium


Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
* The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
* The product names of Windows Server 2003 R2 are as follows:
Microsoft® Windows Server® 2003 R2 Standard Edition
Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
* The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter

10

314
INDEX
A Encrypting the Data in the Address Book..........120
Encryption Key Auto Exchange / Manual Settings
Access Control.....................................................163 - Shared Settings.................................................192
Address Book Privileges.....................................267 Encryption Key Auto Exchange Security Level........
Administrator..........................................................17 ..............................................................................192
Administrator Authentication...................17, 23, 25 Encryption Key Auto Exchange Setting Items..........
..............................................................................194
Administrator Privileges......................................... 25
Encryption Key Auto Exchange Settings
AH Protocol.........................................................191 Configuration Flow.............................................200
AH Protocol + ESP Protocol................................191 Encryption Key Manual Settings Configuration
Authenticate Current Job....................................221 Flow......................................................................205
Authentication and Access Limits..........................16 Encryption Key Manual Settings Items..............197
Authentication by IEEE802.1X...........................215 Encryption Technology.........................................16
Authentication Using an External Device............97 Enhance File Protection....................................... 219
authfree................................................................214 Enhanced Security..............................................228
Auto Erase Memory............................................132 ESP Protocol.........................................................190
Auto Logout............................................................95 Extended Security Functions...............................217
Available Functions.............................................147
F
B
Fax........................................................................302
Basic Authentication..............................................48 Fax Features........................................................278
C File Administrator...................................................22
File Administrator Settings..................................263
Change Firmware Structure................................222
Full Control..........................................................267
Configuring Address Book Access Permissions.......
..............................................................................118 I
Configuring User Authentication..........................39 If User Authentication is Specified........................90
Copier Features...................................................271 Installing the Device Certificate (Issued by a
Creating the Device Certificate (Issued by a Certificate Authority)...........................................184
Certificate Authority)...........................................183 Integration Server Authentication......................... 78
D Interface...............................................................305
Device Settings....................................................288 IP Address..............................................................11
Disabling Log Transfer to Web IPsec.....................................................................190
SmartDeviceMonitor...........................................150 IPsec Settings.......................................................192
Display...................................................................10 IPsec telnet Setting Commands..........................206
Driver Encryption Key................................176, 218 L
E Laws and Regulations...........................................12
E-mail Encryption................................................110 LDAP Authentication..............................................70
Edit........................................................................267 LDAP Authentication - Operational Requirements
Edit / Delete........................................................267 for LDAP Authentication........................................70
Electronic Signature............................................112 Locked Print............................................................99
Enabling and Disabling Protocols......................164 Log off (Administrator)..........................................33
Enabling the Encryption Settings........................124 Log on (Administrator)..........................................32
Encrypt Address Book.........................................218 Login.......................................................................17
Encrypting Data on the Hard Disk.....................124 Logout.....................................................................17

315
M Security Measures.................................................18
Self-Signed Certificate........................................182
Machine Administrator.........................................22
Service Mode Lock.............................................225
Machine Administrator Settings.........................248
Setting Up the Machine........................................14
Menu Protect.......................................................141
Settings SNMPv1 and v2...................................220
Message..............................................................235
Simple Encryption...............................................220
N SNMPv3..............................................................188
Network...............................................................307 Specifying a Group Password for PDF Files..... 178
Network Administrator..........................................22 Specifying an IPP Authentication Password......179
Network Administrator Settings.........................258 Specifying Login Details........................................56
Network Security Level.......................................172 Specifying Menu Protect.....................................143
Note.......................................................................11 SSL........................................................................185
Notice.......................................................................9 SSL (Secure Sockets Layer)................................181
SSL/TLS Encryption.............................................186
O Supervisor......................................................22, 241
Operational Issues..............................................237 Symbols..................................................................10
Options................................................................312 System Settings....................................................281
P T
Password Policy...................................................221 telnet.....................................................................214
Preventing information leaks..............................223 Trademarks..........................................................313
Printer...................................................................294 Transfer to Fax Receiver.....................................220
Printer Features....................................................272 Transmitted Passwords........................................176
Printer Job Authentication.....................................87 Type of Administrator..........................................141
Printer Job Authentication Levels..........................87 U
Printer Job Types....................................................88
Printing the Encryption Key.................................126 Update Firmware................................................222
User..................................................................17, 37
R User Administrator...............................................267
Read-only............................................................267 User Administrator Settings................................265
Registered User.............................................17, 267 User Authentication..................................17, 38, 41
Registering the Administrator................................27 User Code Authentication.....................................42
Remote Diagns.(Fax)...........................................221 User Lockout Function...........................................93
Remote Service....................................................221 User Settings - Control Panel Settings................270
Restrict Adding User Dest...................................219 W
Restrict Use of Dest..............................................218
Restrict User Info.Display....................................219 Web Image Monitor Settings.............................287
Restricting Destinations.......................................107 Webpage............................................................311
Windows Authentication.......................................60
S Windows Authentication - Operational
S/MIME..............................................................110 Requirements for Kerberos Authentication..........60
Scanner................................................................300 Windows Authentication - Operational
Requirements for NTLM Authentication...............60
Scanner Features.................................................276
Security Functions..................................................13

316 GB GB EN USA AE AE D069


Copyright © 2008
Operating Instructions Security Reference

Type for 917/LD117/MP 171/Aficio MP 171


Type for 917F/LD117F/MP 171F/Aficio MP 171F
Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF

EN USA D069-6951
UNIX Supplement

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your
safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy
place for quick reference.

Important
Contents of this manual are subject to change without prior notice. In no event will the company be li-
able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper-
ating the machine.

Notes
This manual covers several different models, and therefore contains functions and settings that may
not be available for your model.
Functions and supported operating systems may differ from those of your model.

Trademarks
UNIX is a registered trademark of The Open Group.
PostScript is registered trademark of Adobe Systems, Incorporated.
Sun, SunOS and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S.
and other countries.
HP-UX and PCL are registered trademarks of Hewlett-Packard Company.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
RED HAT is a registered trademark of Red Hat, Inc.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
TABLE OF CONTENTS
How to Read This Manual .....................................................................................2
Symbols .....................................................................................................................2

1. UNIX Configuration
Before Setup...........................................................................................................3
Using the lp / lpr commands.......................................................................................3
Using the rsh / rcp / ftp commands ............................................................................3
Using the Installation Shell Script........................................................................ 4
Assigning the IP Address ...........................................................................................5
Executing the Installation Shell Script ........................................................................6
After Executing the Installation Shell Script ...............................................................8
Printing Method....................................................................................................14
Printing with lpr, lp....................................................................................................14
Printing with rsh, rcp, ftp........................................................................................... 15
Printer Status .......................................................................................................17
Viewing the Print Job Status with lpq and lpstat ......................................................17
Viewing the Printer Status with rsh and ftp ..............................................................17
Copying Information to a File ...................................................................................18
Specifying the Device Option .............................................................................19
Configuring the Device Option .................................................................................19
Printer Language...................................................................................................... 22
Text Printing .............................................................................................................22
Input Tray .................................................................................................................23
Paper Size................................................................................................................24
Paper Type...............................................................................................................25
Output Tray ..............................................................................................................26
Copies ......................................................................................................................26
Collating ...................................................................................................................27
Duplex Printing......................................................................................................... 27
Binding .....................................................................................................................28
Orientation................................................................................................................29
Image Direction ........................................................................................................29
Resolution ................................................................................................................30
Billing Code ..............................................................................................................30
User Code ................................................................................................................31
Symbol Set...............................................................................................................32

INDEX......................................................................................................... 34

1
How to Read This Manual

Symbols
This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations
of likely causes of paper misfeeds, damage to originals, or loss of data. Be sure
to read these explanations.

Indicates supplementary explanations of the machine’s functions, and instruc-


tions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find fur-
ther relevant information.
[]
Indicates the names of keys that appear on the machine’s display panel.
{}
Indicates the names of keys on the machine’s control panel.

2
1. UNIX Configuration

This section explains how to set up a network printer and check print status us-
ing UNIX.

Before Setup
Important
❒ To print from a UNIX workstation, use a file that the printer supports.
Setting up varies depending on the printing commands. Make sure to make set-
tings accordingly.

Using the lp / lpr commands


A Use the installation shell script to register the device option, as well as the
printer host name and the IP address.
See p.4 “Using the Installation Shell Script”.

B Start printing.
See p.14 “Printing Method”.

Using the rsh / rcp / ftp commands


A Edit the host file to register the printer host name and the IP address.
B Start printing.
See p.14 “Printing Method”.
Reference
See p.8 “After Executing the Installation Shell Script” for host file editing.
Note
❒ If you cannot edit the host file, use the install shell script to register the host
name.

3
UNIX Configuration

Using the Installation Shell Script


The installation shell script helps with the setup process. The installation shell
1 script automates some of the tasks in configuring /etc/hosts, /etc/printcap; cre-
ating the spool directory for BSD UNIX; and running the lpadmin command for
System V UNIX.
Important
❒ The installation shell script can be used on the following workstations: (it can-
not be used with other types of workstations.)
• SunOS 4.x.x
• Solaris 2.x(Sun OS 5.x), Solaris 7, Solaris 8
• HP-UX
• Redhat Linux
• UnixWare
• OpenServer
Note
❒ Depending on security settings when installed, rsh / rcp /telnet may not be
usable with Red Hat 7.1 or later. Change the security level to allows use of rsh
/ rcp /telnet. For details about how to change the setting, see the operating
instructions for Red Hat.
❒ When you use NIS (Network Information Service) or DNS, you should con-
figure the server before running the installation shell script.
❒ Installation shell script does not support CUPS. For details about the settings
of CUPS, see the manual that comes with the UNIX workstation , and the
CUPS' manual.
❒ When you use Solaris and HP-UX, you can set UNIX configuration with ad-
mintools that came with Solaris and HP-UX. For details about setting using
the admintools, see the admintool's manual.
Reference
For details about the configuration utility of your operating system, see the
manual that came with the utility.

4
Using the Installation Shell Script

Assigning the IP Address


Important
❒ Configure the machine to use TCP/IP. 1
• Make sure that TCP/IP on the machine is set to active. (Default setting is
active.)
• Assign an IP address to the machine and configure the other settings re-
quired for TCP/IP.
Reference
For details about how to make the above settings, see the manual that comes
with this machine.

Checking the IP address configuration


Follow the procedure below to make sure that the IP address has been config-
ured correctly.
• The following procedure uses the sample IP address: 192.168.15.16.

A Enter the following:


# ping 192.168.15.16
If the address has been configured correctly, the following message appears:
192.168.15.16 is alive
If the address has been configured incorrectly, the following message ap-
pears:
no answer from 192.168.15.16
Note
❒ When you use NIS, the IP address and host name are written to /etc/hosts
on the master server. When you use DNS, the information is written to a
data file on the name server. After writing the host name and IP address to
the file, make sure that the configuration is correct by pinging the host.
# ping host_name
❒ If the host name is registered with an IP address, the server can access the
printer using its host name instead of its IP address.

5
UNIX Configuration

Executing the Installation Shell Script


Having configured the printer IP address, follow the procedure below to execute

1
the installation shell script and set up the workstation printing environment.
Important
❒ Before executing the installation shell script, the IP address, host name and
printer name are required.
❒ The following procedures use the sample IP address: 192.168.15.16; sample
host name: nphost; and sample printer name: np.
❒ Download the installation shell script from our Web site. Keep the installation
shell script as local folders.

A Move to the directory that has kept the installation shell script.
B Run the installation shell script.
# sh ./install
Insert a period and slash before the current directory.

C Enter a number to select the workstation operating system that you are us-
ing.
Network printer install shell
Select your workstation OS type
1.SunOS 4.x.x
2.Solaris 2.x, Solaris 7-9 (SunOS5.x)
3.HP-UX
4.UnixWare
5.Linux
6.OpenServer
7.Quit
Enter <1-7>:
2
If you select “7”, the installation shell script ends.

D Enter the printer's IP address.


Enter Printer host IP address <xxx.xxx.xxx.xxx> [re-
turn=skip]:
192.168.15.16
If the host name of the printer has already been configured, press the {RE-
TURN} ( {ENTER} ) key. Nothing will be added to the /etc/hosts file.

E Enter the printer's host name.


Enter Printer host name : nphost
If no IP address was entered in step D, nothing is added to the /etc/hosts file.

6
Using the Installation Shell Script

F Configure the printer name.


Enter logical printer name [default nphost_prn]
If you want to use the default name, press the {RETURN} ( {ENTER} ) key. En-
ter a new name, if you want to use a different one.
The host name entered in step E followed by “_prn” appears in “default”.
1
G Set the print option.
Enter remote printer name [default lp]:
• Press the {RETURN} ( {ENTER} ) key, and printing with PostScript is ena-
bled.
• If you want to set the device option, enter the option parameter.
Enter remote printer name [default lp]:tray=tray1
• If you enter “text”, text printing is enabled.
If you enter “text”, printing with PostScript is disabled.
Enter remote printer name [default lp]:text
You can enter up to 14 characters for HP-UX 11.0, 256 for Solaris 8 and Red
Hat Linux 7.0, and 51 for Red Hat Linux 6.2.
After setup with the installation shell script is complete, and if you entered
the IP address in step D, the following message appears:
hosts file is modified

H Perform a test print to make sure that the settings are correct.
# lpr -Pnp file_name
# lp -d np file_name
Note
❒ SunOS, UnixWare, and OpenServer appear on the screen, but they are not
supported. Use Solaris, HP-UX, or Linux.
❒ The IP address will be added to the /etc/hosts file.
❒ The host name will be added to the /etc/hosts file.
❒ When printing with the lp command, use ( _ ) instead of ( = ) and ( ; ) in-
stead of ( , ) for operating systems that cannot use ( = ) and ( , ) such as So-
laris 2.5 or later.
Reference
For details about how to download the installation shell script, contact
your sales or service representative.
For details about lpr and lp, see p.14 “Printing Method”.
For details about the device option, see p.19 “Specifying the Device Op-
tion”.

7
UNIX Configuration

Deleting the printer


To print using the lp or lpr command, the option specified when the installation
shell script is executed is used. Change the option in accordance with the work-
1 station you are using.

❖ BSD UNIX workstation, Linux


Delete the printer entry from /etc/printcap, and then execute the installation
shell script again. Select options during the setup process.
Alternatively, search the printer entry from /etc/printcap, and change its rp
capability to option setting.

❖ Solaris, HP-UX
Delete the printer entry, and then execute the installation shell script again.
Select options during the setup process. To delete the printer entry, follow the
procedure below:
A Stop the scheduler.
# /usr/sbin/lpshut
B Delete the printer.
# /usr/sbin/lpadmin -x printer_name
C Restart the scheduler.
# /usr/lib/lpsched

After Executing the Installation Shell Script


The printing environment is set up automatically when the installation shell
script is executed.
This section describes setup contents when the installation shell script is execut-
ed under Red Hat Linux, Solaris, and HP-UX.

8
Using the Installation Shell Script

Linux

❖ Adding the IP address and host name to the /etc/hosts file


The following line is added to the /etc/hosts file. The IP address and printer
host name which you previously entered in the installation script will be 1
used:
192.168.15.16 nphost # Network Printer
• 192.168.15.16 is the IP address, nphost is the host name, from # to the end
of the line is the comment.
Note
❒ The /etc/hosts file contains a list of the IP addresses and host names of all
hosts communicating on the network. Each entry is delimited with a space
or a tab, and each line is separated with a return.
❒ If you do not use NIS or DNS, you must manually enter the IP address and
host name of each workstation using the network printer in the /etc/hosts
file.

❖ Adding an entry to the /etc/printcap file


The following entry is added to the /etc/printcap file, which is the configu-
ration for printing with the lpr command. In order to use the lpr command to
print, you need to edit the /etc/hosts file, add an entry for the network print-
er to the /etc/printcap file and create a spool directory:
##PRINTTOOL3## REMOTE
np|Network Printer:\
:rm=nphost:\
:rp=option:\
:sd=/var/spool/lpd/npd:\
:lf=/var/log/npd-errs:\
:sh:\
:mx#0:

9
UNIX Configuration

Note
❒ The /etc/printcap file is used to register the name and attributes of a print-
er. You must make an entry for the network printer in the /etc/printcap
file of all workstations using the network printer.
1 ❒ You must make an entry for each printer option when using the same
printer.
❒ Each entry is separated with colons into several fields. The syntax is to be-
gin each entry with a colon, followed by the entry, and then end with a co-
lon, a back slash, and then a return.
❒ The first line of the field is the name of the printer. You use this name when
logging on to a network printer from a workstation. You can define several
different names by separating each name with the “|” character.
❒ The second and following lines contain the printer's attributes. Attributes
are represented by two-character names referred to as capabilities. For de-
tails about capabilities, see the following table:
Capability Explanation Value required for the network
printer.
rm Host name of the printer. The host name that was registered
with the /etc/hosts file.
rp Optional specification. Select options for printing. For de-
“lp” will be assigned, if the option tails about available options, see
is not used. p.19 “Specifying the Device Op-
tion”.
sd Path name of the spool directory. Path name of the spool directory
that is to be created.
lf Path name of the log file. Path name of the log file.
For example /var/log/lpd-errs.
mx Maximum file size which the di- None, or something suitable.
rectory can copy. When set to 0, the
size is unlimited. If nothing is en-
tered, the size is set to 1024 k.

10
Using the Installation Shell Script

❖ Making the spool directory


Create a spool directory under /var/spool/lpd. The name of the spool direc-
tory should be the name of the printer followed by a “d”.
Note
❒ The spool directory is used to control data used for print jobs. For example, 1
when a print job is created, a temporary copy of the data used is created in
the spool directory. All workstations accessing the network printer need to
have a spool directory for the network printer.
❒ A spool directory should be made for every network printer entry listed in
the /etc/printcap file.
❒ The spool directory should normally be made under /var/spool/lpd and
the name should match that listed under the sd capability in /etc/print-
cap. Change the owner and group of the directory to root and lp. The fol-
lowing examples show how to make a /var/spool/lpd/npd spool
directory:
# cd /var/spool/lpd
# mkdir npd
# chown root npd
# chgrp lp npd

❖ Making the log file


Error messages are logged to a file created in the /var/log directory. The log
file name is the printer name followed by “d-errs”.
Note
❒ The log file is used for logging errors or warning messages by the UNIX
workstation.
❒ The log file should be made for every network printer entry listed in the
/etc/printcap file.
❒ The log file should normally be made under /var/log directory and the
name should match that listed under the lf capability in /etc/printcap.
Change the owner and group of the log file to root and lp. The following
examples show how to make a /var/log/npd-errs file:
# cd /var/log
# touch npd-errs
# chown root npd-errs
# chgrp lp npd-errs

11
UNIX Configuration

Solaris

❖ Adding the IP address and host name to the /etc/hosts file


1 The following line is added to the /etc/hosts file. The IP address and printer
host name previously entered in the installation script will be used.
192.168.15.16 nphost # Network Printer
• 192.168.15.16 is the IP address, nphost is the host name, from # to the end
of the line is the comment.
Note
❒ The /etc/hosts file contains a list of IP addresses and host names of all
hosts communicating on the network. Each entry is delimited with a space
or a tab, and each line is separated with a return.
❒ If you do not use NIS or DNS, you must manually enter the IP address and
host name of each workstation using the network printer in the /etc/hosts
file.

❖ Registering the printer


The installation shell script registers the printer as a remote printer following
the procedure below:
A If your workstation is Solaris 2.5.1, register the print server and print client
to the print service.
# lpsystem -t bsd -R 0 -y Network Printer nphost
B Register the printer as a remote printer.
# lpadmin -p np -s nphost!option -T dump -I any
• np is the printer name, nphost is the host name. For details about “op-
tion”, see p.19 “Specifying the Device Option”.
“lp” will be assigned, if the option is not used.
When printing with the lp command, use ( _ ) instead of ( = ) and ( ; )
instead of ( , ) for operating systems that cannot use ( = ) and ( , ) such as
Solaris 2.5 or later.
C If your workstation is Solaris 2.5.1, set the print job to active so it can be ac-
cepted by the print queue.
/usr/lib/accept np
D If your workstation is Solaris 2.5.1, set the print job to active to print.
/usr/lib/enable np

12
Using the Installation Shell Script

HP-UX

❖ Adding the IP address and host name to the /etc/hosts file


The following line is added to the /etc/hosts file. The IP address and printer
host name previously entered in the installation script will be used: 1
192.168.15.16 np # Network Printer
• 192.168.15.16 is the IP address, np is the host name, from # to the end of
the line is the comment.
Note
❒ The /etc/hosts file contains a list of IP addresses and host names of all
hosts communicating on the network. Each entry is delimited with a space
or a tab, and each line is separated with a return.
❒ If you do not use NIS or DNS, you must manually enter the IP address and
host name of each workstation using the network printer in the /etc/hosts
file.

❖ Registering the printer


The installation shell script registers the printer as a remote printer following
the procedure below:
A Stop the scheduler.
/usr/lib/lpshut
B Register the printer.
/usr/lib/lpadmin -Pnp -v/dev/null -mrmodel
-ormnphost -orpoption -ob3
• np is the printer name, nphost is the host name.
For details about “option”, see p.19 “Specifying the Device Option”.
“lp” will be assigned, if the option is not used.
C Set the printer so the print job is listed in the print queue.
/usr/lib/accept np
D Set the printer to perform the print job.
/usr/lib/enable np
E Restart the scheduler.
/usr/lib/lpsched

13
UNIX Configuration

Printing Method

1 Printing with lpr, lp


Execute one of the following commands according to type of workstation used:

❖ BSD UNIX workstation, Linux


% lpr -Pprinter_name file_name [file_name...]
For example:
The printer name is np, file names are file1 and file2
% lpr -Pnp file1 file2

❖ Solaris, HP-UX
% lp -d printer_name file_name [file_name...]
For example:
The printer name is np, file names are file1 and file2
% lp -d np file1 file2
Note
❒ “printer_name” is the name entered when executing the installation shell
script.
❒ You can use wild cards ( * or ? ) for the file name.
❒ The message “print session full” appears when the maximum number of
print requests has been reached (max. 5 sessions —Job Spool setting availa-
ble). You should try to print again when the number of requests is less than
five. You can check the number of print requests using telnet. For details
about using telnet, see the manual that comes with this machine.
❒ The number of print sessions does not change, whether you increase or re-
duce the machine's total memory size.

14
Printing Method

Printing with rsh, rcp, ftp


You can also print using the rsh, rcp and ftp commands.
Note 1
❒ Print using a format the printer supports.
❒ You should try to print again when the number of requests is zero.
❒ The message “print session full” appears when the maximum number of
print requests is reached.
❒ The maximum number of print sessions varies depending on the command.
When using the rsh, rcp command, the maximum number of print sessions is
5; when using the ftp command, the number is 3.

rsh
% rsh host_name print < file_name
For example:
host name is nphost, file name is file1
% rsh nphost print < file1
Note
❒ “host_name” is the name entered when executing the installation shell script.
❒ If you are using HP-UX, use the remsh command instead of rsh.

rcp

❖ To specify and print the file


% rcp file_name [file_name...] host_name:
For example:
host name is nphost, file names are file1 and file2
% rcp file1 file2 nphost:

❖ To print all of the files in a directory


% rcp -r directory_name host_name:
For example:
host name is nphost, directory name is directory
% rcp -r directory1 nphost:
Note
❒ “host_name” is the name entered when executing the installation shell script.
❒ You can use wild cards ( * or ? ) for the file name.

15
UNIX Configuration

ftp
Use the put or mput commands depending on the number of files to be printed.

1 Important
❒ File names cannot contain “=” or “,”.
❒ You can use wild cards ( * or ? ) for the file name with the mput command.

❖ To print one file


ftp> put file_name

❖ To print several files


ftp> mput file_name [file_name...]
The following procedure shows an example of how to print a file using ftp.
It is not possible to set options with the mput command:

A Start ftp using the IP address or host name of the printer.


% ftp IP_address

B Enter the user name. Skip the password, and then press the {RETURN} ( {EN-
TER} ) key.
Name:
Password:

C Set the file transfer mode to binary.


ftp> bin
If the file transfer mode is not set to binary, the image may not be printed cor-
rectly.

D Print the file.


For example, to print the file named file1:
ftp> put file1
For example, to print the two files named file1 and file2:
ftp> mput file1 file2

E Exit ftp.
ftp> bye

16
Printer Status

Printer Status
You can use the following commands to have information and printer status dis-
played or copied to a file.
Use the lpq or lpstat command to display the status of the printer or information
1
about print jobs.
Use the rsh, rcp or ftp commands to get more detailed information from the
printer.

Viewing the Print Job Status with lpq and lpstat


❖ BSD UNIX workstation, Linux
% lpq -Pprinter_name
For example: Printer name is np
% lpq -Pnp

❖ System V UNIX, Solaris, HP-UX


% lpstat -o printer_name
For example: Printer name is np
% lpstat -o np
Note
❒ If you are using HP-UX, do not put a space between “-o” and “printer
name”.

Viewing the Printer Status with rsh and ftp


Use the rsh or ftp command to display printer status or information about print
jobs using specified parameters.
You can use these commands for BSD and System V UNIX.
If your workstation is HP-UX, use the remsh command instead of rsh.
• rsh
% rsh host_name parameter
• ftp
% ftp host_name
User user_name
password:
ftp> get parameter -

17
UNIX Configuration

Parameters that can be used with rsh, rcp and ftp :


Parameter Information returned
Status of the printer.
stat
1 info
Information about print jobs.
Information about the paper tray, output tray and printer language.
prnlog Record of the last 10 jobs printed.
syslog Record of messages about the network interface board.

Note
❒ Leave the user name and password blank, and then press the {RETURN} ( {EN-
TER} ) key.
❒ “-” indicates standard output. Display will be displayed on screen if standard
output has not been specified.

Copying Information to a File


Use the rcp or ftp command to copy information about specified parameters to
a file.
You can use these commands for BSD and System V UNIX.
Important
❒ The same parameters are used as those above.
• rcp
% rcp host_name:parameter file_name
• ftp
% ftp host_name
User: user_name
password:
ftp> get parameter file_name
Note
❒ Leave the user name and password blank, and then press the {RETURN} ( {EN-
TER} ) key.

18
Specifying the Device Option

Specifying the Device Option


With the following options, you can print with specific printer functions.
This manual covers all models, and therefore contains functions and settings
that may not be available for your model.
1

Configuring the Device Option


Important
❒ The optional character strings the printer can recognize contain a maximum
of 512 bytes.
❒ The number of available characters used as options is limited, depending on
operating systems.
The configuration of the print option varies, depending on printing commands.
• rsh
% rsh host_name print option1=value1,... < file_name
• rcp
% rcp file_name host_name:option1=value1,...
• ftp
ftp> put file_name option1=value1,...
Host_name is the printer host name. File_name is the file name you want to print.
The device option is specified in the form of “option=value”. For details about
types of device options and values, see the following explanations.
For example, the following settings are for printing with rsh, rcp, and ftp : switch
to PostScript, feed paper from paper feed tray 1, set the printing amount to 3 sets,
and print with the resolution set to 600 dpi (host_name :nphost, file_name :file1).
• rsh
% rsh nphost print filetype=postscript,tray=tray1,cop-
ies=3,resolution=600 < file1
• rcp
% rcp file1 nphost:filetype=postscript,tray=tray1,cop-
ies=3,resolution=600
• ftp
ftp> put file1 filetype=postscript,tray=tray1,cop-
ies=3,resolution=600

19
UNIX Configuration

Note
❒ Multiple options must be separated by commas (,). Do not use spaces.
❒ When the printing file contains the PostScript commands control of the op-
tion, the command takes priority.
1 ❒ Enter the option using the lp or lpr command, when the shell script is imple-
mented. The option settings made here are configured as default. You must
create another printer if you want to change printer option settings. For de-
tails about changing the configured option, see p.8 “Deleting the printer”.
❒ When printing with the lp command, use ( _ ) instead of ( = ) and ( ; ) instead
of ( , ) for operating systems that cannot use ( = ) and ( , ) such as Solaris 2.5 or
later.

Using the cd command with ftp


For printing with ftp, if the option is specified using the cd command, it becomes
available whenever the put or mput command is used.
ftp> cd option
Note
❒ The pwd command shows the current option settings.
ftp> pwd

20
Specifying the Device Option

List of the device options

Device option Value Function summary.


filetype pcl, postscript (rps), pdf Specifies the printer language
for printing. 1
filter text Specifies the text printing.
tray tray1~tray3, bypass, all Specifies the input tray.

paper a4, a5, jisb5, legal, letter, Specifies the paper size.
halfletter, executive, fgl, fools-
cap, folio, com10, monarch,
C5, C6, dl, k16, custom
mediatype plainorrecycled, plain, recy- Specifies the paper type.
cled, special, thick, thin, trans-
parency, color, letterhead,
preprinted, prepunched, la-
bels, bond, cardstock, auto
outbin upper Specifies the output tray.
copies Number of copies (1–999) Specifies the number to col-
late.
qty Number of collated sets (1– Specifies the number to cop-
999) ies.
duplex on, off Specifies whether duplex
printing is on or off.
binding longedge, shortedge, left, Specifies the binding direction
right, top for duplex printing.
orientation portrait, landscape Specifies the feed direction of
the paper.
image direction normal, reverse Specifies the print image rota-
tion.
resolution value of resolution (300, 600) Specifies the resolution for
printing.
billing code Value of billing code Specifies the billing code.
(0x09(<HT>), 0x20-0xFF (ex-
pect 0x22))
user code Value of user code (0x21 to Specifies the user code.
0x7e, except 0x22)
symbol set desktop, iso4, iso6, iso11, Specify the set of print charac-
iso15, iso17, iso21, iso60, ters.
iso69, isol1, isol2, isol5, legal,
math8, mspubl, pc8, pc850,
pc852, pc8dn, pc8tk, pifont,
psmath, pstext, roman8, vn-
intl, vnmath, vnus, win30,
winl1, winl2, winl5

21
UNIX Configuration

Printer Language
Select a printer language to print.

1 filetype=printer language
fil=printer language
Printer language Value
PCL 5c or PCL 5e pcl
PostScript 3 postscript or rps
PDF pdf

The following sample shows how to print with PostScript 3 (host name: nphost,
file name: file1):
• rsh
% rsh nphost print filetype=postscript < file1
• rcp
% rcp file1 nphost:filetype=postscript
• ftp
ftp> put file1 filetype=postscript

Text Printing
Set this function when printing text files directly.
filter=text
The following sample shows how to print text files directly.
• rsh
% rsh nphost print filter=text < file1
• rcp
% rcp file1 nphost:filter=text
• ftp
ftp> put file1 filter=text

22
Specifying the Device Option

Input Tray
Select a default input tray.
Important 1
❒ Only installed input trays are available.
tray=value of input tray
Input tray Value
Tray 1 tray1
Tray 2 tray2
Tray 3 tray3
Bypass tray bypass
Auto Tray Select all

The following sample shows how to print from tray 2 (host name: nphost, file
name: file1):
• rsh
% rsh nphost print tray=tray2 < file1
• rcp
% rcp file1 nphost:tray=tray2
• ftp
ftp> put file1 tray=tray2

23
UNIX Configuration

Paper Size
Select the paper size.

1 Important
❒ Only the loaded paper sizes are available.
❒ When PostScript 3 is selected in Printer Language, and a custom paper size
that exceeds “297x418.4 mm” is specified, a printout is counted as an A3 size
output. Be careful if you are using the charge option, etc.
paper=value of paper size
Paper size Value
A4 a4
A5 a5
B5JIS (Japanese Industrial Standard) jisb5
81/2 × 11 letter

51/2 × 81/2 halfletter

81/2 × 14 legal

71/4 × 101/2 executive

8 × 13 fgl
81/2 × 13 foolscap

81/4 × 13 folio

41/8 × 91/2 com10

6.38 × 9.02 (162 × 229 mm) C5


4.49 × 6.38 (114 × 162 mm) C6
4.33 × 8.66 (110 × 220 mm) dl

37/8 × 71/2 monarch

7.68 × 10 1/2 (195 × 267 mm) k16

Custom size custom

The following sample shows how to print using A4 size paper (host name:
nphost, file name: file1):
• rsh
% rsh nphost print paper=a4 < file1
• rcp
% rcp file1 nphost:paper=a4
• ftp
ftp> put file1 paper=a4

24
Specifying the Device Option

Paper Type
Select the paper type.
Important 1
❒ Only the loaded paper types are available.
mediatype=value of paper type
Paper type Value
Plain paper/recycled paper plainorrecycled
Plain paper plain
Recycled paper recycled
Special paper special
Thick paper thick
OHP transparency transparency
Color paper color
Letterhead letterhead
Preprinted paper preprinted
Prepunched paper prepunched
Labels labels
Bond paper bond
Cardstock cardstock
Auto Paper Select auto

The following sample shows how to print using recycled paper (host name:
nphost, file name: file1):
• rsh
% rsh nphost print mediatype=recycled < file1
• rcp
% rcp file1 nphost:mediatype=recycled
• ftp
% ftp> put file1 mediatype=recycled

25
UNIX Configuration

Output Tray
Select the output tray.

1 outbin=value of output tray


Important
❒ Only installed output trays are available.
Value
upper

Reference
For details about available output tray, see the manual that comes with this
machine.
The following sample shows how to print to the standard tray (standard tray:
upper, host name: nphost, file name: file1):
• rsh
% rsh nphost print outbin=upper < file1
• rcp
% rcp file1 nphost:outbin=upper
• ftp
ftp> put file1 outbin=upper

Copies
Specify the number of copies.
copies=number of copies (1 to 999)
Important
❒ Do not specify “copies” and “qty *1 ” commands at the same time.
*1 “qty” specifies the number of collated sets.
The following sample shows how to print 10 copies (host name: nphost, file
name: file1):
• rsh
% rsh nphost print copies=10 < file1
• rcp
% rcp file1 nphost:copies=10
• ftp
ftp> put file1 copies=10

26
Specifying the Device Option

Collating
Specify the number of collated sets.
qty=number of collated sets (1 to 999)
1
The following sample shows how to print 10 copies using the collate function
(host name: nphost, file name: file1):
• rsh
% rsh nphost print qty=10 < file1
• rcp
% rcp file1 nphost:qty=10
• ftp
ftp> put file1 qty=10

Duplex Printing
This option enables duplex printing.
Important
❒ The duplex unit is required.
duplex=value of duplex printing
Duplex printing Value
enable on
disable off

The following sample shows how to set duplex printing (host name: nphost, file
name: file1):
• rsh
% rsh nphost print duplex=on,binding=longedge < file1
• rcp
% rcp file1 nphost:duplex=on,binding=longedge
• ftp
ftp> put file1 duplex=on,binding=longedge
Note
❒ Before selecting duplex, the binding option must be set to on.
❒ Data and paper volume affect the completion of the print job.
Reference
For details about available paper size for duplex printing, see the manual that
comes with this machine.

27
UNIX Configuration

Binding
Select the binding direction for duplex printing.

1 Important
❒ The duplex unit is required.
binding=value of binding
Binding direction Value
Longedge longedge
Shortedge shortedge
Left left
Right right
Top top

The following sample shows how to set duplex printing and long-edge binding
(host name: nphost, file name: file1):
• rsh
% rsh nphost print duplex=on,binding=longedge < file1
• rcp
% rcp file1 nphost:duplex=on,binding=longedge
• ftp
ftp> put file1 duplex=on,binding=longedge
Note
❒ Before selecting the binding option, the duplex option must be set to on.
❒ Data and paper volume affect completion of the print job.

28
Specifying the Device Option

Orientation
Select the paper feed orientation.
Important 1
❒ This function is only for PCL.
orientation=feed direction (portrait or landscape)
Orientation value
Portrait portrait
Landscape landscape

The following sample shows how to print the paper vertically using the orienta-
tion function (host name : nphost, file name : file1):
• rsh
% rsh nphost print orientation=portrait < file1
• rcp
% rcp file1 nphost:orientation=portrait
• ftp
ftp> put file1 orientation=portrait

Image Direction
Select the print image rotation.
imagedirection=value of print image rotation
Rotation Value
0 degree normal
180 degrees reverse

The following sample shows how to print the 180 degrees rotation using the im-
agedirection function (host name : nphost, file name : file1):
• rsh
% rsh nphost print imagedirection = reverse < file1
• rcp
% rcp file1 nphost: imagedirection = reverse
• ftp
ftp> put file1 imagedirection = reverse

29
UNIX Configuration

Resolution
Select the printing resolution.

1 resolution=value of resolution
Resolution Value
600 dpi 600
400 dpi 400

The following sample shows how to print with 600 dpi and better quality. (host
name: nphost, file name: file1):
• rsh
% rsh nphost print resolution=600 < file1
• rcp
% rcp file1 nphost:resolution=600
• ftp
ftp> put file1 resolution=600

Billing Code
Specifies the billing code.
billingcode=Value of billingcode (0x09(<HT>), 0x20-0xFF
(except 0x22)) *1
*1
MAX 228 bytes = 255byte (Max number of characters allowed for each PJL command
line on GW-PJL source) - 27 bytes (number of characters for @PJL SET BILLING-
CODE = ""<CR><LF>)
• rsh
% rsh nphost print billingcode=0x09 < file1
• rcp
% rcp file1 nphost: billingcode=0x09
• ftp
ftp> put file1 billingcode=0x09
Note
❒ Note that PJL syntax allows unlimited spaces (for example, more than one
space can be placed between "@PJL" and "SET," or before/after the "=" sign).
❒ Therefore, a password can be less than the maximum value (228 bytes).
❒ This also implies the maximum value (228 bytes) is secured as long as the nor-
mal syntax is used.

30
Specifying the Device Option

User Code
Specifying the user code.
Usercode=\"value of user code\"
1
Specify the user code using up to eight alphanumeric characters (0x21 to 0x7e,
except 0x22).
The user code must be inside double quotation marks (" ").
Some operating systems cannot forward the user code if it is inside double quo-
tation marks. If this is the case, include escape characters such as back slashes (\)
(0x5c) in place of double quotation marks.
• rsh
% rsh nphost print usercode=/"12345/" < file1
• rcp
% rcp file1 nphost: usercode=/"12345/"
• ftp
ftp> put file1 USERCODE=/"12345/"
Note
❒ If you are printing with the ftp command, enter the user code in uppercase
letters.

31
UNIX Configuration

Symbol Set
Select the set of print characters for the chosen font.

1 Important
❒ This function is only for PCL.
symset=value of font
Font Value
Desktop desktop
ISO 4 iso4
ISO 6 iso6
ISO 11 iso11
ISO 15 iso15
ISO 17 iso17
ISO 21 iso21
ISO 60 iso60
ISO 69 iso69
ISO L1 isol1
ISO L2 isol2
ISO L5 isol5
Legal legal
Math-8 math8
MS Publ mspubl
PC-8 pc8
PC-850 pc850
PC-852 pc852
PC-8 D/N pc8dn
PC8-TK pc8tk
Pifont pifont
PS Math psmath
PS Text pstext
Roman-8 roman8
VN Intl vnintl
VN Math vnmath
VN US vnus
Win 3.0 win30
Win L1 winl1

32
Specifying the Device Option

Font Value
Win L2 winl2
Win L5 winl5

The following sample shows how to print the ISO 4 character set (host name : 1
nphost, file name : file1):
• rsh
% rsh nphost print symset=iso4 < file1
• rcp
% rcp file1 nphost:symset=iso4
• ftp
ftp> put file1 symset=iso4

33
INDEX
B L
Billing code, 30 Linux
Binding Deleting the printer, 8
Option, 28 Printer Status, 17
BSD UNIX workstation Printing Method, 14
Deleting the printer, 8 lp
Printer Status, 17 Printing, 14
Printing Method, 14 lpr
Printing, 14
C
O
Collating
Option, 27 Orientation
configuration Option, 29
UNIX, 3 Output Tray
Copies Option, 26
Option, 26
P
D
Paper Size
Deleting the printer, 8 Option, 24
Device Option, 19 Paper Type
Duplex Printing Option, 25
Option, 27 Printer Language
Option, 22
F Printer Status, 17
ftp, 17
ftp rsh, 17
Printing, 16 Printing Method, 14
Printing with rsh, rcp, ftp, 15
H
How to Read This Manual, 2 R
HP-UX rcp
Deleting the printer, 8 Printing, 15
Printer Status, 17 Resolution
Printing Method, 14 Option, 30
Rotation
I Option, 29
Image direction rsh
Option, 29 Printing, 15
Input Tray
Option, 23
Installation Shell Script, 4, 6, 8
IP Address, 5

34
S
Solaris
Deleting the printer, 8
Printer Status, 17
Printing Method, 14
Symbol Set
Option, 32
System V UNIX
Printer Status, 17

T
Text Printing
Option, 22

U
UNIX, 3
User code
Option, 31

35
36 GB GB EN USA AE AE D468-6801
Copyright © 2008
UNIX Supplement

GB GB
EN USA
AE AE D468-6801
Operating Instructions
Troubleshooting

1 When the Machine Does Not Operate As Wanted


2 Troubleshooting When Using the Copy Function
3 Troubleshooting When Using the Facsimile Function
4 Troubleshooting When Using the Printer Function
5 Troubleshooting When Using the Scanner Function
6 Clearing Misfeeds
7 Appendix

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
TABLE OF CONTENTS
Documentation for This Machine.......................................................................................................................1
Manuals for This Machine.................................................................................................................................5
Notice..................................................................................................................................................................7
Important.........................................................................................................................................................7
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
Name of Major Item......................................................................................................................................8
Notes...............................................................................................................................................................9
Laws and Regulations......................................................................................................................................10
Legal Prohibition..........................................................................................................................................10
1. When the Machine Does Not Operate As Wanted
Indicators..........................................................................................................................................................11
Panel Tone........................................................................................................................................................12
When the Function Status Indicator Lights Up in Red....................................................................................13
When You Have Problems Operating the Machine.....................................................................................15
When a Job Is Not Performed.........................................................................................................................19
2. Troubleshooting When Using the Copy Function
Messages Displayed When Using the Copy Function..................................................................................21
When You Cannot Make Clear Copies.........................................................................................................23
When You Cannot Make Copies As Wanted...............................................................................................26
When Memory Is Full..................................................................................................................................29
3. Troubleshooting When Using the Facsimile Function
Adjusting the Volume.......................................................................................................................................31
Messages Displayed When Using the Facsimile Function............................................................................34
When You Cannot Send or Receive Fax Messages As Wanted.................................................................45
When Memory Is Full..................................................................................................................................50
If an Error Report Is Printed..............................................................................................................................52
Turning Off the Main Power / In the Event of Power Failure.......................................................................53
When an Error Occurs Using Internet Fax.....................................................................................................54
Error Mail Notification.................................................................................................................................54
Error Report (E-mail)....................................................................................................................................54
Server-Generated Error E-mail...................................................................................................................54

2
4. Troubleshooting When Using the Printer Function
Messages Displayed When Installing the Printer Driver...............................................................................55
Windows 2000...........................................................................................................................................55
Windows XP Professional or Windows Server 2003/2003 R2.............................................................55
Windows XP Home Edition.........................................................................................................................56
Windows Vista.............................................................................................................................................56
Windows Server 2008...............................................................................................................................57
If USB Connection Fails...................................................................................................................................58
Messages Displayed When Using the Printer Function.................................................................................59
Status Messages..........................................................................................................................................59
Alert Messages............................................................................................................................................60
Printing the Error Log....................................................................................................................................61
When You Cannot Print...................................................................................................................................63
When the Data In Indicator Does Not Light Up or Flash..........................................................................65
Other Printing Problems...................................................................................................................................67
5. Troubleshooting When Using the Scanner Function
When Scanning Is Not Done As Expected....................................................................................................77
When You Cannot Send Scanned Files.........................................................................................................79
When You Cannot Browse the Network to Send a Scan File..................................................................79
When the TWAIN Driver Cannot Be Started............................................................................................79
When the Network Delivery Function Cannot Be Used...........................................................................79
When S/MIME Cannot Be Used...............................................................................................................80
When You Cannot Send Scan Files Using WSD......................................................................................80
Operations Are Not Possible When Messages Are Displayed...............................................................81
Messages Displayed When Using the Scanner Function.............................................................................82
Messages Displayed on the Control Panel When Using the Scanner Function.....................................82
Messages Displayed on the Client Computer...........................................................................................89
6. Clearing Misfeeds
Removing Jammed Paper................................................................................................................................93
When A is displayed...................................................................................................................................94
When P is displayed....................................................................................................................................95
When Y1 is displayed.................................................................................................................................95
When Y2 is displayed.................................................................................................................................96

3
7. Appendix
Trademarks.......................................................................................................................................................97
INDEX.............................................................................................................................................................99

4
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.

• Media differ according to manual.


• The printed and electronic versions of a manual have the same contents.
• Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files.
• A Web browser must be installed in order to view the html manuals.
About This Machine
Before using the machine, be sure to read the section of this manual entitled Safety Information.
This manual introduces the machine's various functions.
It also explains the control panel, preparation procedures for using the machine, how to enter text,
and how to install the CD-ROMs provided, and how to replace paper, toner, and other consumables.
Troubleshooting
Provides a guide for resolving common usage-related problems.
Copy Reference
Explains Copier functions and operations. Also refer to this manual for explanations on how to place
originals.
Facsimile Reference
Explains Facsimile functions and operations.
Printer Reference
Explains Printer functions and operations.
Scanner Reference
Explains Scanner functions and operations.
Network and System Settings Guide
Explains how to connect the machine to a network, configure and operate the machine in a network
environment, and use the software provided. Also explains how to change User Tools settings and
how to register information in the Address Book.
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. For enhanced
security, we recommend that you first make the following settings:
• Install the Device Certificate.

5
• Enable SSL (Secure Sockets Layer) Encryption.
• Change the user name and password of the administrator using Web Image Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or user and administrator
authentication.
PostScript 3 Supplement
Explains how to set up and use PostScript 3.
Other manuals
• UNIX Supplement
• Quick Reference Copy Guide
• Quick Reference Fax Guide
• Quick Reference Printer Guide
• Quick Reference Scanner Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide

• Manuals provided are specific to machine types.


• For "UNIX Supplement", please visit our Web site or consult an authorized dealer. This manual
includes descriptions of functions and settings that might not be available on this machine.
• The following software products are referred to using general names:

Product name General name

DeskTopBinder Lite and DeskTopBinder Professional *1 DeskTopBinder

*1 Optional

6
Notice
Important

In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.

7
How to Read This Manual
Symbols

This manual uses the following symbols:

Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.

Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.

This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.

Indicates instructions in book form.

Indicates instructions in sheet form.

Indicates instructions stored in a file on a provided CD-ROM.

Indicates online instructions available through the Web.

Name of Major Item

Major item of this machine is referred to as follows in this manual:


• Auto Document Feeder ADF

8
Notes

Contents of this manual are subject to change without prior notice.


Two kinds of size notation are employed in this manual. With this machine refer to the inch version.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your
local dealer.

9
Laws and Regulations
Legal Prohibition

Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.

10
1. When the Machine Does Not Operate
As Wanted
This chapter describes basic troubleshooting procedures that are applicable to all functions of this machine.

1
Indicators
This section describes the indicators light up when the machine requires the user to remove misfed paper,
to add paper, or to perform other procedures.

Indicator Status

: Error indicator Appears when there is a misfeed, a cover is left open, or


another problem occurs.
See p.93 "Clearing Misfeeds".

: Load Paper indicator Appears when paper runs out.


See "Loading Paper", About This Machine .

: Add Toner indicator Appears when toner runs out.


See "Adding Toner", About This Machine .

11
1. When the Machine Does Not Operate As Wanted

Panel Tone
The following table describes the meaning of the various beep patterns that the machine produces to alert
1 users about left originals and other machine conditions.

Beep pattern Meaning Cause

Single short beep. A valid operation is A control panel key was pressed, the
accepted. machine was switched on, or a
document was placed on the ADF.

Two long beeps. Machine has warmed up. After cooling or being switched on, the
machine has fully warmed up and is
ready for use.

Five short beeps repeated Strong alert. The machine requires user attention
five times. because paper has jammed, the toner
needs replenishing, or other problems
have occurred.

• Users cannot mute the machine's beep alerts. When the machine beeps to alert users of a paper jam
or toner request, if the machine's covers are opened and closed repeatedly within a short space of
time, the beep alert might continue, even after normal status has resumed.
• You can select to enable or disable beep alerts. For details about Panel Key Sound, see "System
Settings", Network and System Settings Guide .

12
When the Function Status Indicator Lights Up in Red

When the Function Status Indicator Lights Up in


Red
When a function key is lit in red, press the corresponding function key. Then, follow the instructions displayed
1
on the control panel.
If an error occurs in the function you are using, check the message that appears on the control panel, and
then refer to "Messages Displayed" for the relevant function.
The following table explains problems that cause the indicator to light.

Problem Cause Solution

Documents and reports do The paper output tray is full. Remove the prints from the tray.
not print out.

Documents and reports do There is no paper left. Load paper. See "Loading Paper",
not print out. About This Machine .

An error has occurred. The function whose indicator Record the code number shown in the
is lit is defective. display and contact your service
representative. See "Messages
Displayed" of each chapter.
You can use other functions normally.

The machine is unable to A network error has • Check the displayed message and
connect to the network. occurred. take an appropriate action. See
"Messages Displayed" of each
chapter.
• Check that the machine is correctly
connected to the network, and that
the machine is correctly set. For
details about how to connect the
network, see "Connecting the
Machine", Network and System
Settings Guide .
• Contact the network administrator.
• When the function key is still lit in
red, even if you take the measures
above, contact your service
representative.

13
1. When the Machine Does Not Operate As Wanted

• p.21 "Messages Displayed When Using the Copy Function"


• p.34 "Messages Displayed When Using the Facsimile Function"
1 • p.59 "Messages Displayed When Using the Printer Function"
• p.82 "Messages Displayed When Using the Scanner Function"

14
When You Have Problems Operating the Machine

When You Have Problems Operating the


Machine
This section describes common problems and messages.
1
If other messages appear, follow the instructions displayed.

Problem Cause Solution

Although the copier screen Functions other than the Wait a little longer.
appears when the machine is copier function are not yet
turned on using the main ready.
power switch, it cannot be
switched to another screen by
pressing the [Facsimile],
[Printer], or [Scanner] key.

The machine has just been Functions other than the Wait a little longer.
turned on and the User Tools copier function are not yet
screen is displayed, but the ready. Time required varies
User Tools menu has items by function. Functions appear
missing. in the User Tools menu when
they become ready for use.

The operation switch This occurs in the following • Close the ADF.
indicator continues blinking cases: • Check if the machine is
and does not turn off when • The exposure glass communicating with external
pressed. cover or ADF is open. equipment.
• The machine is • Wait a little longer.
communicating with
external equipment.
• The hard disk is active.

The display is difficult to see. Screen contrast is not Adjust the screen's contrast so that you
adjusted. can see the display panel properly. See
"General Features", Network and
System Settings Guide .

The display is off. The machine is in Energy Turn on the operation switch.
Saver mode.

The display is off. The operation switch is turned Turn on the operation switch.
off.

15
1. When the Machine Does Not Operate As Wanted

Problem Cause Solution

Nothing happens when the The main power switch is Turn on the main power switch.
operation switch is turned on. turned off.
1
"Please wait." appears. This message appears when Wait for a while. If the machine does not
you turn on the operation get ready in a minute, contact your
switch. service representative.

"Please wait." appears. If the machine has not been in • Wait for a while. If the machine
use for a long time, it may take does not get ready in a couple of
longer than normal to print or minutes, contact your service
start up when switched on. representative.
• Wait until the message disappears.
Do not turn off the main power
switch while the message is
showing.

"Please wait." appears. This message appears when Wait for a while. If the message does not
you change the toner disappear in two minutes, contact your
cartridge. service representative.

The user code entry screen is Users are restricted by User Enter the user code (up to eight digits),
displayed. Code Authentication. and then press the [OK] or [ ] key.

The Authentication screen Basic Authentication, Enter your login user name and user
appears. Windows Authentication, password. See "When the
LDAP Authentication or Authentication Screen is Displayed",
Integration Server About This Machine .
Authentication is set.

Authentication failed. The entered login user name Inquire the user administrator for the
or login password is not correct login user name and login
correct. password.

Authentication failed. Cannot access the Contact the administrator.


authentication server when
using Basic Authentication,
Windows Authentication,
LDAP Authentication, or
Integration Server
Authentication.

16
When You Have Problems Operating the Machine

Problem Cause Solution

"Temperature Alert. Turn The temperature inside the Locate the machine in an environment
main power off, adjust room machine is too high or too where the temperature remains between
temp. and wait a while before low. 10 and 32°C. See "Where to Put Your 1
restarting." appears, and Machine", About This Machine .
printing is disabled.

"You do not have the The use of the function is Contact the administrator about the
privileges to use this function." restricted to authenticated permission for the required function.
appears. users only.

An error message remains, • When a misfeed Remove misfed paper, and then open
even if misfed paper is message appears, it and close the cover. See p.93
removed. remains until you open "Removing Jammed Paper".
and close the cover as
required.
• Paper is still jammed in
the tray.

Original images are printed You may have loaded the Load paper correctly. Place paper in the
on the reverse side of the paper incorrectly. paper tray with the print side up. Bypass
paper. tray with the print side down. See
"Loading Paper", About This Machine
.

Misfeeds occur frequently. The tray's side or end fences • Remove the misfed paper. See
may not be set properly. p.93 "Removing Jammed
Paper".
• Check the side or end fences are
set properly. Also, check the side
fences are locked. See "Changing
the Paper Size", About This
Machine .

Misfeeds occur frequently. Copy paper size setting is not Set the proper paper size. See "Tray
correct. Paper Settings", Network and System
Settings Guide and "Recommended
Paper Sizes and Types", About This
Machine .

Cannot print in duplex mode. Duplex printing cannot be When using duplex printing, make
done with paper set in the settings to use paper from a tray other
bypass tray. than the bypass tray.

17
1. When the Machine Does Not Operate As Wanted

Problem Cause Solution

Cannot print in duplex mode. You have selected a tray that Select a paper tray in [Tray Paper
is set to [Off] for duplex Settings] under [System Settings], and
1 printing in [Tray Paper then press the [OK] key. Then, select [No
Settings] under [System Display (Plain Paper)] or [Recycled
Settings]. Paper] for Paper Type, press [Duplex],
and then select [On]. See "Tray Paper
Settings", Network and System Settings
Guide

• If you cannot make copies as you want because of paper type, paper size, or paper capacity
problems, use recommended paper. See "Recommended Paper Sizes and Types", About This
Machine .

18
When a Job Is Not Performed

When a Job Is Not Performed


If you are not able to carry out your job, it may be that the machine is being used by another function.
Wait until the current job is completed before trying again. In certain cases, you can carry out another job 1
using a different function while the current job is being performed. Performing multiple functions
simultaneously like this is called "Multi-accessing".
Combination Chart
Function Compatibility
The chart shows Function Compatibility when [Print Priority] is set to [Interleave]. For details about
Print Priority, see "System Settings", Network and System Settings Guide .
: Simultaneous operations are possible.
: Operation is enabled when the relevant function key is pressed and remote switching (of the
scanner) is done.
: Operation is performed automatically once the preceding operation ends.
: The operation must be started once the preceding operation ends. (Simultaneous operations are
not possible.)

19
1. When the Machine Does Not Operate As Wanted

BQP001S

*1 You can scan a document once the preceding job documents are all scanned.
*2 During parallel reception, any subsequent job is suspended until reception is completed.

• If the machine is capable of executing multiple functions simultaneously, specify which function should
have priority in "Print Priority". This setting is factory-preset to [Display mode]. For details about Print
Priority, see "System Settings", Network and System Settings Guide .
• While printing is in progress, scanning a document using another function may take longer than usual.

20
2. Troubleshooting When Using the
Copy Function
This chapter describes likely causes of and possible solutions for copier function problems.

Messages Displayed When Using the Copy 2


Function
This section describes the machine's main messages. If other messages appear, follow the instructions they
contain.

• If you cannot make copies as you want because of the paper type, paper size or paper capacity
problems, use recommended paper. See "Recommended Paper Sizes and Types", About This
Machine .
• For messages that are not listed here, see "When You Have Problems Operating the Machine".

• p.15 "When You Have Problems Operating the Machine"

Message Cause Solution

"Authentication failed." The entered login user name Inquire the user administrator for the
or login password is not correct login user name and login
correct. password.

"Authentication failed." Cannot access the Contact the administrator.


authentication server when
using Basic Authentication,
Windows Authentication ,
LDAP Authentication, or
Integration Server
Authentication.

"Cannot copy. Original is The scanner function is in use. Cancel the current scan job. To do this,
being scanned by another press the [Clear/ Stop] key on the
function." scanner screen to display the message
"Clear/Stop key was pressed. Stop
scanning?", and then press [Stop].

21
2. Troubleshooting When Using the Copy Function

Message Cause Solution

"Cannot dup. copy this size." Duplex mode does not Duplex mode supports the following
support the selected paper paper sizes: A4 , B5 JIS , 81/2×14
size. , 81/2×13, 81/2×11 , 81/4×14
, 81/4×13 , 16K . Select one of

2 these sizes. For details, see "Duplex


Copying", Copy Reference .

"Cannot select Bypass Tray in The specified function is not Select a paper tray other than the
current setting." available with the bypass bypass tray.
tray.

"Cannot sort this size." The specified paper size is not This message appears when the bypass
available with the Sort tray is selected.
function. Use copy paper that is not longer than
356 mm (14").

"Max. number of sets is nn." The number of copies You can change the maximum copy
(A figure is placed at nn.) exceeds the maximum copy quantity from [Max. Number of Sets]
quantity. under [Copier Features]. For details
about Max. Copy Quantity, see "User
Tools Menu", Copy Reference .

"Original with this length The specified custom length is Do not place originals that are longer
cannot be duplex scanned." not available for duplex than 356 mm (14").
printing from the ADF (e.g., 2
Sided 2 Sided, 2 Sided
1 Sided, 2 Sided
Combine).

"Size error in Combine The specified paper size is not This message appears when the bypass
mode." available with the Combine tray is selected.
function. Use copy paper that is not longer than
356 mm (14").

"You do not have privileges to The use of this function is Contact the administrator.
use this function." restricted to authentified users
only.

22
When You Cannot Make Clear Copies

When You Cannot Make Clear Copies


This section describes likely causes of and possible solutions for unclear copies.

Problem Cause Solution

Copies appear dirty. Image density is too high. Adjust the image density settings. See
"Adjusting Copy Image Density", Copy
2
Reference .

Copies contain blots or are The machine is not on a level Place the machine on a stable and level
patchy. surface. surface.
Make sure the machine's environment
meets requirements. See "Where to Put
Your Machine", About This Machine
.

Copies contain blots or are The paper is creased, curled, Smooth out the wrinkles from the paper,
patchy. or has blemishes. or replace it. See "Recommended Paper
Sizes and Types" and "Unusable
Paper", About This Machine .

Copies contain blots or are Image density is too light. Adjust the image density. See "Adjusting
patchy. Copy Image Density", Copy Reference
.

Copies contain blots or are The paper is damp. Use paper that has been stored in the
patchy. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Copies are too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .

Copies are too dark or too The image was not printed on Before printing on special paper, check
light. a suitable surface. its surface carefully. Printing on non-print
surfaces reduces print quality and can
damage the machine's internal
components. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .

23
2. Troubleshooting When Using the Copy Function

Problem Cause Solution

Copies are dirty. Use of non-recommended Use manufacturer-genuine toner.


toner can result in loss of print Contact your service representative.
quality and other problems.

The reverse side of an original Image density is too high. Adjust the image density settings. See
2 image is copied. "Adjusting Copy Image Density", Copy
Reference .

A shadow appears on copies Image density is too high. • Adjust the image density settings.
if you use pasted originals. See "Adjusting Copy Image
Density", Copy Reference .
• Change the orientation of the
original.
• Put mending tape on the pasted
part.

The same copy area is dirty The exposure glass, scanning Clean them. See "Maintaining Your
whenever making copies. glass, or ADF is dirty. Machine", About This Machine .

Copies are too light. Image density is too light. Adjust the image density settings. See
"Adjusting Copy Image Density", Copy
Reference .

Copies are too light. A light copy may result when Use recommended paper only and be
you use damp or rough grain sure its storage environment meets the
paper. recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .

Copies are too light. The toner bottle is almost Add toner. See "Adding Toner", About
empty. This Machine .

Parts of images are not The original is not set Set originals correctly. See "Placing
copied. correctly. Originals", Copy Reference .

Parts of images are not The correct paper size is not Select the proper paper size.
copied. selected.

24
When You Cannot Make Clear Copies

Problem Cause Solution

Images appear only partially. The paper is damp. • Do not install the machine in areas
that are susceptible to low
temperatures.
• Use paper that has been stored in
the recommended temperature
and humidity condition. For details
2
about the proper way to store it,
see "Paper Storage", About This
Machine .

White lines appear. The exposure glass or Clean them. See "Maintaining Your
scanning glass is dirty. Machine", About This Machine .

Copies are blank. The original is not set When using the exposure glass, face the
correctly. originals down. When using the ADF,
face them up. See "Placing Originals",
Copy Reference .

A moiré pattern is produced Your original has a dot Place the original on the exposure glass
on copies. pattern image or many lines. at a slight angle.

Black spots appear on the Because of high humidity, the Place the print on the exposure glass in
copy of a photographic print. photographic print has stuck either of the following ways:
to the exposure glass. • Place an OHP transparency on the
exposure glass, and then place the
print on the OHP transparency.
• Place the print on the exposure
glass, and then place two or three
sheets of white paper on it. Leave
the exposure glass cover or ADF
open when copying.

25
2. Troubleshooting When Using the Copy Function

When You Cannot Make Copies As Wanted


This section describes likely causes of and possible solutions for unsatisfactory copy results.

Basic
Problem Cause Solution
2 Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray. See "Loading
Paper", About This Machine .

Misfeeds occur frequently. The paper tray's side fences Push the side fences lightly, and then
are set too tightly. reset it.

Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .

Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .

Misfeeds occur frequently. Printed paper is being used. Do not load sheets that have already
been copied or printed onto by another
machine.

Misfeeds occur frequently. Sheets are sticking together. Fan the sheets thoroughly before
loading them. Alternatively, feed the
sheets into the machine one at a time.

Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

26
When You Cannot Make Copies As Wanted

Problem Cause Solution

Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .

You cannot combine several Selected functions cannot be Check the combination of functions and
functions. used together. make the settings again. See "Function 2
Compatibility", Copy Reference .

Images are skewed. The side fences in the paper Make sure the side fences are set
feed tray are not set properly. properly. For details about how to set the
side fences, see "Changing the Paper
Size", About This Machine .

Images are skewed. The paper is feeding in at a Load the paper correctly. See "Loading
slant. Paper", About This Machine .

Images are skewed. The machine's cover is open. Make sure the right and lower right
covers are properly closed.

Edges of sheets are creased. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Sheets are feeding in Sheets are sticking together. Fan the pages to loosen the paper
together, resulting in jams. before loading it. Alternatively, feed the
paper one sheet at a time.

Edit
Problem Cause Solution

When using the Duplex You set a wide erased Set a narrower margin with User Tools.
Margin function, parts of the margin. You can set the width between 0 - 50
original image are not mm (0" - 2").
copied. See “Copier Features”, Copy Reference
.

When using the Duplex There is a lack of margin Set a narrower margin with User Tools.
Margin function, parts of the space on the opposite side of You can set the width between 0 - 50
original image are not the binding position. mm (0" - 2").
copied. See “Copier Features”, Copy Reference
.

27
2. Troubleshooting When Using the Copy Function

Combine
Problem Cause Solution

When using "Combine", You specified a reproduction When you specify a reproduction ratio
parts of the image are not ratio that does not match the using Manual Paper Select mode, make
copied. sizes of your originals and sure the ratio matches your originals and

2 copy paper. the copy paper. Select the correct


reproduction ratio before using
Combine mode. See "Combined
Copying", Copy Reference .

When using "Combine", Your originals are not Use originals that are identical in size
parts of the image are not identical in size and direction. and direction.
copied.

Copies are not in correct You placed the originals in When placing a stack of originals in the
order. the incorrect order. ADF, the last page should be on the
bottom.
If you place an original on the exposure
glass, start with the first page to be
copied.

Duplex
Problem Cause Solution

Cannot print in duplex mode. You have loaded paper on Remove paper loaded on the bypass
the bypass tray. tray. Load paper in Tray 1 - 3.

Cannot print in duplex mode. You have loaded paper Change the paper.
exceeding 90 g/m2.

Cannot print in duplex mode. You have selected a tray that Select a paper tray in [Tray Paper
is set to [Off] for duplex Settings] under [System Settings], and
printing in [Tray Paper then press [OK]. Then, select [No
Settings] under [System Display (Plain Paper)] or [Recycled
Settings]. Paper] for Paper Type, press [Duplex],
and then select [On]. See "Tray Paper
Settings", Network and System Settings
Guide .

28
When You Cannot Make Copies As Wanted

Problem Cause Solution

Copies are not in correct You placed the originals in When placing a stack of originals in the
order. the incorrect order. ADF, the last page should be on the
bottom.
If you place an original on the exposure
glass, start with the first page to be
copied.
2
When using "Duplex", copy is You placed the originals in Place the original in the correct
made top to bottom even the wrong orientation. orientation. See "Duplex Copying",
though [Top to Top] is Copy Reference .
selected.

Parts of the original image are The margin is too wide. Set a narrower margin with User Tools.
not copied. See "User Tools Menu", Copy Reference
.

Parts of the original image are There is a lack of margin Set a narrower margin with User Tools.
not copied. space on the opposite side of See "User Tools Menu", Copy Reference
the binding position. .

When Memory Is Full

This section describes likely causes of and possible solutions for problems related to full memory.

Message Cause Solution

"Press [Resume] to scan and The machine checked if the To continue copying, remove all copies,
copy remaining originals." remaining originals should be and then press [Resume]. To stop
copied, after the scanned copying, press [Stop].
originals were printed.

29
2. Troubleshooting When Using the Copy Function

30
3. Troubleshooting When Using the
Facsimile Function
This chapter describes likely causes of and possible solutions for facsimile function problems.

Adjusting the Volume


This section describes how to adjust the volume.
You can change the volume of the following sounds that the machine makes. 3
On Hook Mode
Heard when the [On Hook Dial] key is pressed.
At Transmission
Heard when "Immediate Transmission" is performed.
At Reception
Heard when the machine receives a document.
At Dialing
Heard after pressing the [Start] key, until the line connects to the destination.
At Printing
Heard when a received document is printed.

1. Press the [User Tools/Counter] key.

BQP008S

2. Select [Fax Features] using [ ] or [ ], and then press the [OK] key.

31
3. Troubleshooting When Using the Facsimile Function

3. Select [General Settings/Adjust] using [ ] or [ ], and then press the [OK] key.

4. Select [Adjust Sound Volume] using [ ] or [ ], and then press the [OK] key.

5. Select the item you want to adjust using [ ] or [ ], and then press the [OK] key.

6. Select the volume using [ ] or [ ], and then press the [OK] key.

Press the [Escape] key to cancel the setting and the display returns to that of step 5.
7. Press the [User Tools/Counter] key.

BQP008S

The standby display appears.

32
Adjusting the Volume

• You can also adjust the On Hook volume when you press the [On Hook Dial] key. See "On Hook
Dial", Facsimile Reference .
• If the extended security function prevents you from changing this setting, contact the administrator.
• You can set the volume level to between 0 and 7.

33
3. Troubleshooting When Using the Facsimile Function

Messages Displayed When Using the Facsimile


Function
This section describes the machine's main messages. If other messages appear, follow their instructions.

Message Cause Solution

"Authentication failed." Wrong login user name or Confirm correct login user name or

3 password. password.

"Authentication failed." Authentication is not possible Contact the administrator.


from this machine.

"Cannot send fax as scanner The machine is scanning an Before sending the fax, cancel the
is in use by another function." original under another current scan job under the other function.
function. To do this, press the [Clear/Stop] key on
the control panel to display the message
"Clear/Stop key was pressed. Stop
scanning?", and then press [Stop].

"Check whether there are The alias telephone number • In [Fax Features], under [IP-Fax
any network problems." you entered is already Settings], select [H.323 Settings],
[13-10] registered on the gatekeeper and then check the alias telephone
by another device. number is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the network administrator.

"Check whether there are Cannot access gatekeeper. • In [Fax Features], under [IP-Fax
any network problems." Settings], select [H.323 Settings],
[13-11] and then check "Gatekeeper
Address" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the network administrator.

34
Messages Displayed When Using the Facsimile Function

Message Cause Solution

"Check whether there are Registering of user name is • In [Fax Features], under [IP-Fax
any network problems." rejected by SIP server. Settings], select [SIP Settings], and
[13-17] then check "SIP Server IP Address"
and "SIP User Name" are correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
3
• Contact the network administrator.

"Check whether there are Cannot access SIP server. • In [Fax Features], under [IP-Fax
any network problems." Settings], select [SIP Settings], and
[13-18] then check "SIP Server IP Address"
is correctly programmed. You can
also use the Web Image Monitor
for confirmation. See the Web
Image Monitor's Help.
• Contact the network administrator.

"Check whether there are The password registered for Contact the administrator.
any network problems." the SIP server is not the same
[13-24] as the password registered for
this machine.

35
3. Troubleshooting When Using the Facsimile Function

Message Cause Solution

"Check whether there are In [Effective Protocol], the IP • In [System Settings], under
any network problems." address is not enabled, or an [Interface Settings], select
[13-25] incorrect IP address has been [Network], and then check "IPv4"
registered. is programmed to "Active" in
[Effective Protocol]. You can also
use the Web Image Monitor for
confirmation. See the Web Image

3 Monitor's Help.
• In [System Settings], under
[Interface Settings], select
[Network], and then check the IP
address is correctly programmed
in [Machine IPv4 Address]. You
can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the administrator.

"Check whether there are The "Effective Protocol" and • In [System Settings], under
any network problems." "SIP Server IP Address" [Interface Settings], select
[13-26] settings are different, or an [Network], and then check the IP
incorrect IP address has been address is correctly programmed.
registered. You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact the administrator.

36
Messages Displayed When Using the Facsimile Function

Message Cause Solution

"Check whether there are Cannot find the DNS server, • In [System Settings], under
any network problems." SMTP server or folder for [Interface Settings], select
[14-01] forwarding. [Network], and then check the
DNS server is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
3
• In [System Settings], under
[Interface Settings], select
[Network], and then check the host
name or IP address of the SMTP
server is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [SMTP Server],
and then check "Server Name" or
"Port No." is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check that the folder for transfer is
correctly specified.
• Check that the computer in which
the folder for transfer is specified is
operating correctly.
• Check that the LAN cable is
correctly connected to the
machine.
• Check the network connection and
radio wave status.
• Contact your network
administrator.

37
3. Troubleshooting When Using the Facsimile Function

Message Cause Solution

"Check whether there are E-mail transmission was • In [System Settings], under [File
any network problems." refused by SMTP Transfer], select [SMTP
[14-09] authentication, POP before Authentication], [POP before
SMTP authentication or login SMTP], or [Fax E-mail Account],
authentication of the computer and then check that "User Name"
in which the folder for and "Password" are correctly
forwarding is specified. programmed. See "File Transfer",

3 Network and System Settings


Guide . You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check that the user name and
password of the E-mail Account
are correctly programmed from
[File Transfer] under [System
Settings]. See "File Transfer",
Network and System Settings
Guide . You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check that the user ID and
password for the computer in
which the folder for forwarding is
specified are correctly
programmed.
• Check that the folder for
forwarding is correctly specified.
• Check that the computer in which
the folder for forwarding is
specified is correctly operated.
• Contact your network
administrator.

38
Messages Displayed When Using the Facsimile Function

Message Cause Solution

"Check whether there are Neither the machine's nor the • In [System Settings], under [File
any network problems." administrator's e-mail address Transfer], select [Fax E-mail
[14-33] is registered. Account], and then check that
"Email Address" is correctly
programmed. See "File Transfer",
Network and System Settings
Guide . You can also use the
Web Image Monitor for
confirmation. See the Web Image
3
Monitor's Help.
• Contact your network
administrator.

"Check whether there are No POP3/IMAP4 server • In [System Settings], under [File
any network problems." address is programmed. Transfer], select [POP3/IMAP4
[15-01] Settings], and then check "Server
Name" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• Contact your network
administrator.

"Check whether there are Cannot log on to the POP3/ • In [System Settings], under [File
any network problems." IMAP4 server. Transfer], select [Fax E-mail
[15-02] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also
use the Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Contact your network
administrator.

39
3. Troubleshooting When Using the Facsimile Function

Message Cause Solution

"Check whether there are No machine e-mail address is • In [System Settings], under [File
any network problems." programmed. Transfer], select [Fax E-mail
[15-03] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also

3 use the Web Image Monitor for


confirmation. See the Web Image
Monitor's Help.
• Contact your network
administrator.

40
Messages Displayed When Using the Facsimile Function

Message Cause Solution

"Check whether there are Cannot find the DNS server or • In [System Settings], under
any network problems." POP3/IMAP4 server. [Interface Settings], check the IP
[15-11] address of the DNS Server is
correctly programmed. You can
also use the Web Image Monitor
for confirmation. See the Web
Image Monitor's Help.
• In [System Settings], under [File 3
Transfer], select [Reception
Protocol], and then check the
reception protocol is correctly
programmed. You can also use the
Web Image Monitor. See the Web
Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [POP3/IMAP4
Settings], and then check "Server
Name" is correctly programmed.
You can also use the Web Image
Monitor for confirmation. See the
Web Image Monitor's Help.
• In [System Settings], under [File
Transfer], select [E-mail
Communication Port], and then
check the port number of the
POP3/IMAP4 server is correctly
programmed. You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Check the network connection and
radio wave status.
• Check that the LAN cable is
correctly connected to the
machine.
• Contact your network
administrator.

41
3. Troubleshooting When Using the Facsimile Function

Message Cause Solution

"Check whether there are Cannot log on to the POP3/ • In [System Settings], under [File
any network problems." IMAP4 server. Transfer], select [Fax E-mail
[15-12] Account], and then check that
"User Name" and "Password" are
correctly programmed. See "File
Transfer", Network and System
Settings Guide . You can also

3 use the Web Image Monitor for


confirmation. See the Web Image
Monitor's Help.
• In [System Settings], under [File
Transfer], check that the user name
and password for POP before
SMTP authentication are correctly
programmed. See "File Transfer",
Network and System Settings
Guide . You can also use the
Web Image Monitor for
confirmation. See the Web Image
Monitor's Help.
• Contact your network
administrator.

"Connection with LDAP A network error has occurred • Try the operation once more. If the
server has failed. Check the and connection has failed. message is still shown, the network
server status." may be crowded.
• In [System Settings], under
[Administrator Tools], check the
settings of LDAP server. For details,
see "Programming the LDAP
server", Network and System
Settings Guide

"Error occurred, and trans. A document jam occurred Press [Exit], and then resend the pages
was cancelled." during Immediate that have not been sent. If the error
Transmission. There may be a reoccurs frequently, contact your service
problem with the machine or representative.
the telephone line (for
example, noise or cross talk).

42
Messages Displayed When Using the Facsimile Function

Message Cause Solution

"Exceeded max. number of The number of search results Search again after changing the search
search results which can be has exceeded the maximum conditions.
displayed. Max.: nnn" number of items that can be
(A figure is placed at n.) displayed.

" Func. Problems" There is a problem with the Record the code number shown in the
"Data will be initialized." fax. display and contact your service
representative. Other functions can be
used.
3
"LDAP server auth. has The entered user name or Make settings correctly for the user
failed. Check the settings." password does not match that name and the password for LDAP server
specified for LDAP server authentication.
authentication.

"LDAP server search timed A network error has occurred Try the operation once more. If the
out. Check the server status." and connection has failed. message is still shown, the network may
be crowded. Check the information of
[System Settings]. See "Administrator
Tools", Network and System Settings
Guide .

"Memory is full. Scanning The memory is full. If you press [Exit], the machine returns to
will be stopped and only standby mode and starts transmitting the
scanned page(s) will be pages that have been stored.
stored."

"Put original back, check it Original jammed during Place originals that have not been
and press Start key." Memory Transmission. scanned on the exposure glass or ADF
again.

"Sender has not been The sender has not been A sender's name should be specified
specified." specified. before sending e-mail. Send e-mail after
specifying the sender's name.

"Settings have been The destination list is being Wait until the message disappears. Do
updated. The selected dest./ updated from the network not switch off the power while this
functions have been using SmartDeviceMonitor for message is displayed. Depending on the
cancelled." Admin or Web Image number of destinations to be updated,
Monitor. there may be some delay before you
can resume operation. Operations are
not possible while this message is
displayed.

43
3. Troubleshooting When Using the Facsimile Function

Message Cause Solution

"Some page(s) are near The first page of the document The original's blank side might have
blank. To cancel, press the is almost blank. been scanned. Be sure to place your
Stop." originals correctly. For details about
determining the cause of blank pages,
see "Detecting Blank Sheet", Facsimile
Reference .

"Some page(s) are near The first page of the document The original's blank side might have
3 blank." is almost blank. been scanned. Be sure to place your
originals correctly. For details about
determining the cause of blank pages,
see "Detecting Blank Sheet", Facsimile
Reference .

"Specified group contains The specified group contains To select destinations for sending by e-
some invalid dest. Do you some destinations for sending mail, press [Select] for the message
want to select only valid by e-mail. displayed on the e-mail screen.
dest.?"

"Updating the settings...Re- The destination list is being Wait with the main power switch on. The
select dest./functions after updated from the network machine will enter standby mode after it
update finishes." using SmartDeviceMonitor for exits from RDS mode.
Admin or Web Image
Monitor.

"You do not have a privilege Use of this function is Contact the administrator.
to use this function." restricted.

• If "Check whether there are any network problems." appears, the machine is not correctly connected
to the network or the settings of the machine are not correct. If you do not need to connect to a network,
you can specify the setting so this message is not displayed, and then the [Facsimile] key no longer
lights. For details about how to do this, see "Parameter Settings", Facsimile Reference . If you
reconnect the machine to the network, be sure to set "Display" by configuring the appropriate User
Parameter.
• If the paper tray runs out of paper, "Out of paper. Load paper." appears on the display, asking you
to add paper. If there is paper left in the other trays, you can receive documents as usual, even if the
message appears on the display. You can turn this function on or off with "Parameter Settings". For
details about how to do this, see "Parameter Settings", Facsimile Reference .

44
When You Cannot Send or Receive Fax Messages As Wanted

When You Cannot Send or Receive Fax


Messages As Wanted
This section describes likely causes of and possible solutions for transmission and reception-related
problems.

Transmission/Reception
Problem Cause Solution

Both transmission and The modular cord may be Make sure the modular cord is correctly
3
reception are impossible. disconnected. connected. See "Connecting the
Machine to a Telephone Line and
Telephone", Network and System
Settings Guide

Both transmission and The terminal adaptor setting is Check the setting.
reception are impossible. incorrect.

Transmission
Problem Cause Solution

Document appears blank at The original was placed Place it correctly. See "Placing
the other end. upside down. Originals", Facsimile Reference .

Transmission failed due to a The size of the Internet fax Set [Maximum E-mail Size] under [E-
"maximum email size" error. document exceeds the mail Settings] to [Off], or set the
maximum email size maximum e-mail size to a larger value.
specified on the machine. Then, re-send the document. See "E-mail
Settings", Facsimile Reference .

LAN-Fax Driver does not The entered login user name, Check your login user name, password,
work. password, or driver or driver encryption key, and enter them
encryption key is incorrect. correctly. Contact the administrator.

LAN-Fax Driver does not A high security level is set by Contact the administrator.
work. the extended security
function.

Cannot cancel a Memory The document is being Press the [Clear/Stop] key. See
Transmission. scanned. "Canceling a Transmission", Facsimile
Reference .

45
3. Troubleshooting When Using the Facsimile Function

Problem Cause Solution

Cannot cancel a Memory The document is being sent or Press the [Clear/Stop] key. See
Transmission. it is in standby. "Canceling a Transmission", Facsimile
Reference .

Cannot cancel an Immediate - Press the [Clear/Stop] key. See


Transmission. "Canceling a Transmission", Facsimile
Reference .

3 Cannot cancel Internet Fax - Press the [Clear/Stop] key. See


transmission. "Canceling a Transmission", Facsimile
Reference .
Canceling Internet Fax transmission is
possible only during scanning. It is
impossible during communication.

Although a group The number of specified A maximum of 100 parties can be


specification was set for the destinations exceeds the specified for a group. Check if there are
following, reception was not maximum number that can be over the specified numbers registered in
possible. specified as a group. the address book. If a group was
Forwarding, Forwarding of registered in another group,
Special Sender, Email TX transmission is canceled but an error
Result, routing email received message does not appear. See
via SMTP. "Registering Names to a Group",
Network and System Settings Guide
.

Reception
Problem Cause Solution

The machine failed to print If this happened when the • Load paper into the paper tray.
received fax documents. Receive File indicator was lit, • Add toner.
the paper or toner might have
See "Substitute Reception", Facsimile
run out, making printing
Reference .
impossible.

The machine failed to print When the Load Paper Load paper into the paper tray. See
received fax documents. indicator is lit. "Loading Paper", About This Machine
.

46
When You Cannot Send or Receive Fax Messages As Wanted

Problem Cause Solution

Reception is impossible, but The toner has run out. Replace the toner bottle. See "Replacing
transmission is Toner", About This Machine .
possible.

Reception is possible, but The terminal adaptor setting is Check the setting.
transmission is impossible. incorrect.

Transmission is possible, but The terminal adaptor setting is Check the setting.
reception is impossible. incorrect. 3
Printing
Problem Cause Solution

Print is slanted. The tray's side fences may not Check the side fences are locked. See
be locked. "Changing the Paper Size", About This
Machine .

Print is slanted. The paper is fed in at a slant. Load the paper correctly. See "Loading
Paper", About This Machine .

Print is slanted. The machine's cover is open. Make sure the right and lower right
covers are properly closed.

Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray.

Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .

47
3. Troubleshooting When Using the Facsimile Function

Problem Cause Solution

Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper

3 Storage", About This Machine .

Copy paper becomes Printed paper is being used. Do not load sheets that have already
creased. been copied or printed onto by another
machine.

Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .

Printed images contain blots The machine is not on a level The machine must be placed on a stable
or are patchy. surface. and level surface.
Check the environment of location to
select an appropriate location. See
"Where to Put Your Machine", About
This Machine .

Printed images contain blots The paper is creased, curled, Straighten the paper if curled. Replace it
or are patchy. or has blemishes. if wrinkled or damaged. See
"Recommended Paper Sizes and Types"
and "Unusable Paper", About This
Machine .

The image is too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .

48
When You Cannot Send or Receive Fax Messages As Wanted

Problem Cause Solution

The image is too dark or too Using toner bottles not Use only toner bottles recommended by
light. recommended by the the supplier.
supplier or refilling the toner
bottle may degrade the print
quality or cause a
malfunction.

Background of received Image density is too dark. Adjust scan density. See "Image Density
images appears dirty. Images (Contrast)", Facsimile Reference . 3
from the back of the page
appear.

Printed or sent images are The exposure glass or ADF is Clean them. See "Maintaining Your
spotty. dirty. Machine", About This Machine .

Received image is too light. When using moist, rough, or Only use recommended paper. See
processed paper, areas of "Recommended Paper Sizes and
print may not be fully Types", About This Machine .
reproduced.

Received image is too light. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .

Received image is too light. • The image density has • Increase the scanning density. See
been set too low. "Image Density (Contrast)",
• The original of the Facsimile Reference .
transmitted fax was • Ask the sender to reprint the
printed on paper that is original on thicker paper and fax it
too thin. again.

Received image is too light. When the Add Toner Replace the toner bottle soon. See
indicator is lit, toner is "Replacing Toner", About This Machine
beginning to run out. .

49
3. Troubleshooting When Using the Facsimile Function

Problem Cause Solution

Other fax machine's name is When a destination is Use ASCII characters (for example: a-z,
not correctly printed or programmed in the Address 0- 9).
displayed. Book using
SmartDeviceMonitor for
Admin or Web Image
Monitor, in some languages,
the programmed destination

3 may not be printed or


displayed correctly.

Others
Problem Cause Solution

All fax documents stored in All fax documents are lost If any documents have been lost for this
memory have been lost. from memory if the machine reason, a Power Failure Report is
Those documents include remains unpowered for automatically printed when the machine
ones stored through Memory approximately 12 hours or is turned on. If fax documents stored for
Transmission/Reception, longer. Memory Transmission have been lost,
Memory Lock, and Substitute check the destinations and resend the
Reception. documents. If fax documents received
through Memory, Memory Lock or
Substitute Reception have been lost, ask
the senders to resend the documents.
See p.53 "Turning Off the Main
Power / In the Event of Power Failure".

The following functions are This function is made Contact the administrator.
not available: Forwarding, unavailable by the enhanced
routing email received via security function.
SMTP.

When Memory Is Full

This section describes likely causes of and possible solutions for problems related to full memory.

50
When You Cannot Send or Receive Fax Messages As Wanted

Message Cause Solution

"Memory is full. Cannot scan The memory is full. If you press [Exit], the machine returns to
more. Transmission will be standby mode and starts transmitting the
stopped." stored pages.
Check the pages that have not been sent
using the Communication Result Report,
and then resend those pages.

51
3. Troubleshooting When Using the Facsimile Function

If an Error Report Is Printed


An Error Report is printed if a document cannot be successfully sent or received.
Possible causes include a problem with the machine or noise on the telephone line. If an error occurs during
transmission, resend the original. If an error occurs during reception, ask the sender to resend the document.

• If an error happens frequently, contact your service representative.

3 • The "Page" column gives the total number of pages. The "Page not sent" or "Page not received" column
gives the number of pages not sent or received successfully.
• You can display destinations by configuring the appropriate User Parameter. For details about how
to do this, see "Parameter Settings", Facsimile Reference .
• You can display sender names by configuring the appropriate User Parameter. For details about how
to do this, see "Parameter Settings", Facsimile Reference .

52
Turning Off the Main Power / In the Event of Power Failure

Turning Off the Main Power / In the Event of


Power Failure
The following notes concern power failure and turning off the machine.

• When you disconnect the power plug from the wall outlet, always pull the plug (not the cable).

3
• Do not turn off the main power switch while the power indicator is lit or blinking. If you do, the hard
disk and memory may be damaged and failure could result.
• Turn off the main power switch before pulling out the plug. If you pull out the plug with the switch on,
the hard disk and memory may be damaged and failure could result.
• Make sure 100% is shown on the display before you unplug the machine. If a lower value is shown,
some data is currently present in memory.
• Right after a power failure, the internal battery needs to be sufficiently recharged to guard against
future data loss. Keep the machine plugged in and the main power switch on for about 5 days after
the power loss.
Even if the main power switch is turned off, the contents of the machine memory (for example, programmed
numbers) will not be lost. However, if power is lost for about 12 hours because the main power switch is
turned off, there is a power cut, or the power cord is removed, contents of the Fax memory are lost. Lost
items will include any fax documents stored in memory using Memory Transmission/ Reception, Memory
Lock, or Substitute Reception.
If a file was deleted from memory, a Power Failure Report is automatically printed as soon as the power
is restored.
This report can be used to identify lost files. If a memory stored for Memory Transmission was lost, resend
it. If a document received by Memory Reception or Substitute Reception was lost, ask the sender to resend
it.

53
3. Troubleshooting When Using the Facsimile Function

When an Error Occurs Using Internet Fax


This section describes reports that the machine sends if an Internet Fax error occurs.

Error Mail Notification

The machine sends the Error Mail Notification to the sender when it is unable to successfully receive a
particular e-mail message. A "cc" of this notification is also sent to the administrator's e-mail address when
3 one is specified.

• If an incoming Internet Fax from another party bypasses the SMTP server, even if reception is not
successful, an Error Mail Notification is not sent to the sender.

• You can select to send Error Mail Notification by configuring the appropriate User Parameter. For
details about how to do this, see "Parameter Settings", Facsimile Reference .
• If Error Mail Notification cannot be sent, the Error Report (E-mail) is printed by the machine.
• If an error occurs when an e-mail is received via SMTP, the SMTP server sends an error e-mail to the
originator of the document.

Error Report (E-mail)

The Error Report (E-mail) is printed by the machine when it is unable to send an Error Mail Notification.

Server-Generated Error E-mail

The transmitting server sends this error e-mail to the originator of e-mail that cannot be transmitted
successfully (due to reasons such as specifying an incorrect e-mail address).

• If an Internet Fax transmission bypasses the SMTP server, even if transmission is not successful, an
error e-mail is not sent from the server.

• After a server-generated error e-mail is printed, the first page of the sent document is printed.

54
4. Troubleshooting When Using the
Printer Function
This chapter describes likely causes of and possible solutions for printer function problems.

Messages Displayed When Installing the Printer


Driver
This section describes what to do if a message appears when installing the printer driver.
Message number 58 or 34 indicates that the printer driver cannot be installed using Auto Run. Install the
printer driver using [Add Printer] or [Install Printer]. 4
Message number 58 appears if there is a newer version of the printer driver already installed.

Windows 2000

This section describes the procedure under Windows 2000.

1. On the [Start] menu, point to [Settings], and then click [Printers].


2. Double-click the Add Printer icon.
3. Follow the instructions in Add Printer Wizard.
If the printer driver is on a CD-ROM, the location of the driver is \DRIVERS\(PCL6 or PCL5E or PS)
\XP_VISTA\(language)\DISK1. If the installer starts, click [Cancel] to quit.
4. Specify a port.

• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .

Windows XP Professional or Windows Server 2003/2003 R2

This section describes the procedure under Windows XP Professional or Windows Server 2003/2003
R2.

1. On the [Start] menu, click [Printers and Faxes].


2. Click [Add a printer].

55
4. Troubleshooting When Using the Printer Function

3. Follow the instructions in Add Printer Wizard.


If the printer driver is on a CD-ROM, the location of the driver is \DRIVERS\(PCL6 or PCL5E or PS)
\XP_VISTA\(language)\DISK1. If the installer starts, click [Cancel] to quit.
4. Specify a port.

• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .

Windows XP Home Edition

4 This section describes the procedure under Windows XP Home Edition.

1. On the [Start] menu, click [Control Panel].


2. Click [Printer and Other Hardware].
3. Click [Printers and Faxes].
4. Click [Add a Printer].
5. Follow the instructions in Add Printer Wizard.
If the printer driver is on a CD-ROM, the location of the driver is \DRIVERS\(PCL6 or PCL5E or PS)
\XP_VISTA\(language)\DISK1. If the installer starts, click [Cancel] to quit.
6. Specify a port.

• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .

Windows Vista

This section describes the procedure under Windows Vista.

1. On the [Start] menu, click [Control Panel].


2. Click [Hardware and Sound].
3. Click [Printers].
4. Click [Add a printer].
5. Follow the instructions in Add Printer Wizard.
If the printer driver is on a CD-ROM, the location of the driver is \DRIVERS\(PCL6 or PCL5E or PS)
\XP_VISTA\(language)\DISK1. If the installer starts, click [Cancel] to quit.
6. Specify a port.

56
Messages Displayed When Installing the Printer Driver

• Available ports vary according to your Windows operating system or the type of interface. For details,
see "Preparing the Machine", Printer Reference .

Windows Server 2008

This section describes the procedure under Windows Server 2008.

1. On the [Start] menu, click [Control Panel].


2. Click [Hardware and Sound].
3. Click [Printers].
4. Click [Add a printer].
4
5. Follow the instructions in Add Printer Wizard.
If the printer driver is on a CD-ROM, the location of the driver is \DRIVERS\(PCL6 or PCL5E or PS)
\XP_VISTA\(language)\DISK1. If the installer starts, click [Cancel] to quit.
6. Specify a port.

57
4. Troubleshooting When Using the Printer Function

If USB Connection Fails


This section describes how to troubleshoot a problem related to USB connections.

Problem Cause Solution

The machine is not The USB cable is not Disconnect the USB cable, and then turn
automatically recognized. connected properly. off the main power switch. Turn the
machine on again. When the machine
has fully booted up, reconnect the USB
cable.

4 Windows has already


configured the USB settings.
Check whether the computer Open Windows' Device Manager, and
has identified the machine as then, under [Universal Serial Bus
an unsupported device. controllers], remove any conflicting
devices. Conflicting devices have a [!] or
[?] icon by them. Take care not to
accidentally remove required devices.
For details, see Windows Help.

58
Messages Displayed When Using the Printer Function

Messages Displayed When Using the Printer


Function
This section describes the principal messages that appear on the panel display. If a message not described
here appears, act according to the message.

Status Messages

This section describes the machine status messages.

Message Status 4
"Hex Dump Mode" In Hex Dump mode, the machine prints received data in
hexadecimal format. Turn off the machine after printing, and
then turn back on. Hex Dump mode is used for advanced
troubleshooting.

"Job Suspended" Printing was temporarily stopped by SmartDeviceMonitor for


Client.
You can resume printing via [My Job List] in
SmartDeviceMonitor for Client, or via the Web Image
Monitor. To resume printing via Web Image Monitor, check
with your system administrator first.

"Offline" The machine is offline. To start printing, switch the machine


online by pressing the [Online] Key.

"Please wait." This message may appear for a few seconds. It means the
machine is initializing or executing maintenance operations.
Wait a while.

"Printing..." The machine is printing. Wait a while.

"Ready" This is the default ready message. The machine is ready for
use. No action is required.

"Resetting job..." The machine is resetting the print job. Wait until "Ready"
appears on the display panel.

"Setting change..." The machine is setting changing. You cannot use the control
panel while this message is displayed. Wait a while.

"Waiting for print data..." The machine is waiting for the next data to print. Wait a while.

59
4. Troubleshooting When Using the Printer Function

Alert Messages

This section describes the machine alert messages.

• Before turning the main power off, see "Turning On/Off the Power", About This Machine .

Message Cause Solution

"Authentication failed." • The login user name or • Check your login user name and
password entered is password.
incorrect. • Contact the administrator.
4 • The machine cannot
perform authentication.

"Duplex mode is in off The selected paper tray has Press [JobReset] to change the paper
position for Tray #" not been configured for tray settings or do single-sided printing.
duplex printing. For details about the tray settings, see
# indicates the tray number. "Tray Paper Settings", Network and
System Settings Guide .

"Ethernet Board Error" An error has occurred in the Turn off the main power switch, and
Ethernet board. back on again. If the message appears
again, contact your sales or service
representative.

"File System Full." PDF file do not print out Delete all unnecessary files from the
because the capacity of file hard disk, or decrease the file size sent
system is full. to the machine.

"HDD functional problems." An error has occurred in the Turn off the main power switch, and
hard disk drive. back on again. If the message appears
again, contact your service
representative.

"Memory Overflow" Maximum capacity of PCL or Select [Frame Priority] from [Memory
PostScript 3 list display has Usage] in [System] under [Printer
been exceeded. Features] (see "Printer Features", Printer
Reference ), or reduce the value of
resolution in the printer driver. If this
message continues to appear after
taking these steps, decrease the number
of files sent to the machine.

60
Messages Displayed When Using the Printer Function

Message Cause Solution

"Paper Tray is in use." The specified paper tray is in Wait until the other function has finished
use by another function, such using the specified paper tray.
as the copier function.

"Parallel I/F Error" An error has occurred in the Contact your service representative.
parallel interface board.

"Printer Font Error." An error has occurred in the Turn off the main power switch, and
font settings. back on again. If the message appears
again, contact your sales or service
representative.

"Problem:Wireless card" An error may have occurred Turn off the main power switch, and
4
in the IEEE 802.11a/g card. back on again. If the message appears
again, contact your sales or service
representative.

"Replace Photoconductor." Replacement of Contact your service representative.


Photoconductor Unit is
necessary.

"Tray # Error" An error has occurred with Press [JobReset] to change the paper
the paper tray. tray settings, or press [Form Feed] to
# indicates the tray number. select another paper tray and print using
that.

"USB Error" An error has occurred in the Turn off the main power switch, and
USB interface. back on again. If the message appears
again, contact your sales or service
representative.

Printing the Error Log

If files could not be printed due to printing errors, print the error log to identify the problem.

• The most recent 30 errors are stored in the error log. If a new error is added when there are 30 errors
already stored, the oldest error is deleted. However, if the earliest error is a Sample Print, Locked
Print, Hold Print, or Stored Print error, it is not deleted. The error is stored separately until the number
of errors reaches 30.
• If the main power switch is turned off, the log is deleted.

61
4. Troubleshooting When Using the Printer Function

1. Press the [User Tools/Counter] key.

BQP008S

4 2. Select [Printer Features] using [ ] or [ ], and then press the [OK] key.

3. Select [List/Test Print] using [ ] or [ ], and then press the [OK] key.

4. Select [Error Log] using [ ] or [ ], and then press the [OK] key.

An error log is printed.

• If the main power switch is turned off, the log is deleted.

62
When You Cannot Print

When You Cannot Print


This section describes what to do if printing does not start even after performing [Print].

Problem Cause Solution

Printing does not start. The power is off. Check the cable is securely plugged into
the power outlet and the machine. Turn
on the main power switch.

Printing does not start. The machine is set to Press the [Online] key.
"Offline".

Printing does not start. The cause is displayed on the Check the error message or warning 4
display of the control panel. status on the display panel and take the
required action. See p.59 "Messages
Displayed When Using the Printer
Function".

Printing does not start. The interface cable is not Connect the interface cable securely. If
connected correctly. it has a fastener, fasten that securely as
well. See "Connecting to the Interfaces",
Network and System Settings Guide
.

Printing does not start. The correct interface cable is The type of interface cable you should
not being used. use depends on the computer. Be sure to
use the correct one. If the cable is
damaged or worn, replace it. See
"Connecting to the Interfaces", Network
and System Settings Guide .

Printing does not start. The interface cable was Connect the interface cable before
connected after the machine turning on the machine.
was switched on.

63
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

Printing does not start. If an extended wireless LAN To check signal status, press the [User
is used, failure to print might Tools/Counter] key, and then select
result from a weak wireless [System Settings] using [ ] or [ ]. On
signal. [Interface Settings], select [Wireless
LAN], and then press [Wireless LAN
Signal] using [ ] or [ ]. If signal quality
is poor, move the machine to a location
where radio waves can pass or remove
objects that might cause interference.
(You can check signal status only when
4 using wireless LAN in infrastructure
mode.)

Printing does not start. If the machine is using Check using the machine's display panel
wireless LAN, SSID settings that the SSID is correctly set. See
are incorrect. "Connecting the Machine", Network
and System Settings Guide .

Printing does not start. If the machine is using Check access point settings when in the
wireless LAN, the receiver's infrastructure mode. Depending on the
MAC address may be access point, client access may be
preventing communication limited by MAC address. Also, check
with the access point. there are no problems in transmission
between access point and wired clients,
and between access point and wireless
clients.

Printing does not start. The wireless LAN interface is Confirm the orange LED is lit, and the
not working. green LED is lit or blinks during
transmission.

Printing does not start. The login user name, login Check the login user name, login
password, or driver password, or driver encryption key.
encryption key is invalid.

Printing does not start. Advanced encryption has Check the settings of the Extended
been set using the Extended Security function with the administrator.
Security function.

64
When You Cannot Print

Problem Cause Solution

Data In indicator does not If the Data In indicator is unlit • When the machine is connected to
light up or flash. or not flashing even after the a computer via a cable, check the
print job starts, the machine computer print port settings are
has not received the data. correct. For details, see p.65
"When the Data In Indicator Does
Not Light Up or Flash".
• When it is networked with a
computer, contact the
administrator.

[List/Test Print] is disabled. A mechanical error might


have occurred.
Contact your service representative.
4
Printing does not start when The correct Communication • Turn the main power off and back
using the extended wireless mode is not set. on. See "Turning On/Off the
LAN in Ad-hoc mode. Power", About This Machine
.
• Change the settings in [Network]
under [Interface Settings] of
[System Settings]. See "Interface
Settings", Network and System
Settings Guide .

If the printing does not start, consult your service representative.

When the Data In Indicator Does Not Light Up or Flash

When the Data In indicator does not light up or flash after starting a print job, data is not being sent to the
machine.

When the machine is connected to the computer using the interface cable
This section describes how to check the print port when the Data In indicator does not light up or blink.
Check if the print port setting is correct. When it is connected using a parallel interface, connect it to LPT1
or LPT2.
For Windows 2000
1. Click the [Start] button, point to [Settings], and then click [Printers].
2. Click the icon of the machine. On the [File] menu, click [Properties].

65
4. Troubleshooting When Using the Printer Function

3. Click the [Ports] tab.


4. In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows XP Professional or Windows Server 2003/2003 R2
1. Click the [Start] button, and then click [Printers and Faxes].
2. Click the icon of the machine. On the [File] menu, click [Properties].
3. Click the [Ports] tab.
4. In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows XP Home Edition
1. Click the [Start] button, and then click [Control Panel].

4 2. Click [Printers and Other Hardware].


3. Click [Printers and Faxes].
4. Click the icon of the machine. On the [File] menu, click [Properties].
5. Click the [Ports] tab.
6. In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows Vista
1. Click the [Start] button, and then click [Control Panel].
2. Click [Hardware and Sound].
3. Click [Printers].
4. Click the icon of the machine. On the [Organize] menu, click [Properties].
5. Click the [Ports] tab.
6. In the [Print to the following port(s)] list, confirm the correct port is selected.
For Windows Server 2008
1. Click the [Start] button, and then click [Control Panel].
2. Click [Hardware and Sound].
3. Click [Printers].
4. Click the icon of the machine. On the [Organize] menu, click [Properties].
5. Click the [Ports] tab.
6. In the [Print to the following port(s)] list, confirm the correct port is selected.

Network connection
Contact the network administrator.

66
Other Printing Problems

Other Printing Problems


This section describes likely causes of and possible solutions for problems that can occur when printing
from a computer.

When you cannot print clearly


Problem Cause Solution

The print on the entire page is The paper is damp. Use paper that has been stored in the
faded. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

The print on the entire page is The paper is unsuitable. Use recommended paper. (Printing on
4
faded. coarse or treated paper might result in
faint print image.) See "Recommended
Paper Sizes and Types", About This
Machine .

The print on the entire page is If the [Toner Saving] is • PCL 5e


faded. selected in the printer driver On the [Print Quality] tab, select
settings, the entire page will [Off] in the [Toner Saving] area.
be faded when printed.
• PCL 6
On the [Detailed Settings] tab,
select [Off] in the [Toner Saving]
box on the [Print Quality].
• PostScript 3
On the [Detailed Settings] tab,
select [Off] in the [Print Mode] box
on the [Print Quality].

Printed images contain blots Settings for thick paper have • PCL 5e
or are patchy. not been made when printing Select [Thick] in the [Type:] list on
on thick paper in the bypass the [Paper] tab.
tray.
• PCL 6
Select [Thick] in the [Paper Type:]
box on the [One Click Presets] tab.
• PostScript 3
Select [Thick] in the [Media Type:]
box on the [One Click Presets] tab.

67
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

Printed images contain blots Printing on coarse paper or Use supplier-recommended paper. See
or are patchy. treated paper can result in "Recommended Paper Sizes and
faint print image. Types", About This Machine .

Printed images contain blots The paper is damp. Use paper that has been stored in the
or are patchy. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Printed images contain blots Check the machine is set on a Check the environment of location to
or are patchy. level surface. The machine select an appropriate location. See
4 must be placed on a stable "Where to Put Your Machine", About
and level surface. This Machine .

Printed images contain blots The paper is creased, curled, Smooth out the wrinkles from the paper,
or are patchy. or has blemishes. or replace it. See "Recommended Paper
Sizes and Types" and "Unusable Paper",
About This Machine .

Images smudge when The specified paper type and • PCL 5e


rubbed. (Toner is not fixed.) the paper that is actually On the [Paper] tab, select a proper
loaded might be different. For paper type in the [Type:] box.
example, thick paper might
• PCL 6
be loaded but not specified
as the paper type. On the [One Click Presets] tab,
select a proper paper type in the
[Paper Type:] box.
• PostScript 3
On the [One Click Presets] tab,
select a proper paper type in the
[Media Type:] box.

The printed image is different Printing will be performed by • Only when using PCL 6
from the image on the the machine's graphic On the [Detailed Settings] tab,
computer's display. processing function. select [Raster] in the [Raster/
Vector:] box on the [Print Quality].

The image is too dark or too The correct paper type Check the paper loaded on the paper
light. settings are not made. tray or bypass tray matches the paper
type set on the display panel. See
"Recommended Paper Sizes and
Types", About This Machine .

68
Other Printing Problems

Problem Cause Solution

The image is too dark or too The paper is loaded reverse Before printing on special paper, check
light. side up. its surface carefully. Printing on non-print
surfaces reduces print quality and can
damage the machine's internal
components. See "Recommended
Paper Sizes and Types" and "Unusable
Paper", About This Machine .

Image is dirty. Use of non-recommended Use manufacturer-genuine toner.


toner can result in loss of print Contact your service representative.
quality and other problems.
4
Print result differs from the A non-Windows OS is being Check the application supports the
display. used. printer driver.

Print result differs from the The machine is not selected Use the machine's printer driver and
display. for printing. check the machine is the designated
printer. See "Setting Up the Printer
Driver", Printer Reference .

Print result differs from the Data transmission failed or Check whether there is failed or
display. was cancelled during cancelled data remaining. See
printing. "Checking the Error Log", Printer
Reference .

Characters differ from the The loaded paper is Printing on recommended paper
display. unsuitable. produces better resolution. See
"Recommended Paper Sizes and
Types", About This Machine .

It takes too much time to The data is so large or If the Data In indicator is blinking, data
resume printing. complex that it takes time to is being processed. Simply wait until
process. printing resumes.

It takes too much time to The machine was in Energy To resume from Energy Saver mode, it
resume printing. Saver mode. has to warm up, and this takes time. See
"ENERGY STAR Program", About This
Machine .

69
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

Paper is not fed from the When you are using a • PCL 5e
selected tray. Windows operating system, On the printer driver's [Paper] tab,
printer driver settings override in the [Input Tray:] list, select the
those set using the display desired input tray.
panel.
• PCL 6
On the printer driver's [One Click
Presets] tab, in the [Input Tray:] list,
select the desired input tray.
• PostScript 3
4 On the printer driver's [One Click
Presets] tab, in the [Paper Source:]
list, select the desired input tray.

Some types of data, such as The correct printer driver • PCL 5e


graphics data or data from settings are not made. On the [Print Quality] tab, select
certain applications, do not [600 dpi] in the [Resolution] area.
print.
• PCL 6
• On the [Detailed Settings]
tab, select [Quality] in the
[Print Priority:] box on the
[Print Quality].
• On the [Detailed Settings]
tab, select [Raster] in the
[Raster/Vector:] box on the
[Print Quality].
• PostScript 3
On the [Detailed Settings] tab,
select [Photographic] in the
[Dithering] box on the [Print
Quality].
See the printer driver Help.

70
Other Printing Problems

Problem Cause Solution

Some characters are not The correct printer driver • PCL 5e


printed or appear strange. settings are not made. On the [Print Quality] tab, select
[600 dpi] in the [Resolution] area.
• PCL 6
• On the [Detailed Settings]
tab, select [Quality] in the
[Print Priority:] box on the
[Print Quality].
• On the [Detailed Settings]
tab, select [Raster] in the 4
[Raster/Vector:] box on the
[Print Quality].
• PostScript 3
On the [Detailed Settings] tab,
select [Text] in the [Dithering] box
on the [Print Quality].
See the printer driver Help.

Print speed or application The correct printer driver • Only when using PCL 6
relinquishing speed is slow. settings are not made. On the [Detailed Settings] tab,
select [Speed] in the [Print Priority:]
box on the [Print Quality].
See the printer driver Help.
Quit any other applications.

Print ends mid-job. An error might have Check the machine's display panel to
occurred. see if an error has occurred.

Image position differs from The correct page layout Check the page layout settings made
the display. settings are not made. using the application.
See the application's Help.

71
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

Image position differs from The correct page layout • PCL 5e


the display. settings are not made. On the printer driver's [Paper] tab,
select [Print On] box, and then
select the desired size.
• PCL 6 / PostScript 3
On the printer driver's [Detailed
Settings] tab, select [Print On:] box
on the [Basic], and then select the
desired size.
4 The printed image is different With certain functions, such In the application, change the layout,
from the image on the as enlargement and character size, and character settings.
computer display. reduction, image layout
might be different to that on
the computer display.

Print is slanted. The paper is feeding in at a Load the paper correctly. See "Loading
slant. Paper", About This Machine .

Print is slanted. The machine's cover is open. Make sure the right and lower right
covers are properly closed.

Misfeeds occur frequently. The number of sheets loaded Load paper only as high as the upper
exceeds the capacity of the limit markings on the side fences of the
machine. paper tray or bypass tray.

Misfeeds occur frequently. The paper is damp. Use paper that has been stored in the
recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Misfeeds occur frequently. The paper is too thick or too Use recommended paper. See
thin. "Recommended Paper Sizes and
Types", About This Machine .

72
Other Printing Problems

Problem Cause Solution

Misfeeds occur frequently. The copy paper is wrinkled or Use recommended paper only and be
has been folded/creased. sure its storage environment meets the
recommended temperature and
humidity conditions. For details about
recommended paper and the proper
way to store it, see "Recommended
Paper Sizes and Types" and "Paper
Storage", About This Machine .

Misfeeds occur frequently. Printed paper is being used. Do not load sheets that have already
been copied or printed onto by another
machine. 4
Copy paper becomes The paper is damp. Use paper that has been stored in the
creased. recommended temperature and
humidity condition. See "Paper
Storage", About This Machine .

Copy paper becomes The paper is too thin. Use recommended paper. See
creased. "Recommended Paper Sizes and
Types", About This Machine .

Garbled characters are The correct printer language Set the correct printer language.
printed. might have not been selected.

Images are printed in the The feed orientation you Set the machine's feed orientation and
wrong orientation. selected and the feed the printer driver's feed orientation
orientation selected in the accordingly. See the printer driver Help.
printer driver's option setup
might not be the same.

There is considerable delay "Sleep mode" might be set. The machine requires time to warm up if
between the print start it has been in "Sleep mode". See "Timer
instruction and actual Settings", Network and System Settings
printing. Guide and "ENERGY STAR
Program", About This Machine .

73
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

There is considerable delay Processing time depends on If the Data In indicator is blinking, data
between the print start data volume. High volume has been received by the machine. Wait
instruction and actual data, such as graphics-heavy for a while.
printing. documents, takes longer to Making the following setting on the
process. printer driver may reduce the computer's
workload.
For how to open the printing preferences
dialog box, see "Displaying the Printer
Driver Settings Screen", Printer
Reference .
4 • PCL 5e
Select the lower value for the
[Resolution] list on the [Print
Quality] in the printing preferences
dialog box.
• PCL 6
Select [Speed] for the [Print
Priority:] list on the [Print Quality] in
the printing preferences dialog
box.
• PostScript3
If your operating system is
Windows, select [Optimize for
Speed] in the [PostScript Output
Option:] list in [PS Options] on the
[Detailed Settings] tab.

Graphics print out differently If the printer driver is If you want to print accurately, set the
to how they appear on configured to use the printer driver to print without using the
screen. graphics command, the graphics command. See the printer
graphics command from the driver Help.
machine is used to print.

Photo images are coarse. Some applications print at Use the application's settings to specify
lower resolution. a higher resolution.

74
Other Printing Problems

Problem Cause Solution

Solid lines are printed as Dither patterns do not match. Make the following settings with the
broken lines. printer driver:
• Only when using PostScript 3
Change the [Dithering] setting in
the [Print Quality] on the [Detailed
Settings] tab.

Optional components Bidirectional communication Set up optional devices on the Properties


connected to the machine are is not working. of the machine.
not recognized when using See the printer driver Help.
Windows 2000/XP/Vista, 4
Windows Server
2003/2003R2/2008.

When using Windows - Make sure the application's paper size


2000/XP/Vista, Windows and orientation settings match those of
Server the printer driver.
2003/2003R2/2008, If a different paper size and orientation
Auto Reduce/Enlarge print are set, select the same size and
does not come out as orientation.
expected.

The print job is not canceled - Even when the machine is offline,
even when the machine is printing is performed when [Job
switched to offline status. Acceptance Priority] is selected for
[Signal Control] in [Parallel Interface] in
[Interface Settings] under [System
Settings]. Select [Printer Priority] for
[Signal Control].
See "Interface Settings", Network and
System Settings Guide .

Images are incomplete, or You may be using paper Use the same size paper as that selected
excess pages are printed. smaller than the size selected in the application. If you cannot load
in the application. paper of the correct size, use the
reduction function to reduce the image,
and then print.
See the printer driver Help.

75
4. Troubleshooting When Using the Printer Function

Problem Cause Solution

Duplex printing is Duplex printing cannot be When using duplex printing, make
malfunctioning. done with paper set in the settings to use paper from a tray other
bypass tray. than the bypass tray.

Duplex printing is You have loaded thick paper, Specify another paper type.
malfunctioning. OHP transparencies, or
labels specified as the paper
type.

Duplex printing is Duplex printing cannot be Change the Paper Type setting for the
malfunctioning. done with a tray for which tray to [On] on the System Settings menu.
4 [Off] has been specified as See "System Settings", Network and
Paper Type on the System System Settings Guide .
Settings menu.

When using Windows The correct application or Make sure the application's paper size
2000/XP/Vista, Windows printer driver settings are not and orientation settings match those of
Server made. the printer driver. If a different paper size
2003/2003R2/2008, and orientation are set, select the same
combined printing or booklet size and orientation.
printing does not come out as
expected.

A print instruction was issued User code management may Ask the administrator about valid user
from the computer, but have been set. codes. To print, the user code must be
printing did not start. entered from the printer driver.

If the problem cannot be solved, contact your sales or service representative.

When paper is not fed properly


Problem Cause Solution

Images are printed at a slant. The tray's side fences might Check the side fences are locked. See
not be locked. "Changing the Paper Size", About This
Machine .

Sheets are feeding in Sheets are sticking together. Fan the sheets thoroughly before
together, resulting in jams. loading them. Alternatively, feed the
sheets into the machine one at a time.

If the problem cannot be solved, contact your service representative.

76
5. Troubleshooting When Using the
Scanner Function
This chapter describes likely causes of and possible solutions for scanner function problems.

When Scanning Is Not Done As Expected


This section describes causes and remedies when scan results are not as expected.

Problem Cause Solution

The scanned image is dirty. The exposure glass, scanning Clean them. See "Maintaining Your
glass or ADF is dirty. Machine", About This Machine .

The image is distorted or out


of position.
The original was moved
during scanning.
Do not move the original during
scanning.
5
The image is distorted or out The original was not pressed Make sure the original is pressed flat
of position. flat against the exposure against the exposure glass.
glass.

The scanned image is upside The original was placed Place the original in the correct
down. upside down. orientation. See "Specifying Send
Options", Scanner Reference .

No image results from The original was placed with When the original is placed directly on
scanning. the front and back reversed. the exposure glass, the side to be
scanned must face down. When the
original is fed via the ADF, the side to be
scanned must face up.

Images are scanned in If you set the original with its • If you select [1 Sided Original] or
rotated. top edge backward and save [2 Sided Orig. (T to B)] under
full color/gray scale images [Original Setting], place your
as a TIFF or JPEG file, they are originals upper edge first in the
scanned in rotated. ADF.
• If you select [2 Sided Orig. (T to T)]
under [Original Setting], select
[Single Page:PDF] or [Multi-
page:PDF] for [File Type Priority]
under [Send Settings].

77
5. Troubleshooting When Using the Scanner Function

Problem Cause Solution

The scanned image contains If you scan originals using Scanning at a higher resolution may
white spaces. functions other than the reduce the margins.
network TWAIN scanner
function, certain paper size
and resolution settings may
produce scanned images that
are larger than the specified
size because of margins
being added to the sides.

78
When You Cannot Send Scanned Files

When You Cannot Send Scanned Files


This section describes likely causes of and solutions for problems related to network delivery and sending
e-mail.

When You Cannot Browse the Network to Send a Scan File

This section describes likely causes of and possible solutions for the network browsing failing to operate
when files are sent.

Problem Cause Solution

The network cannot be The following machine Check the settings. See "Connecting the
browsed when specifying the settings may not be correct: Machine", Network and System Settings
destination folder. • IP address Guide . 5
• Subnet Mask

When the TWAIN Driver Cannot Be Started

This section describes likely causes of and possible solutions for the TWAIN driver-related problems.

Problem Cause Solution

The Scanner Properties Advanced encryption has For details about the extended security
dialog box cannot be been specified in the setting, contact an administrator.
displayed. extended security setting.

When the Network Delivery Function Cannot Be Used

This section describes likely causes of and possible solutions for the network delivery function problems.

Problem Cause Solution

Cannot use the network The delivery software may be Contact the administrator.
delivery function. an old version or a security
setting may be specified.

79
5. Troubleshooting When Using the Scanner Function

Problem Cause Solution

Cannot use the network The network delivery function Specify it correctly. See "Network
delivery function. setting is not correct. Settings Required to Use the Network
Delivery Scanner", Network and System
Settings Guide .

When S/MIME Cannot Be Used

This section describes likely causes of and possible solutions for S/MIME-related problems.

Problem Cause Solution

If several destinations are Encrypted e-mails are sent to Make sure S/MIME-authentication
5 selected for the broadcasting
sequence, the data is sent
the destinations for which S/
MIME authentication is set,
destinations are separate from plain text
destinations.
over twice. and plain text e-mails are sent Contact the administrator for details
to the destinations for which about destination settings.
S/MIME authentication is not
set.

When putting a signature on When S/MIME is applied, Contact the administrator.


an e-mail using S/MIME, an the administrator appears in
e-mail address for "Sender" is the "From" field, and the
not set for "From". sender appears in the "Reply-
to" field.

Scanning cannot be Insufficient memory. If S/MIME has been specified, minimize


completed when if S/MIME the file size by, for instance, reducing the
has been specified. scan resolution or the number of pages
per scan job.

• Using S/MIME makes e-mail larger than when not using S/MIME.

When You Cannot Send Scan Files Using WSD

This section describes likely causes of and possible solutions for sending scan files using WSD.

• To use the WSD scanner function, enable the WSD scanner in Web Image Monitor in advance. For
details about this function, see "Sending Scan Files Using WSD", Scanner Reference .

80
When You Cannot Send Scanned Files

Problem Cause Solution

The WSD scanner function Scan Profile is not set on the client Set Scan Profile. For details about
cannot be used. computer. how to do this, see "Creating a
New Scan Profile", Scanner
Reference .

The WSD scanner function The [Take no action] setting has Open scanner Properties, click
cannot be used. been selected on the client the [Events] tab, and then select
computer, forcing the client [Start this Program] as the
computer to remain inactive computer's response on receipt
when it receives scan data. of scan data. For details, see your
operating system's Help.

Operations Are Not Possible When Messages Are Displayed 5


This section describes likely causes of and possible solutions for messages that appear and when the
machine fails to operate.

Message Cause Solution

"Updating destination list. The destination list is being Wait until the message disappears. Do
Reselect destination(s) or updated from the network not switch off the power while this
sender's name later." using SmartDeviceMonitor message is displayed.
for Admin. Depending on the
number of destinations to be
updated, there may be some
delay before you can resume
operation. Operations are
not possible while this
message is displayed.

81
5. Troubleshooting When Using the Scanner Function

Messages Displayed When Using the Scanner


Function
This section describes likely causes of and possible solutions for error messages that may appear on the
machine's control panel and the client computer.

Messages Displayed on the Control Panel When Using the Scanner Function

This section describes likely causes of and possible solutions for the error messages that appear on the
control panel.

• If a message not described here appears, act according to the message. For details about how to
5 turn off the main power switch, see "Turning On/Off the Power", About This Machine .

Message Cause Solution

"Authentication failed." The entered login user name Check the login user name and
or password is incorrect. password. The machine is unable to
authenticate. Contact the administrator.

"Cannot communicate with WSD (Device) protocol or Use IPv4 or IPv6, located in
PC. Contact the WSD (Scanner) protocol is [Configuration] in Web Image Monitor,
administrator." disabled. to enable [WSD (Device)] and [WSD
(Scanner)].

"Cannot enter manually more The e-mail has too many (nnn Split the destinations into two or more
than nnn destinations." or more) destinations. groups.
(A figure is placed at nnn.)

"Cannot specify more than The e-mail has too many Split the destinations into two or more
100 destinations." (100 or more) destinations. groups.

"Cannot start scanning While a file was being sent, a If the same message appears again after
because communication was network error occurred and scanning again, the cause could be a
failed." the file could not be sent mixed network, or else network settings
correctly. were changed during WSD scanner
transmission. Check with your system
administrator.

82
Messages Displayed When Using the Scanner Function

Message Cause Solution

"Cannot start scanning. The Scan Profile might be Check the Scan Profile configuration.
Check the setting(s) on the incorrectly configured.
PC."

"Cannot write on memory The memory device is Replace the memory device.
device because remain. insufficient and scan data
space is insufficient." cannot be saved.

"Cannot write on memory The memory device is write Unlock the write-protection on the
device because the device is protected. memory device.
write-protected."

"Cannot write on memory The memory device is faulty, • Check to see if the memory device
device. Check memory or the file name contains a is defective.
device and machine sett." character that cannot be • Check the memory device. It might 5
used. be unformatted, or its format might
be incompatible with this machine.
• Check the file name set at the time
of scanning. For details on the
characters that can be used in file
names, see "Values of Various Set
Items for Transmission/Delivery
Function", Scanner Reference .
Check with your system
administrator.

"Check the resolution and The scanned original Specify the scan size and resolution
reset nnn original(s)." exceeded maximum data again. Note that it may not be possible
(A figure is placed at nnn.) capacity. to scan very large originals at a high
resolution. See "Relationship between
Resolution and Scan Size", Scanner
Reference .

"Communicating..." Data is being prepared for Wait until the data has been sent. This
sending to a client computer. message might reappear if the machine
is operating on a mixed network or if
changes were made to network settings
during WSD scanning transmission.
Check with your system administrator.

83
5. Troubleshooting When Using the Scanner Function

Message Cause Solution

"Connection has failed. The correct network settings • Check the network settings of the
Check settings and check are not made. client computer.
Scanned File Status." • Check that components such as the
LAN cable are connected
properly.
• Check that the server settings are
correct and the server is working
properly.

"Connection with LDAP server A network error has occurred Try the operation once more. If the
has failed. Check the server and connection has failed. message is still shown, the network may
status." be crowded. Check the information of
System Settings. See "Administrator
5 Tools", Network and System Settings
Guide .

"Dest. authentication failed. The entered user name or • Check that the user name and
Check settings and check password was invalid. password are correct.
Scanned File Status." • Check that the ID and password for
the destination folder are correct.
• A password of 128 or more
characters may not be recognized.

"Destination list has been A specified destination or Specify the destination or sender's name
updated. Selected sender's name was cleared again.
destinations/ sender will be when the destination list in the
cleared." delivery server was updated.

"Invalid certificates or no S/ The destination's S/MIME Contact the administrator.


MIME certificates were certificates are invalid or
found." cannot be found.

"Entered protection code for The correct protection code Make sure the protection code is
dest. is incorrect. Please re- was not entered. correct, and then enter it again. See
enter." "Registering a Protection Code",
Network and System Settings Guide
.

84
Messages Displayed When Using the Scanner Function

Message Cause Solution

"Exceeded max. data The scanned data exceeded Specify the scan size and resolution
capacity Check resolution maximum data capacity. again. Note that it may not be possible
and Start." to scan very large originals at a high
resolution. See "Relationship between
Resolution and Scan Size", Scanner
Reference .

"Exceeded max. Email size. The maximum e-mail size has • Increase the size of [Max. E-mail
Sending E-mail has been been exceeded. Size].
cancelled." • Set [Divide & Send E-mail] to [On
(per page)] or [On (per max. size)].
See "Send Settings", Scanner
Reference .

"Exceeded max. memory The memory is full. Specify whether to use the data or not.
5
capacity. Do you want to
send the scanned data?"

"Exceeded max.memory The memory is full. Try one of the following measures:
capa. Scanning will be • Wait for a while, and then retry the
cancelled. Scanned data will scan operation.
be cleared."
• Reduce the scan area or scanning
resolution.
• Delete unneeded stored files.

"Exceeded max. number of The correct protection code Make sure the protection code is
alphanumeric characters." was not entered. correct, and then enter it again. See
"Registering a Protection Code",
Network and System Settings Guide
.

"Exceeded max. number of Search results have Search again after changing the search
search results which can be exceeded the max. conditions.
displayed. Max.: nnn" displayable number.
(A figure is placed at nnn.)

"Exceeded max. page The number of scanned Select whether to send the data so far.
capacity. Do you want to pages exceeded maximum
send the scanned data?" page capacity.

85
5. Troubleshooting When Using the Scanner Function

Message Cause Solution

"Exceeded max. pg. per file. The scan could not be Reduce the number of documents to be
Press [Write] to wrt. scanned completed because the written to the memory device and try
data to mem. device. Or press maximum number of pages again.
[Cancel] to delete." that can be scanned by this
machine was exceeded
during writing to the Memory
device.

"LDAP server auth. has failed. The user name and password Make settings correctly for the user
Check the settings." differ from those set for LDAP name and the password for LDAP server
server authentication. authentication.

"LDAP server search timed A network error has occurred Try the operation once more. If the
out. Check the server status." and connection has failed. message is still shown, the network may
5 be crowded. Check the information of
System Settings. See "Administrator
Tools", Network and System Settings
Guide .

"Memory device error. A non-writable medium is Use a different medium.


Check the memory device." being used.

"Memory device not There is no memory device Insert a memory device, or check to see
detected. Insert the device." inserted. whether the memory device is properly
inserted in the media slot.

"Memory is full. Press [Write] The scan could not be Select whether or not to save the
to write current scanned data completed because there scanned document to the memory
to memory device. Or press was insufficient memory at the device.
[Cancel] to delete." time of saving to the memory
device.

"No valid dest. lists. Check the The authentic settings for the Check that the delivery server is on and
settings or the server status." delivery server are incorrect. the authentic settings for the delivery
server are correct.

"Now loading WSD... Please WSD scanner function is Wait a while.


wait." being prepared.

"Only one memory device Only one memory device can Insert one memory device only in the
can be used in one time." be connected at a time. media slot.

86
Messages Displayed When Using the Scanner Function

Message Cause Solution

"Only one memory device Another memory device was Remove the extra memory device. Only
can be used in one time. inserted while the following one memory device can be inserted at a
Remove all other media to message was displayed: time.
resume writing." "Clear/Stop key was
pressed. Do you want to stop
scanning?"

"Original is being scanned by The machine is using another Retry scanning after the operation with
another function." function such as copying. the other function is completed.

"Out of paper. Set XX paper No paper is loaded in the Load paper of a size that is listed in the
on the tray." specified paper tray. message.
("XX" indicate paper size.)

"Sender's name is not The sender's name was not A sender's name should be specified 5
selected. Specify sender's specified. before sending e-mail. Send e-mail after
name." specifying the sender's name.

"Sending failed. Check While a file was being sent, a Try the operation once more. If the
settings and check Scanned network error occurred and message is still shown, the network may
File Status." the file could not be sent be crowded. Contact the administrator.
correctly. Press the [Job Information] key to display
the transmission results, and then check
which job has not been sent. See
"Confirmation Displays", Scanner
Reference .

"Sending has failed. Press Job Sending has failed. Press the Try the operation once more. If the
Information key to check the [Job Information] key to message is still shown, the network may
status." check the status. be crowded. Contact your network
administrator.
Use the Job Information screen to check
for the file where the problem occurred.
See "Confirmation Displays", Scanner
Reference .

"SMTP authent. E-mail The SMTP authentication e- Contact the administrator.


address and Administrator E- mail address and the
mail address mismatch." administrator's e-mail
address do not match.

87
5. Troubleshooting When Using the Scanner Function

Message Cause Solution

"Some destinations cannot If you have selected multiple Using Web Image Monitor, check the
receive encrypted files. destinations including file encryption settings for all
Sending to these destinations destinations for which destinations.
may be unsafe." encryption has not been
configured, e-mail sent to
those destinations will not be
encrypted even if you specify
encryption.

"Some destinations will If you have selected multiple Using Web Image Monitor, check the
receive automatically destinations including file encryption settings for all
encrypted files. All files sent to destinations for which destinations.
these destinations will be encryption has been

5 encrypted." configured, e-mail sent to


such destinations will be
automatically encrypted.

"Some page(s) are near The first page of the document The original's blank side might have
blank. To cancel, press Stop." is almost blank, when using been scanned, when using the Blank
the Blank Page Detect Page Detect function. Be sure to place
function. your originals correctly. For details
about determining the cause of blank
pages, see "Scan Settings", Scanner
Reference .

"Specified group contains The specified group contains To select destinations for sending by e-
some invalid dest. Do you some destinations for sending mail, press [Select] for the message
want to select only valid by e-mail and some displayed on the e-mail screen. To select
dest.?" destinations for sending by destination for sending by Scan to
Scan to Folder. Folder, press [Select] for the message
displayed on the Scan to Folder screen.

"The number of destination The maximum number of Select 32 or fewer destination folders.
folders selectable in one time destination folders that can
is limited to 32." be selected at one time has
been exceeded.

"Updating destination list has A network error has occurred. Check whether the server is connected.
failed. Try again?"

"Updating destination list. The destination list is being If a destination or sender's name was
Reselect destination(s) or updated. already selected, re-select it after this
sender's name later." message disappears.

88
Messages Displayed When Using the Scanner Function

Message Cause Solution

"You do not have privileges to Privileges to use this function. Contact the administrator.
use this function."

Messages Displayed on the Client Computer

This section describes likely causes of and possible solutions for the main error messages displayed on the
client computer when using the TWAIN driver.

• If a message not described here appears, act according to the message. For information about how
to turn off the main power switch, see "Turning On/Off the Power", About This Machine .

Message Cause Solution 5


"Any of Login User Name, The entered login user name, • Check the login user name, login
Login Password or Driver password, or driver password, and driver encryption
Encryption Key is incorrect." encryption key was invalid. key.
• Permission to use this function has
not been granted. Contact the
administrator.

"Cannot add any more The maximum number of The maximum number of modes that can
scanning mode." registerable scan modes has be stored is 99. Delete unneeded
been exceeded. modes.

"Cannot connect to the An access mask is set. Contact the network or scanner
scanner. Check the network administrator.
Access Mask settings in User
Tools."

"Cannot find "XXX" scanner The main power switch of the Check whether the main power switch of
used for the previous scan. previously used scanner is not the scanner used for the previous scan is
"YYY" will be used instead." set to "On". turned on.
("XXX" and "YYY" indicate
scanner names.)

89
5. Troubleshooting When Using the Scanner Function

Message Cause Solution

"Cannot find "XXX" scanner The machine is not connected • Check the previously used scanner
used for the previous scan. to the network correctly. is connected to the network
"YYY" will be used instead." correctly.
("XXX" and "YYY" indicate • Cancel the Personal Firewall of the
scanner names.) client computer. For details, see
Windows Help.
• Use an application such as telnet to
make sure SNMPv1 or SNMPv2 is
set as the machine's protocol. See
"Connecting the Machine" and
"Using telnet", Network and
System Settings Guide .

5 • Select the scanner used for the


previous scan.

"Cannot specify any more The maximum number of The maximum number of scanning areas
scanning area." registerable scan areas has that can be stored is 99. Delete
been exceeded. unneeded scanning area.

"Clear Misfeed(s) in ADF." A paper misfeed has Remove jammed originals, and place
occurred inside the ADF. them again. For details, see p.93
"Removing Jammed Paper"
• Check whether the originals are
suitable to be scanned by the
machine.

"Communication error has A communication error has Check whether the client computer can
occurred on the network." occurred on the network. use the TCP/IP protocol.

"Error has occurred in the An error has occurred in the • Check whether the network cable
scanner driver." driver. is connected correctly to the client
computer.
• Check whether the Ethernet board
of the client computer is recognized
correctly by Windows.
• Check whether the client computer
can use the TCP/IP protocol.

90
Messages Displayed When Using the Scanner Function

Message Cause Solution

"Error has occurred in the The application-specified • Check whether the scanning
scanner." scan conditions have settings made with the application
exceeded the setting range of exceed the setting range of the
the machine. machine.
• Disable the client computer's own
firewall. For details, see Windows
Help.

"Fatal error has occurred in An unrecoverable error has An unrecoverable error has occurred in
the scanner." occurred on the machine. the machine. Contact your service
representative.

"Insufficient memory. Close Memory is insufficient. • Close all the unnecessary


all other applications, then
restart scanning."
applications running on the client
computer.
5
• Uninstall the TWAIN driver, and
then reinstall it after restarting the
computer.

"Insufficient memory. Reduce Scanner memory is • Reset the scan size.


the scanning area." insufficient. • Lower the resolution.
• Set with no compression. See
TWAIN Driver help.
The problem may be due to the following
cause:
• Scanning cannot be performed if
large values are set for brightness
when using halftone or high
resolution. See "Relationship
between Resolution and Scan
Size", Scanner Reference .

"Invalid Winsock version. You are using an invalid Install the operating system of the
Please use version 1.1 or version of Winsock. computer or copy Winsock from the
higher." operating system CD-ROM.

"No response from the The machine or client Check whether the machine or client
scanner." computer is not connected to computer is connected to the network
the network correctly. correctly.

91
5. Troubleshooting When Using the Scanner Function

Message Cause Solution

"No response from the The network is crowded. Wait for a while, and then try to
scanner." reconnect.

"Scanner is not available on The TWAIN scanner function Contact your service representative.
the specified device." cannot be used on this
machine.

"Scanner is not available. The machine's main power Set the main power switch to "On".
Check the scanner switch is off.
connection status."

"Scanner is not available. The machine is not connected • Check whether the machine is
Check the scanner to the network correctly. connected to the network correctly.
connection status." • Deselect the personal firewall
5 function of the client computer. For
details, see Windows Help.
• Use an application such as telnet to
make sure SNMPv1 or SNMPv2 is
set as the machine's protocol. See
"Connecting the Machine" and
"Using telnet", Network and
System Settings Guide .

"Scanner is not ready. Check The ADF cover is open. Check whether the ADF cover is closed.
the scanner and the options."

"The name is already in use. You tried to register a name Use another name.
Check the registered names." that is already in use.

• Under Windows Vista, a message may appear if paper jams during scanning with the WSD scanner.
After clearing the paper jam, click [OK] to close the message dialog box, and then resume the
operation.

92
6. Clearing Misfeeds
This chapter describes what to do when paper or originals misfeed (become jammed inside the machine).

Removing Jammed Paper


This section describes how to remove jammed paper.

• If two paper tray units (options) are installed, do not pull out more than one tray at a time when
you are changing or replenishing paper or resolving paper jams. Pressing down forcefully on the
machine's upper surfaces can result in malfunctions and/or user injury.

• The inside of the machine could be very hot. Do not touch any parts other than specified in this
document when removing misfed paper. Otherwise, it may cause burn injury.

6
• The fusing section of this machine might be very hot. Caution should be taken when removing misfed
paper.

• When clearing misfeeds, do not turn off the operation switch. If you do, your copy settings will be
lost.
• To prevent misfeeds, do not leave any torn scraps of paper inside the machine.
• Contact your service representative if misfeeds occur frequently.
• The internal parts of the machine may be hot. Wait for the duplex unit to cool down before clearing
a paper jam in the unit.
• When removing jammed sheets, take care to touch only those areas explicitly indicated in the manual.
• Do not remove the fusing unit. Doing so will result in loss of print quality.

• More than one misfeed area may be indicated. If this is the case, check every indicated area. Refer
to the following charts: A, P, and Y.
• You can find stickers explaining how to remove misfed paper inside the right cover and on the top of
the ADF cover.
• When the machine instructs you to reset originals, reset them in the feeding position. The display will
show you the number of originals to return.

93
6. Clearing Misfeeds

BQP004S

6 When A is displayed

BQP005S

94
Removing Jammed Paper

When P is displayed

6
BQP003S

When Y1 is displayed

BQP006S

95
6. Clearing Misfeeds

When Y2 is displayed

BQP007S

96
7. Appendix

Trademarks
Adobe, Acrobat, Acrobat Reader, PostScript, and Reader are either registered trademarks or trademarks
of Adobe Systems Incorporated in the United States and/or other countries.
Apple and TrueType are trademarks of Apple Inc., registered in the U.S. and other countries.
PCL® is a registered trademark of Hewlett-Packard Company.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/
Open Company Limited.
Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The proper names of the Windows operating systems are as follows:
• The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
• The product names of Windows XP are as follows:
7
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
• The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Business
Microsoft® Windows Vista® Home Premium
Microsoft® Windows Vista® Home Basic
Microsoft® Windows Vista® Enterprise
• The product names of Windows Server 2003 are as follows:
Microsoft® Windows Server® 2003 Standard Edition
Microsoft® Windows Server® 2003 Enterprise Edition
Microsoft® Windows Server® 2003 Web Edition
Microsoft® Windows Server® 2003 Datacenter Edition
• The product names of Windows Server 2003 R2 are as follows:

97
7. Appendix

Microsoft® Windows Server® 2003 R2 Standard Edition


Microsoft® Windows Server® 2003 R2 Enterprise Edition
Microsoft® Windows Server® 2003 R2 Datacenter Edition
• The product names of Windows Server 2008 are as follows:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Datacenter
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.

98
INDEX
A M
Adjusting the volume.............................................31 Manuals for this machine........................................5
Alert Messages......................................................60 Memory is full........................................................29
C Messages displayed..........................21, 34, 59, 82
Messages displayed on the client computer.......89
Cannot browse the network to send a scan file...... Messages displayed on the control panel when
................................................................................79 using the scanner function.....................................82
Cannot make clear copies....................................23 Messages displayed when installing the printer
Cannot make copies as wanted...........................26 driver......................................................................55
Cannot print...........................................................63 Multi-accessing...................................................... 19
Cannot send or receive fax messages as wanted... N
................................................................................45
Cannot send scanned files....................................79 Names of major item...............................................8
Clearing misfeeds..................................................93 Network connection..............................................65
Combine................................................................. 26 Network delivery function cannot be used.........79
Control panel..................................................60, 82 Notes........................................................................9
Copy function........................................................21 Notice.......................................................................7
D O
Duplex....................................................................26 Operations are not possible when messages are
displayed...............................................................81
E
Other printing problems........................................67
Edit..........................................................................26 P
Error log.................................................................61
Error Mail Notification..........................................54 Panel tone..............................................................12
Error occurs using Internet Fax.............................54 Printer function.......................................................59
Error Report (E-mail)..............................................54 Printing....................................................................45
Printing the Error Log.............................................61
F
Problems operating the machine..........................15
Facsimile function..................................................34 R
H
Reception...............................................................45
How to read this manual.........................................8 Removing jammed paper.....................................93
I S
If an error report is printed....................................52 Scanner function....................................................82
If USB connection fails..........................................58 Scanning is not done as expected.......................77
Indicators................................................................11 Server-Generated error e-mail............................54
J Stamp.....................................................................26
Status messages..................................................... 59
Job is not performed..............................................19 Symbols....................................................................8
L T
Legal Prohibition....................................................10 Trademarks............................................................97
Transmission...........................................................45

99
Transmission/Reception.......................................45
Turning off the main power / In the event of power
failure......................................................................53
TWAIN...................................................................89
TWAIN driver cannot be started..........................79
W
When A is displayed.............................................94
When Memory Is Full.....................................29, 50
When P is displayed.............................................95
When paper is not fed properly...........................67
When S/MIME cannot be used..........................80
When the data in indicator does not light up or flash
................................................................................65
When the Function Status Indicator Lights Up in Red
................................................................................13
When the machine is connected to the computer
using the interface cable.......................................65
When Y1 is displayed...........................................95
When Y2 is displayed...........................................96
When you cannot print clearly.............................67
When You Cannot Send Scan Files Using WSD....
................................................................................80
Windows 2000.....................................................55
Windows Server 2003/2003 R2.......................55
Windows Server 2008.........................................57
Windows Vista.......................................................56
Windows XP Home Edition...................................56
Windows XP Professional.....................................55

100 EN USA D069-6852


Copyright © 2008
Operating Instructions Troubleshooting

Type for 917/LD117/MP 171/Aficio MP 171


Type for 917F/LD117F/MP 171F/Aficio MP 171F
Type for 917SPF/LD117SPF/MP 171SPF/Aficio MP 171SPF

EN USA D069-6852

Вам также может понравиться